Data authority management method based on identifier analysis

A technology of data management and management method, which is applied in the field of data authority management based on identification analysis, can solve the problems of user personal information leakage, data leakage, unauthorized analysis, etc., and achieve the goal of ensuring data sharing security, ensuring work efficiency, and strengthening heat dissipation Effect

Pending Publication Date: 2022-07-29
苏州协同创新智能制造科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The resulting security risks mainly include data leakage, unauthorized analysis, leakage of user personal information, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data authority management method based on identifier analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The specific embodiments of the present invention will be further described below with reference to the accompanying drawings and embodiments. The following examples are only used to illustrate the technical solutions of the present invention more clearly, and cannot be used to limit the protection scope of the present invention.

[0012] The technical scheme of the specific implementation of the present invention is:

[0013] like figure 1 As shown, a data rights management method based on identity resolution, the method includes the following processes:

[0014] Obtain the identity information of the visiting user through the login verification module, and determine whether the visiting user is a registered user. If so, forward the data query request sent by the user to the dynamic computing module; if not, forward the data query request sent by the user. to the data management module 100;

[0015] The data query request is received by the dynamic computing module,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data authority management method based on identifier analysis, which comprises the following steps that: a login verification module acquires identity information of a visiting user, judges whether the visiting user is a registered user, and forwards a data query request sent by the user to a dynamic calculation module if the visiting user is the registered user; if not, forwarding the data query request to a data management module; the dynamic calculation module receives the data query request, gives a corresponding query permission level according to identity information of a visiting user, binds the query permission level with the data query request and then sends the data query request to the data management module; the data management module receives the data query request and judges whether the data query request is bound with an authority level or not, and if yes, non-public identification analysis data corresponding to the authority level is called and sent to the visiting user; and if not, calling the public identifier analysis data and sending the public identifier analysis data to the visiting user. According to the data authority management method based on identification analysis, the data sharing security under an identification analysis system is effectively guaranteed.

Description

technical field [0001] The invention relates to a data rights management method based on identification resolution. Background technique [0002] "Data resourceization" is the primary trend in the development of big data. Data will continue to become an asset of an organization and a powerful weapon to enhance the competitiveness of organizations and companies. Long-term business practices in various fields have accumulated large-scale field data, and with the continuous advancement of the informatization process, the frequency of data generation is increasing to form dynamic large data sets. These data can be divided into four categories according to their attributes or characteristics: device data, business system data, knowledge base data, and user personal data. Data can be divided into three types: general data, important data and sensitive data according to the degree of data sensitivity. Data involves all aspects of data collection, transmission, storage, and proces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/60G06F1/20
CPCG06F21/31G06F21/604G06F1/20G06F2221/2141
Inventor 狄航袁雪腾陈国栋刘晓东田劲松倪浩钧
Owner 苏州协同创新智能制造科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products