Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

An endogenous data security interaction method for a double-middle-station double-chain architecture

A data security and dual-middle platform technology, applied in the field of data information management, can solve problems such as difficult to clarify the business and data processing process, data interaction efficiency problems, business flow traceability and cumbersome scheduling of data flow, etc.

Active Publication Date: 2021-02-09
SHANGHAI UNIVERSITY OF INTERNATIONAL BUSINESS AND ECONOMICS +1
View PDF17 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the prominent problem in the integration process of data center and business center is the efficiency of data interaction
It is difficult to clarify a complete business and data processing process when multiple business streams and data streams are interactively transmitted between platforms
The mixture of endogenous business information and data information makes the traceability of business flow and the scheduling of data flow cumbersome, and the security of data interaction is also facing certain challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An endogenous data security interaction method for a double-middle-station double-chain architecture
  • An endogenous data security interaction method for a double-middle-station double-chain architecture
  • An endogenous data security interaction method for a double-middle-station double-chain architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] see Figure 1-4 , in this embodiment: a method for secure interaction of endogenous data in a dual-middle platform and double-chain architecture, including a dual-middle platform architecture and a double-chain architecture, and the dual-middle platform architecture includes business services, business systems, and business Center, data center, business foundation and data foundation, the double chain architecture includes data information, data chain, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an endogenous data security interaction method for a double-middle-station double-chain architecture, and the invention employs the double-middle-station architecture and the double-chain architecture, and the double-middle-station architecture comprises a business service, a business system, a business center, a data center, a business foundation and a data foundation; thedouble-chain architecture comprises data information, a data chain, a service chain and a service record. According to the endogenous data security interaction method of the double-middle-station double-chain architecture, the interaction security of endogenous data is improved by importing a block chain technology into a middle station, the credibility of the middle platform data before the middle platform data is linked is ensured, and an improved Shoup threshold endogenous data interaction protocol is constructed to ensure the security of the data before the data is linked. On the basis ofthe above work, an interaction mechanism integrating the under-chain signature and the on-chain signature verification is designed, so that the data interaction efficiency of the double middle stations and the double chains is improved, the service middle stations can extract the related information of the data middle stations more efficiently, and the service processing capability is enhanced.

Description

technical field [0001] The invention relates to the technical field of data information management, in particular to a method for secure interaction of endogenous data in a double-middle-platform double-chain architecture. Background technique [0002] The traditional data middle platform mainly serves for the layering and attribute separation of data, and has the ability to accumulate public data. The data center is a shared platform that collects, calculates, stores, and processes massive data through data technology, and at the same time unifies standards and calibers. It was first proposed by Alibaba in a research report in 2016. The purpose is to help realize global data norms and try to fully feed back the functions developed by the technology platform to front-end applications. The reason for the emergence of Alibaba's data center comes from the ever-changing data needs and high-speed timeliness requirements of its many internal business departments. It must not only...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64H04L9/08H04L9/32
CPCG06F21/606G06F21/602G06F21/64H04L9/3255H04L9/0838
Inventor 刘峰齐佳音李志斌杨杰
Owner SHANGHAI UNIVERSITY OF INTERNATIONAL BUSINESS AND ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products