Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access method of big data confidential files based on role authentication

A technology for confidential documents and authentication data, applied in the field of secure access to big data platforms, it can solve the problems of copying and destroying, fraudulent use and abuse of digital credentials, and achieve the effect of solving copying and fraudulent use.

Inactive Publication Date: 2021-11-05
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since digital certificates are easy to be copied and destroyed in the circulation link, thus being fraudulently used and abused, users must be able to identify the validity and security of digital certificates

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method of big data confidential files based on role authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0031] One aspect of the present invention provides a method for accessing big data confidential files based on role authentication. The method of the invention relates to an authentication front end and an authentication cloud platfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for accessing big data confidential files based on role authentication, which includes loading a pre-stored role authentication key on a terminal after obtaining the user's target credentials and identification data; and generating a key that matches the target credentials and time through the terminal through the role authentication key. Stamp the corresponding role authentication data; the terminal at least generates the corresponding confidential file according to the target credentials, time stamp, role authentication data and identification data; the terminal displays the confidential file for the authentication front-end to identify the confidential file data; the authentication front-end Perform parsing to obtain target credentials, time stamps, identification data and mobile authentication data; the authentication front end transmits target credentials, time stamps, identification data and role authentication data to the authentication cloud platform; the authentication cloud platform loads cloud authentication based on the identification data key; the authentication cloud platform verifies the role authentication data with the cloud authentication key, and generates a verification result; the authentication cloud platform transmits the verification result to the authentication front end, so that the authentication front end displays the verification result. The invention solves the problems of copying and fraudulent use of credential files.

Description

technical field [0001] The invention relates to safe access to a big data platform, in particular to a method for accessing big data confidential files based on role authentication. Background technique [0002] As we all know, electronic certificates can replace paper certificates and can be directly transmitted through the network to improve the efficiency of information exchange. If the credential file such as transaction authentication information is displayed on the terminal held by a specific user, it can be used for various analysis applications, but while bringing convenience, how to ensure the validity and security of digital certificates is very important. Since digital certificates are easy to be copied and destroyed in the circulation link, thus being fraudulently used and abused, users must be able to identify the validity and security of digital certificates. [0003] Therefore, how to prevent the credential file from being copied and at the same time identify...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/62G06F21/60G06F21/31
CPCG06F21/31G06F21/602G06F21/604G06F21/6218H04L9/3297H04L63/08H04L63/0807H04L63/0876
Inventor 王鹏飞杜元翰单新文其他发明人请求不公开姓名
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products