Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threshold and key-based authorization method in software as a service (SaaS)

A software and key technology used in the field of data security

Active Publication Date: 2011-04-13
JIANGSU FENGYUN TECH SERVICE CO LTD
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Technical problem: The purpose of the present invention is to provide a threshold-based and key-based authorization method in software as a service to solve the problem of protecting SaaS enterprise user data security. By using the method proposed by the present invention, it can naturally provide SaaS security issues. very good solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold and key-based authorization method in software as a service (SaaS)
  • Threshold and key-based authorization method in software as a service (SaaS)
  • Threshold and key-based authorization method in software as a service (SaaS)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] Implementation steps of data operations based on threshold keys and authorization in SaaS applications:

[0095] The research on data security technology based on threshold key and authorization in SaaS is characterized in that the classic Shamir(t, n) secret sharing scheme is used as the construction threshold signature scheme, and the SaaS software developer, operator, and customer share the key. SaaS data operation permissions are graded and permission tables are established, as follows:

[0096] SaaS data operation permission classification and implementation steps of establishing permission table:

[0097] (1) According to the needs of SaaS customers, the data operation authority is classified, and the authority of the corresponding level of personnel is established after the negotiation of the SaaS software developer, operator, and customer.

[0098] (2) Create a permission table on the MSP Site,

[0099] (3) Establish corresponding roles according to the author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a threshold and key-based authorization method in software as a service (SaaS), which is a solution of data security in application of enhancement software as a service (SaaS). The authorization method is mainly used for providing objective security insurance for an SaaS user from technical means so as to solve the problems in protecting data security of SaaS enterprise users. By using the authorization method provided by the invention, a very good method can be naturally provided for solving SaaS security problems. The authorization method is a strategic method, and in the method, keys are divided and an SaaS client masters part of the keys so that an SaaS software provider and an SaaS operator cannot perform certain advanced data operation without the participation of the SaaS client. The authorization method aims to convert key authentication of the client into client authorization, thereby improving security information of the user, and increasing the safety insurance.

Description

technical field [0001] The invention is a solution for strengthening data security in software as a service (Software as a Service) application. It is mainly used to provide objective security guarantees for SaaS users through technical means, and belongs to the field of data security technology. Background technique [0002] SaaS (Software as a Service, software as a service), as a new form of software service, is emerging around the world. It is an overturning traditional software service method, which will completely change the relationship between software suppliers and customers, from a sales relationship to a service relationship. With the rapid development of the Internet (Internet), the demand for providing software as a form of service to customers is gradually increasing, and the emergence of the new model of SaaS is exactly in line with this demand. SaaS is when software developers rent out their products on a per-customer basis and run the programs for them. D...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06Q10/00G06F21/62
Inventor 高志前任勋益李涛张伟周明中张俊锋
Owner JIANGSU FENGYUN TECH SERVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products