Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data access control method and device

A data access control and data access technology, applied in the field of data security, can solve the problems of unauthorized receipt malicious access, malicious tampering of network information, malicious access to data, etc., to avoid malicious access, improve user experience, and improve security.

Active Publication Date: 2018-10-19
ZHONGAN INFORMATION TECH SERVICES CO LTD +1
View PDF15 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current field of data access, there are the following disadvantages: unauthorized receipts are maliciously accessed, network information is maliciously tampered with, data is accessed maliciously, and bad information and data are left after accessing data, all of which affect the security of data access. Therefore, in order To solve the above technical problems, it is necessary to provide a control method for precise control of data access, so that the security of data access can achieve precise control of multiple access authorization conditions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access control method and device
  • Data access control method and device
  • Data access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 It is a flowchart of the data access control method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the embodiment of the present invention provides a data access control method, the method includes the following steps:

[0042] 11. Set the authorization conditions for data access, where the authorization conditions include one or more authorization conditions that can meet the different access requirements of users accessing data, and the data accessed by users is stored in the blockchain network.

[0043] Specifically, the authorization conditions for setting data access include the following items:

[0044] Determine the legal account information verification rules for authorized users; and / or determine the authorization rules for different authorization levels according to different authorized users; and / or determine the authorization rules for different authorization fees for different authorized users; and / or determine the ...

Embodiment 2

[0068] figure 2 It is a flow chart of the data access control method provided by Embodiment 2 of the present invention.

[0069] Such as figure 2 As shown, the data access control method provided by the embodiment of the present invention includes the following steps:

[0070] 21. Determine the legal account information verification rules for authorized users.

[0071] According to the key verification and / or account address of asymmetric encryption, the legal verification of the authorized user is carried out.

[0072] Specifically, the asymmetric encryption technology adopted uses the private key to calculate the public key. The public-private key login authorization method can outsource a layer of account password system, or directly use the public-private key, and then log in through the public-private key method or add the account address. Legal verification of authorized users prior to operations such as access, application, authorization, encryption, and decryption...

Embodiment 3

[0100] Such as Figure 4 As shown, the data access authority control device provided by the embodiment of the present invention includes a setting module 31 , a determination module 32 and an authorization operation module 33 .

[0101] Specifically, the setting module 31 is configured to set authorization conditions for data access. Further, the setting module 31 includes: a first determination module 311, used to determine the legal account information verification rules for authorized users; a second determination module 312, used to determine authorization rules for different authorization levels according to different authorized users; The determination module 313 is used to determine the authorization rules for different authorization fees according to different authorized users; the fourth determination module 314 is used to determine the authorization rules for different authorization times according to different authorized users; the fifth determination module 315 is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data access control method and device, and belongs to the technical field of data safety. The method includes the following steps: setting authorization conditions for data access; determining data access requests that meet the authorized conditions; and carrying out an authorization operation, corresponding to the authorization conditions, applied on data according to the data access requests. The authorization conditions includes one or more, and the data is stored in a blockchain network. The method and device realize the safety isolation of the data and the precise control of the security access, satisfy multiple access requirements of users for the data and avoid risk problems of malicious access and tampering with the data to a certain extent at the same time, overcome corresponding drawbacks of the prior art in the field, and have a good application prospect.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data access control method and device. Background technique [0002] Blockchain Blockchain technology is an emerging technology that has emerged in the field of financial technology (FinTech) in recent years. Its unique attributes such as decentralization, non-tamperable information, multi-node collective maintenance, openness, and privacy protection are based on unreliable In the trusted Internet, it can record and provide credible transaction information data. The blockchain mainly includes four components: P2P network, cryptography, consensus mechanism, and smart contract, and its unique characteristics are guaranteed through the technical integration of the four fields. [0003] In today's era of rapid network development, data access is ubiquitous. However, in the current field of data access, there are the following disadvantages: unauthorized receipts are malicio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/0464H04L63/08H04L63/10H04L63/105H04L63/108H04L63/20
Inventor 迟祥宋文鹏赵阳
Owner ZHONGAN INFORMATION TECH SERVICES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products