Method for analyzing data authority control based on Handle identification

A data authorization and identification technology, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve problems such as user personal information leakage, unauthorized analysis, data leakage, etc., to ensure platform security and confidentiality. , the effect of avoiding the leakage of private information

Active Publication Date: 2021-02-26
重庆忽米网络科技有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The resulting security risks mainly include data leakage, unauthorized analysis, leakage of user personal information, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for analyzing data authority control based on Handle identification
  • Method for analyzing data authority control based on Handle identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0028] Such as figure 1 As shown, it is a flowchart of a specific implementation of the method for analyzing data authority control based on Handle identification disclosed by the present invention, including the following steps:

[0029] S1. The enterprise node registers on the platform, and the platform assigns the client ID and client secret key to the enterprise node, and assigns the access authority of the API interface corresponding to the client ID;

[0030] After the enterprise node registers on the platform and applies for the identification resolution prefix, the platform assigns a unique client ID (ClientId) and client secret key (ClientSecret), and assigns access to the API range to the client ID.

[0031] S2. When the enterprise node accesses the API interface, it applies to the platform for an access token through the client ID and client secre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for analyzing data authority control based on Handle identification, which comprises the following steps that: a platform allocates a client ID (Identity) and a clientsecret key to an enterprise node, and allocates access authority of an API (Application Program Interface) corresponding to the client ID; the enterprise node applies for an access token to the platform through the client ID and the client key; when the enterprise node sends a request for accessing the API to the platform, the access token is placed in the request header; and the platform acquires the access token in the request header, verifies whether the enterprise node sending the access token is registered in the platform or not, verifies whether the access token is in effective time ornot if the access token is registered in the platform, verifies whether the client ID corresponding to the access token has the access permission to access the API or not if the access token is registered in the platform, and allows the enterprise node to access the API if the access token is registered. According to the invention, when the enterprise node accesses the identification data throughthe platform open interface, identity recognition needs to be carried out on the accessed enterprise node, so that the platform security is ensured and the enterprise data is prevented from being attacked.

Description

technical field [0001] The invention relates to the technical field of industrial Internet identification analysis system, and in particular to a method for controlling authority of analysis data based on Handle identification. Background technique [0002] The Industrial Internet logo analysis system is an important network infrastructure of the Industrial Internet and the nerve hub supporting the interconnection of the Industrial Internet. Its architecture includes national root nodes, national top-level nodes, secondary logo resolution nodes, public recursive resolution nodes, and enterprise nodes. [0003] Relevant data can be divided into four categories according to their attributes or characteristics: equipment data, business system data, knowledge base data, and user personal data. According to the degree of data sensitivity, data can be divided into three types: general data, important data and sensitive data. Data involves various links such as data collection, tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06F21/44H04L29/06
CPCG06F21/629G06F21/6254G06F21/604G06F21/44H04L63/0807H04L63/10H04L63/0435H04L63/0414G06F2221/2141
Inventor 陈虎卢仁谦周光勇刘相池
Owner 重庆忽米网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products