Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data acquisition method and system based on authorization and authentication

A data acquisition and data technology, applied in digital transmission systems, transmission systems, user identity/authority verification, etc., can solve problems such as slowing down data acquisition speed, potential security risks, and no visitor authentication.

Active Publication Date: 2017-05-24
重庆优易智新数据科技有限公司
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, the data acquisition terminal that requests to obtain data generally directly accesses the data center where the data is stored to obtain data. This may easily lead to network congestion or even paralysis when the acquisition volume is large, and due to direct access, there is no need for visitors. Authenticating the identity of the user, there will be security risks. In this way, the speed of data acquisition is slowed down and data security cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data acquisition method and system based on authorization and authentication
  • Data acquisition method and system based on authorization and authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0014] combine first figure 2 The data acquisition system based on authorization authentication of the present invention is introduced. like figure 2 As shown, the data acquisition system based on authorization authentication of the present invention includes an authorization terminal, a data acquisition terminal, an authorization proxy and a data center, and the data acquisition terminal sends a data request authorized by the authorization terminal to the authorization proxy. To acquire the data of the data center, before the data acquisition terminal sends the authorization request and the data request, the authorized terminal has already shared the first shared encryption key k1 with the data acquisition terminal, and the authorized terminal has already shared the first shared encryption key k1 with the data acquisition terminal. The authorized agents share the second shared encryption key k2. In addition, the encryption key ks (data key) between the data acquisition te...

Embodiment 2

[0027] Next, refer to figure 1 The method for acquiring data by using the data acquisition system based on authorization and authentication in Embodiment 1 is described. like figure 1 As shown, the data acquisition method based on authorization authentication of the present invention comprises the following steps:

[0028] S101: Send identity information

[0029] Specifically, the data acquisition terminal sends its own identity information to the authorized terminal.

[0030] S102: Verify identity information and send authorization token

[0031] Specifically, the authorized terminal receives the identity information and extracts the authorization certificate (including the first shared encryption key k1), and sends to the data acquisition terminal encrypted with the first shared encryption key shared with the data acquisition terminal. The authorization token; at the same time, the authorization token is actually stored in the authorization log database.

[0032] S103: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data acquisition method and system based on authorization and authentication. The method comprises the following steps: S101: sending identity information; S102: verifying the identity information and sending an authorization token; S103: sending a data to obtain a verification request; S104: sending a data token and a data key; S105: sending an encrypted data token and identity information; S106: sending a verification result; S107: sending a data request; S108: judging whether corresponding data exist, if so, sending the corresponding data, and otherwise, executing step S109; S109: requesting to obtain the corresponding data; and S110: sending the obtained corresponding data. By adoption of the data acquisition method and system provided by the invention, the data acquisition speed and security can be improved.

Description

technical field [0001] The invention relates to a data acquisition method and its system, in particular to an authorization authentication-based data acquisition method and its system. Background technique [0002] In the prior art, the data acquisition terminal that requests to obtain data generally directly accesses the data center where the data is stored to obtain data. This may easily lead to network congestion or even paralysis when the acquisition volume is large, and due to direct access, there is no need for visitors. The identity of the user is verified, which will have security risks. In this way, the speed of data acquisition is slowed down and data security cannot be guaranteed. Contents of the invention [0003] In view of the above technical problems, the present invention provides a data acquisition method and system based on authorization authentication that can ensure safe and efficient data acquisition. [0004] The technical scheme adopted in the prese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/085H04L9/3213H04L63/0428H04L63/0807H04L63/0823H04L63/0884H04L63/0892H04L63/10
Inventor 夏虎刘希蔡小娜
Owner 重庆优易智新数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products