Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data file access control method and device based on block chain, and medium

A data file, access control technology, applied in the direction of secure communication devices, electrical components, digital transmission systems, etc., can solve problems such as security risks, and achieve the effect of ensuring security

Pending Publication Date: 2022-02-08
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Commonly used access control models (such as Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Authority-Based Access Control (CaBAC), etc.) are implemented through a Centralized access path, if a single point is hijacked, it will suffer security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data file access control method and device based on block chain, and medium
  • Data file access control method and device based on block chain, and medium
  • Data file access control method and device based on block chain, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Various exemplary embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. It should be noted that relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0018] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way intended as any limitation of the disclosure, its application or uses. That is, the structures and methods herein are presented by way of example to illustrate various embodiments of the structures and methods of this disclosure. However, those skilled in the art will appreciate that they illustrate merely exemplary, and not exhaustive, ways in which the disclosure may be practiced. Furthermore, the figures are not necessarily to scale and some features may be exaggerated to show details of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a block chain-based data file access control method, medium and device, and the method comprises the steps: querying an access control table stored in a block chain in response to an access request for a data file from a requester, so as to verify whether the access request is authorized or not; when it is verified that the access request of the requester is authorized, querying a denial of service information table stored in a block chain to verify whether the access request of the requester is legal; and providing the requested data file for the requester under the condition that the access request of the requester is verified to be legal.

Description

technical field [0001] The present disclosure relates to the fields of cloud computing and the Internet of Things, and in particular relates to a blockchain-based data file access control method, medium and device. Background technique [0002] With the development of communication technology, user data continues to increase, and data sharing and integration has also become a trend. However, the security and privacy risks brought about by sharing and querying data are the biggest challenges for cloud storage. It is particularly important to ensure the security, confidentiality and integrity of data while ensuring that authorized users can access legally. Commonly used access control models (such as Discretionary Access Control (DAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Authority-Based Access Control (CaBAC), etc.) are implemented through a Centralized access paths, if a single point is hijacked, will suffer security risks. In view of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/101
Inventor 李军杨小军游嘉王兵金杰秦国强陈鹏宇赵进
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products