Supercharge Your Innovation With Domain-Expert AI Agents!

Access control system and method for unstructured data in multi-tenant environment

An unstructured data and access control technology, applied in the field of data security, can solve the problems of inability to improve the access performance of large data capacity, high implementation cost, identity authentication and data desensitization, etc., to ensure high concurrency scenarios and guaranteed performance. Performance, guarantee high-speed effect

Pending Publication Date: 2022-01-07
JIANGSU AISINO TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Three commonly used data isolation methods: 1. Each tenant has an independent database system, but the implementation cost is too high to apply to the business scenario of a large number of tenants; 2. Multiple tenants share the database and have independent table spaces, but are subject to the constraints of the database itself. Concurrent access capability, it is difficult to realize identity authentication and data desensitization when multiple tenants access concurrently; 3. Fields are distinguished by tenant, but data isolation is almost impossible, and it is difficult to control data access of different tenants
[0003] For unstructured data, when the data content needs to be encrypted, relational data can neither reflect the convenience of its SQL language, nor can it improve the access performance of large data capacity
As a result, such traditional data storage methods cannot provide satisfactory solutions for users in multi-tenant and high data security application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system and method for unstructured data in multi-tenant environment
  • Access control system and method for unstructured data in multi-tenant environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] An access control method for unstructured data in a multi-tenant environment. Assuming that the user already has a CA certificate or has exchanged a public key with the server and has completed user registration, the user stores data according to the following steps:

[0051] 1. When a user initiates an unstructured data storage request, the user needs to submit data according to the API interface function setdata (username, password, timestamp, title, data, sign) set in the present invention, where username is the account name registered by the user , password is the encrypted value of the user's account password (encrypted with the user's private key), timestamp indicates the timestamp of the user's submitted data, title indicates the title of the user's data, data is the user's data object, that is, the original data submitted by the user, and sign is the user's unique logo. The sign value is the hash value of the user CA certificate or the user private key.

[0052...

Embodiment 2

[0063] An access control system for unstructured data in a multi-tenant environment, including:

[0064] A user request acquisition module, configured to receive user data processing requests;

[0065] An identity authentication module, configured to perform user identity authentication based on user data processing requests;

[0066] A user data processing module, configured to process user data in response to passing user identity authentication;

[0067] The data processing module includes a user data storage module and a user data extraction module, and the user data processing request includes a user data storage request and a user data extraction request;

[0068] The user data storage request includes,

[0069] The data summary generation module is used to extract parameter information based on the user data storage request, generate data summary information and store it in the summary library;

[0070] A dynamic password generation module, configured to generate a d...

Embodiment 3

[0077] The embodiment of the present invention also provides an access control device for unstructured data in a multi-tenant environment, including a processor and a storage medium;

[0078] The storage medium is used to store instructions;

[0079] The processor is configured to operate according to the instructions to perform the steps of the following method:

[0080] Receive user data processing requests;

[0081] User identity authentication based on user data processing requests;

[0082] In response to passing user identity authentication, perform user data processing, including user data storage and user data extraction, the user data processing request includes user data storage request and user data extraction request, wherein:

[0083] The user data store includes:

[0084] Extract parameter information based on user data storage requests, generate data summary information and store it in the summary library;

[0085] Generate a dynamic password based on the da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control system and method for unstructured data in a multi-tenant environment in the technical field of data security. The method comprises the following steps: receiving a user data processing request; performing user identity authentication based on the user data processing request; when the user identity authentication is passed, carrying out user data processing including user data storage and user data extraction, the user data processing request including a user data storage request and a user data extraction request; and the user data storage includes: extracting parameter information based on the user data storage request, generating data summary information and storing the information in a summary library; generating a dynamic password based on the data summary information; and encrypting a user data object in the user data storage request based on the dynamic password, and storing the encrypted user data object into a database. According to the method, the user data query and search efficiency can be improved, and user data isolation is realized through management of the abstract library.

Description

technical field [0001] The invention relates to an access control system and method for unstructured data in a multi-tenant environment, belonging to the technical field of data security. Background technique [0002] Saas software will inevitably face a multi-tenant environment. With the expansion of user needs, Saas software needs to process more unstructured data (text, images, videos, etc.), and most of the current Saas software uses relational data combined with data isolation. Realize secure access to data in a tenant environment. Three commonly used data isolation methods: 1. Each tenant has an independent database system, but the implementation cost is too high to apply to the business scenario of a large number of tenants; 2. Multiple tenants share the database and have independent table spaces, but are subject to the constraints of the database itself. Concurrent access capabilities make it difficult to achieve identity authentication and data desensitization when...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/33G06F21/60
CPCG06F21/31G06F21/33G06F21/604G06F21/602G06F2221/2141G06F2221/2151
Inventor 章宁严康康
Owner JIANGSU AISINO TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More