Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data access method, access verification device and data storage system

A data storage system and data access technology, which is applied in the fields of data access methods, access verification equipment and data storage systems, can solve the problems of low data access efficiency, improve data access efficiency, and avoid low data access efficiency.

Active Publication Date: 2021-06-15
湖南岳麓山数据科学与技术研究院有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of this application is to provide a data access method, an access verification device and a data storage system to solve the technical problem in the prior art that the efficiency of data access is low due to the adoption of a hierarchical authorization system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data access method, access verification device and data storage system
  • A data access method, access verification device and data storage system
  • A data access method, access verification device and data storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to realize data sharing, data is usually shared in a data storage system, and security is ensured by setting data access permissions. At present, the commonly used authority management scheme adopts the hierarchical authorization mechanism. The data sharing service between different entities needs to rely on the mutual authentication of the upper layer of the hierarchical authorization system, and then send it down to the level of the data requesting entity to complete the authorization. And because different levels of entities (user clients) correspond to different data permissions, different data have different visibility to different entities, resulting in the formation of massive mapping relationships between data and users (clients), and layer after layer requests. Issuing authorization leads to low data sharing efficiency, and it is difficult to flexibly support multi-level sharing authority management.

[0056] In order to solve the above problems, the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a data access method, an access verification device and a data storage system, wherein the data access method is applied to the access verification device, and the access verification device has a preset permission chain, and the data and Users are respectively provided with permissions, and the permissions are characterized by the type and quantity of tokens. The method includes: in response to the data access request sent by the user through the client, querying the access rights of the user on the preset permission chain Authority, the access authority is characterized by the type and quantity of token; based on the type and quantity of token in the access authority, data access information is generated; the data access information is sent to the client, and the client Data in the data storage system is accessed based on the data access information.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a data access method, access verification equipment and a data storage system. Background technique [0002] In existing data sharing services, a hierarchical authority management system is usually adopted. For example, after the upper layers that require hierarchical authorization are mutually authenticated, they are then sent down to the layer where the data requesting client is located to complete the authorization. [0003] Therefore, in the above permission management, different levels of clients correspond to different data permissions, and different data have different visibility to different clients, resulting in the formation of a massive mapping relationship between data and clients, and then layer after layer of requests. Authorization, resulting in low efficiency of data access. Contents of the invention [0004] In view of this, the purpose of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/10H04L63/105H04L67/1097
Inventor 尹浩董加卿
Owner 湖南岳麓山数据科学与技术研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products