CN118041651A - Data security exchange and sharing method and system based on real world data platform - Google Patents

Data security exchange and sharing method and system based on real world data platform Download PDF

Info

Publication number
CN118041651A
CN118041651A CN202410233663.1A CN202410233663A CN118041651A CN 118041651 A CN118041651 A CN 118041651A CN 202410233663 A CN202410233663 A CN 202410233663A CN 118041651 A CN118041651 A CN 118041651A
Authority
CN
China
Prior art keywords
identity
server
data exchange
user
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410233663.1A
Other languages
Chinese (zh)
Inventor
刘婉姮
徐成
赵子欣
马雪琦
杜甲珺
刘影
王萌
张�浩
吴庭璋
唐佩福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fourth Medical Center General Hospital of Chinese PLA
Original Assignee
Fourth Medical Center General Hospital of Chinese PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fourth Medical Center General Hospital of Chinese PLA filed Critical Fourth Medical Center General Hospital of Chinese PLA
Priority to CN202410233663.1A priority Critical patent/CN118041651A/en
Publication of CN118041651A publication Critical patent/CN118041651A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a data security exchange and sharing method and system based on a real world data platform, which can judge the identity legitimacy of different role parties such as data uploading and request through a server and grant authority with timeliness according to a verification result; for data transmission and interaction, the system transmits identity and data request commands to the server through a RESTful interface, so that data safety and normative sharing and exchange are guaranteed. The invention ensures that the real world data platform has high expandability and flexibility and provides a convenient and safe data exchange and sharing platform for users.

Description

Data security exchange and sharing method and system based on real world data platform
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and system for securely exchanging and sharing data based on a real world data platform.
Background
With the advent of the cloud computing era, the data interaction between the system and the platform is frequent, and the standard problem in the data exchange process and the safety problem in the transmission process are valued. The standard of the past data platform is different, and the heterogeneous problem is easy to generate in the aspect of data docking; sensitive data exposure, data loss, service paralysis and other problems are easy to occur in the transmission process.
Disclosure of Invention
The present invention aims to provide a secure exchange and sharing method and system of data based on a real world data platform which overcomes or at least partially solves the above-mentioned problems.
In order to achieve the above purpose, the technical scheme of the invention is specifically realized as follows:
One aspect of the present invention provides a data security exchanging and sharing method based on a real world data platform, comprising:
the method comprises the steps that a server creates identity credentials of each user and stores the identity credentials of each user into a database;
the client sends the user identity credentials to the server;
the server judges the validity of the user identity credentials;
After judging that the user identity credential is legal, the server acquires an identity token request corresponding to the user identity credential, which is sent by the client, generates an identity token corresponding to the user identity credential in a preset mode, stores the identity token corresponding to the user identity credential in a Redis cache database, and sends the identity token corresponding to the user identity credential to the client;
After the client acquires the identity token corresponding to the user identity credential, sending a data exchange request to the server, wherein the data exchange request comprises: a requested data resource parameter and the identity token;
the server intercepts the data exchange request, verifies the validity of the data exchange request, releases the data exchange request if the data exchange request is legal, and refuses the data exchange request if the data exchange request is not legal.
Wherein the server creating the identity credentials of each user comprises:
The server creates the data exchange name and the identity credential password of each user; wherein the data exchange name includes: the user pinyin initial character is abbreviated, and the identity credential password is a random 6-bit number, letter and/or special character.
Wherein the identity token request comprises: the client requests a resource name;
The server generating the identity token in a preset mode comprises the following steps:
And carrying out MD5 encryption on the client request resource name, the identity credential and the current request time character string to generate a 32-bit random code, storing the random code into a Redis cache database of the server, and setting failure time.
Wherein the server sending the identity token corresponding to the user identity credential to the client comprises:
and the server returns the identity token and the expiration time information corresponding to the user identity credential to the client in the form of JSON format.
Wherein the client sending a data exchange request to the server comprises:
and the client puts the requested data resource parameters and the identity token corresponding to the user identity certificate into an envelope through a RESTFul interface, and sends the data exchange request to the server through HTTPPOST.
Wherein the verifying, by the server, the validity of the data exchange request includes:
And the server compares the identity token carried in the data exchange request with the identity token with the identity credential stored in the Redis cache database, and if the Redis cache database exists and the identity token carried in the data exchange request has validity and has the authority of information exchange, the data exchange request is verified to be legal.
Another aspect of the present invention provides a data security exchange and sharing system based on a real world data platform, comprising: a server and a client; wherein:
the server is used for creating identity credentials of each user and storing the identity credentials of each user into a database;
The client is used for sending the user identity credentials to the server;
The server is also used for judging the validity of the user identity credentials; after judging that the user identity credential is legal, acquiring an identity token request corresponding to the user identity credential sent by the client, generating an identity token corresponding to the user identity credential in a preset mode, storing the identity token corresponding to the user identity credential in a Redis cache database, and sending the identity token corresponding to the user identity credential to the client;
the client is further configured to send a data exchange request to the server after obtaining the identity token corresponding to the user identity credential, where the data exchange request includes: a requested data resource parameter and the identity token;
the server is further configured to intercept the data exchange request, verify validity of the data exchange request, release the data exchange request if the data exchange request is legal, and reject the data exchange request if the data exchange request is not legal.
The server creates identity credentials of each user by:
The server creates the data exchange name and the identity credential password of each user; wherein the data exchange name includes: the user pinyin initial character is abbreviated, and the identity credential password is a random 6-bit number, letter and/or special character.
Wherein the identity token request comprises: the client requests a resource name;
the server generates an identity token in a preset mode by the following modes:
And carrying out MD5 encryption on the client request resource name, the identity credential and the current request time character string to generate a 32-bit random code, storing the random code into a Redis cache database of the server, and setting failure time.
The server sends the identity token corresponding to the user identity credential to the client in the following manner:
and the server returns the identity token and the expiration time information corresponding to the user identity credential to the client in the form of JSON format.
The client sends a data exchange request to the server by the following method:
and the client puts the requested data resource parameters and the identity token corresponding to the user identity certificate into an envelope through a RESTFul interface, and sends the data exchange request to the server through HTTPPOST.
The server verifies the validity of the data exchange request by the following method:
And the server compares the identity token carried in the data exchange request with the identity token with the identity credential stored in the Redis cache database, and if the Redis cache database exists and the identity token carried in the data exchange request has validity and has the authority of information exchange, the data exchange request is verified to be legal.
Therefore, the data security exchanging and sharing method and system based on the real world data platform can judge the identity legitimacy of different role parties such as data uploading and requesting through the server, and grant the authority with timeliness according to the verification result; for data transmission and interaction, the system transmits identity and data request commands to the server through a RESTful interface, so that data safety and normative sharing and exchange are guaranteed. The invention ensures that the real world data platform has high expandability and flexibility and provides a convenient and safe data exchange and sharing platform for users.
The invention establishes a system to manage and control the access of data from the source, and simultaneously uses RESTful as a Web service architecture to solve the problems of session attack and identity authentication in the transmission process, thereby greatly improving the safety exchange and sharing efficiency of data.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for secure exchange and sharing of data based on a real world data platform according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for secure exchange and sharing of data based on a real world data platform in accordance with an embodiment of the present invention;
FIG. 3 is a data exchange flow chart of a data security exchange and sharing method based on a real world data platform according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a data security exchanging and sharing system based on a real world data platform according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 shows a flowchart of a data security exchanging and sharing method based on a real world data platform provided by an embodiment of the present invention, fig. 2 shows a flowchart of a data security exchanging and sharing method based on a real world data platform provided by an embodiment of the present invention, fig. 3 shows a data exchanging flowchart of a data security exchanging and sharing method based on a real world data platform provided by an embodiment of the present invention, referring to fig. 1 to fig. 3, a data security exchanging and sharing method based on a real world data platform provided by an embodiment of the present invention includes:
s1, the server creates identity credentials of each user and stores the identity credentials of each user into a database.
The data security exchanging and sharing system based on the real world data platform comprises a client and a server. The server adopts a security authentication and data exchange device based on RESTful to ensure the security and the credibility of the data.
The client is an interface for the user to interact with the system, and the user can upload, download and share the data through the client. The client establishes secure connection with the server to ensure confidentiality and integrity in the data transmission process.
The server is a core component of the system and is responsible for processing requests initiated by clients and performing security authentication and data reception, processing, storage and release. The RESTful-based security authentication mechanism can effectively verify the identity and rights of the user, ensuring that only authorized users can access and manipulate data. Meanwhile, the data exchange device adopts an advanced encryption algorithm and a safety protocol, so that the safety of data in the transmission process is ensured.
The data security exchanging and sharing system based on the real world data platform can integrate various types of data, including structured data, unstructured data, multimedia data and the like. Through the system, users can conveniently share and exchange data, and cooperation and sharing among cross departments and cross institutions are promoted.
In addition, the system has high expandability and flexibility. The server can be horizontally expanded according to actual requirements so as to meet the requirements of large-scale data exchange and sharing. Meanwhile, the system also supports various data formats and interface standards, so that the system can be seamlessly integrated and interoperated with other systems.
Specifically, the server creates identity credentials for each user, the principal information of the identity credentials has a data exchange name and an identity credential password, the data exchange name and the identity credential password can be operated by a system program or a manner of manual distribution according to a specific system to be docked, and unique different identity credentials are generated for different exchange subjects.
As an optional implementation manner of the embodiment of the present invention, the server creating the identity credential of each user includes: the server creates the data exchange name and the identity credential password of each user; wherein the data exchange name includes: the first character of user's spelling is short for name, and the cipher of identity credential is random 6-bit number, letter and/or special character. Specifically, the generation mode of the system identity credential is as follows: the user is short for the first phonetic character of the docking system, the identity credential password is composed of random 6-bit numbers, letters and special characters, and no sequence is required among the numbers, the letters and the special characters. The identity credential can be guaranteed to be unique to the identity credential of different systems, identity tokens generated by different users can be screened, and the generated identity credential is stored in the database by the server and can be referred and called at any time. For example, the server may generate a user name of: adm, the password is: 12@ab-! And stores the password in its own database.
S2, the client sends the user identity credentials to the server.
Specifically, when the client sends a request to the server by using the user identity credential, the unique identity credential generated in the step S1 may be sent to the server in an http post manner, so that the server verifies the validity of the user identity credential. The input format of the client is the same as the format generated by the server, the user is the first character of the spelling of the docking system, the password is composed of random 6-bit numbers, letters and special characters.
S3, the server judges the validity of the user identity credentials.
Specifically, the server checks the format of the user name and the password to ensure that the user name and the password meet the preset format requirement, the server compares the password with the password stored in the database, if the password is successfully matched, the server indicates that the identity credential is legal, the server allows the user to access the system, otherwise, the access request of the user is refused, or the user is prompted to reenter. If the user is input with errors, the user is prompted to be in error, and if the password is input with errors, the user is prompted to be input again.
S4, after judging that the user identity credential is legal, the server acquires an identity token request corresponding to the user identity credential, which is sent by the client, generates an identity token corresponding to the user identity credential in a preset mode, stores the identity token corresponding to the user identity credential in a Redis cache database, and sends the identity token corresponding to the user identity credential to the client.
Specifically, after judging that the user identity credential is legal, the server may also obtain the information in the identity token request by receiving the identity token request sent by the client, or may also receive the identity token request sent by the client while the client sends the user identity credential, so long as the manner of obtaining the identity token request is within the protection scope of the present invention.
As an alternative implementation of the embodiment of the present invention, the identity token request includes: the client requests a resource name; the server generating the identity token in a preset mode comprises the following steps: and carrying out MD5 encryption on the resource name, the identity credential and the current request time character string requested by the client to generate a 32-bit random code, storing the random code into a Redis cache database of the server, and setting the expiration time.
Specifically, after verifying the validity of the user identity credential, the server may use languages such as JAVA, C, c++, etc. to generate the identity token through an identity token generation mechanism. The identity token of the present embodiment may use the JAVA programming language to generate the token through an identity token generation mechanism. The generation process comprises the following steps: and carrying out MD5 encryption on the resource name, the identity credential and the current request time character string requested by the client to generate a 32-bit random code, generating the random code, putting the random code into a Redis cache database of the server, setting cache key value expiration time, and utilizing a Redis cache expiration mechanism to realize periodic expiration of the token and finish timeliness setting of the token. For example, the user may enter a user name of: adm, the password is: 12@ab-! Through verification of the server, the server encrypts the requested resource (WeChat chat record), the identity credential (adm) and the current request time (2018/11/11, 11:11) through the JAVA language to generate 32-bit random codes and store the 32-bit random codes in a Redis cache database of the server, and sets the ageing time to 1h.
As an optional implementation manner of the embodiment of the present invention, the server sending the identity token corresponding to the user identity credential to the client includes: the server returns the identity token and the expiration time information corresponding to the user identity credential to the client in the form of JSON format.
Specifically, the server returns the generated identity token information and expiration time information to the client in the form of JSON format, and the server is used as a basis for accessing the server data resources, so that the information exchange can be applied only by the identity token and the timeliness thereof, and the timeliness token is different from the logged identity token.
S5, after the client acquires the identity token corresponding to the user identity credential, sending a data exchange request to the server, wherein the data exchange request comprises: the requested data resource parameters and the identity token.
As an optional implementation manner of the embodiment of the present invention, the sending, by the client, the data exchange request to the server includes: the client puts the requested data resource parameter and the identity token corresponding to the user identity credential into an envelope through RESTFul interfaces, and sends a data exchange request to the server through HTTPPOST.
Specifically, after the client obtains the identity token, the requested data resource parameter and the identity token are put into an envelope through the RESTFul interface, and the data resource parameter is used for searching data required by the requester in the resource catalog, and the identity token is used for verifying the validity of the query. The data exchange request may include identity information, age information, requested data information, and rights.
S6, the server intercepts the data exchange request, verifies the validity of the data exchange request, releases the data exchange request if the data exchange request is legal, and refuses the data exchange request if the data exchange request is not legal.
As an optional implementation manner of the embodiment of the present invention, the verifying, by the server, the validity of the data exchange request includes: the server compares the identity token carried in the data exchange request with the identity token with the identity credential stored in the Redis cache database, and if the Redis cache database exists and the identity token carried in the data exchange request has validity and has the authority of information exchange, the data exchange request is verified to be legal.
The server intercepts the data exchange request, performs legal request verification, compares the token carried by the request with the token with the Redis having the identity credentials, and releases the request if the Redis cache database exists and has the token validity and the information exchange authority, so as to obtain the request data resource, and refuses the request if the request data resource does not have the token validity.
In the above process, for the fixed client in the area, the server only needs to establish the identity credential once because the user information is the same or the user information is the same, and the first step can be skipped before each subsequent data exchange, the identity credential can be directly logged in, the identity token with timeliness can be applied, the identity information can be established in advance, and the complexity of the exchange process can be reduced.
If the identity token is logged in at the same time and within the timeliness time range of the identity token, when data exchange is requested again, the first four steps can be skipped, the identity token and the requested data information can be directly input, the server can check the authority of the identity information, timeliness and information again, and the request is released and the data exchange is carried out through the server. In the time that the identity token of the customer and user end is effective, the resource is requested again without obtaining the token again, and a new token needs to be obtained again after the token is invalid, the scheme not only ensures the safety of data exchange of the RESTFul interface, but also can reduce multiple requests and authentications of each data exchange, reduces the frequency of data authentication, and improves the safety of the data exchange process.
Therefore, according to the data security exchanging and sharing method based on the real world data platform, which is provided by the embodiment of the invention, the identity legitimacy of different role parties such as data uploading and requesting can be judged through the server, and the authority with timeliness is granted according to the verification result; for data transmission and interaction, the system transmits identity and data request commands to the server through a RESTful interface, so that data safety and normative sharing and exchange are guaranteed. The invention ensures that the real world data platform has high expandability and flexibility and provides a convenient and safe data exchange and sharing platform for users.
Fig. 4 is a schematic structural diagram of a data security exchanging and sharing system based on a real world data platform according to an embodiment of the present invention, where the data security exchanging and sharing system based on a real world data platform applies the above method, and the following only briefly describes the structure of the data security exchanging and sharing system based on a real world data platform, and other less things, please refer to the related description in the data security exchanging and sharing method based on a real world data platform, and referring to fig. 4, the data security exchanging and sharing system based on a real world data platform according to an embodiment of the present invention includes: a server and a client; wherein:
The server is used for creating the identity credentials of each user and storing the identity credentials of each user into the database;
The client is used for sending the user identity credentials to the server;
The server is also used for judging the legitimacy of the user identity credentials; after judging that the user identity credential is legal, acquiring an identity token request corresponding to the user identity credential, which is sent by a client, generating an identity token corresponding to the user identity credential in a preset mode, storing the identity token corresponding to the user identity credential in a Redis cache database, and sending the identity token corresponding to the user identity credential to the client;
The client is further configured to send a data exchange request to the server after obtaining an identity token corresponding to the user identity credential, where the data exchange request includes: the requested data resource parameters and identity tokens;
The server is also used for intercepting the data exchange request, verifying the validity of the data exchange request, and if the data exchange request is legal, releasing the data exchange request, otherwise rejecting the data exchange request.
As an alternative implementation of the embodiment of the present invention, the server creates identity credentials of each user by: the server creates the data exchange name and the password of each user; wherein the data exchange name includes: the first character of user's spelling is short for name, and the cipher is random 6-bit number, letter and/or special character.
As an alternative implementation of the embodiment of the present invention, the identity token request includes: the client requests a resource name; the server generates an identity token in a preset mode by the following modes: and carrying out MD5 encryption on the resource name, the identity credential and the current request time character string requested by the client to generate a 32-bit random code, storing the random code into a Redis cache database of the server, and setting the expiration time.
As an alternative implementation of the embodiment of the present invention, the server sends the identity token corresponding to the user identity credential to the client in the following manner: the server returns the identity token and the expiration time information corresponding to the user identity credential to the client in the form of JSON format.
As an alternative implementation of the embodiment of the present invention, the client sends the data exchange request to the server by: the client puts the requested data resource parameter and the identity token corresponding to the user identity credential into an envelope through RESTFul interfaces, and sends a data exchange request to the server through HTTPPOST.
As an alternative implementation of the embodiment of the present invention, the server verifies the validity of the data exchange request by: the server compares the identity token carried in the data exchange request with the identity token with the identity credential stored in the Redis cache database, and if the Redis cache database exists and the identity token carried in the data exchange request has validity and has the authority of information exchange, the data exchange request is verified to be legal.
Therefore, the data security exchanging and sharing system based on the real world data platform provided by the embodiment of the invention can judge the identity legitimacy of different role parties such as data uploading and requesting through the server, and grant the authority with timeliness according to the verification result; for data transmission and interaction, the system transmits identity and data request commands to the server through a RESTful interface, so that data safety and normative sharing and exchange are guaranteed. The invention ensures that the real world data platform has high expandability and flexibility and provides a convenient and safe data exchange and sharing platform for users.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (12)

1. A method for secure exchange and sharing of data based on a real world data platform, comprising:
the method comprises the steps that a server creates identity credentials of each user and stores the identity credentials of each user into a database;
the client sends the user identity credentials to the server;
the server judges the validity of the user identity credentials;
After judging that the user identity credential is legal, the server acquires an identity token request corresponding to the user identity credential, which is sent by the client, generates an identity token corresponding to the user identity credential in a preset mode, stores the identity token corresponding to the user identity credential in a Redis cache database, and sends the identity token corresponding to the user identity credential to the client;
After the client acquires the identity token corresponding to the user identity credential, sending a data exchange request to the server, wherein the data exchange request comprises: a requested data resource parameter and the identity token;
the server intercepts the data exchange request, verifies the validity of the data exchange request, releases the data exchange request if the data exchange request is legal, and refuses the data exchange request if the data exchange request is not legal.
2. The method of claim 1, wherein the server creating identity credentials for each user comprises:
The server creates the data exchange name and the identity credential password of each user; wherein the data exchange name includes: the user pinyin initial character is abbreviated, and the identity credential password is a random 6-bit number, letter and/or special character.
3. The method of claim 1, wherein the identity token request comprises: the client requests a resource name;
The server generating the identity token in a preset mode comprises the following steps:
And carrying out MD5 encryption on the client request resource name, the identity credential and the current request time character string to generate a 32-bit random code, storing the random code into a Redis cache database of the server, and setting failure time.
4. The method of claim 1, wherein the server sending the identity token corresponding to the user identity credential to the client comprises:
and the server returns the identity token and the expiration time information corresponding to the user identity credential to the client in the form of JSON format.
5. The method of claim 1, wherein the client sending a data exchange request to the server comprises:
and the client puts the requested data resource parameters and the identity token corresponding to the user identity certificate into an envelope through a RESTFul interface, and sends the data exchange request to the server through HTTPPOST.
6. The method of claim 1, wherein the server verifying the legitimacy of the data exchange request comprises:
And the server compares the identity token carried in the data exchange request with the identity token with the identity credential stored in the Redis cache database, and if the Redis cache database exists and the identity token carried in the data exchange request has validity and has the authority of information exchange, the data exchange request is verified to be legal.
7. A secure data exchange and sharing system based on a real world data platform, comprising: a server and a client; wherein:
the server is used for creating identity credentials of each user and storing the identity credentials of each user into a database;
The client is used for sending the user identity credentials to the server;
The server is also used for judging the validity of the user identity credentials; after judging that the user identity credential is legal, acquiring an identity token request corresponding to the user identity credential sent by the client, generating an identity token corresponding to the user identity credential in a preset mode, storing the identity token corresponding to the user identity credential in a Redis cache database, and sending the identity token corresponding to the user identity credential to the client;
the client is further configured to send a data exchange request to the server after obtaining the identity token corresponding to the user identity credential, where the data exchange request includes: a requested data resource parameter and the identity token;
the server is further configured to intercept the data exchange request, verify validity of the data exchange request, release the data exchange request if the data exchange request is legal, and reject the data exchange request if the data exchange request is not legal.
8. The system of claim 7, wherein the server creates the identity credentials of each user by:
The server creates the data exchange name and the identity credential password of each user; wherein the data exchange name includes: the user pinyin initial character is abbreviated, and the identity credential password is a random 6-bit number, letter and/or special character.
9. The system of claim 7, wherein the identity token request comprises: the client requests a resource name;
the server generates an identity token in a preset mode by the following modes:
And carrying out MD5 encryption on the client request resource name, the identity credential and the current request time character string to generate a 32-bit random code, storing the random code into a Redis cache database of the server, and setting failure time.
10. The system of claim 7, wherein the server sends the identity token corresponding to the user identity credential to the client by:
and the server returns the identity token and the expiration time information corresponding to the user identity credential to the client in the form of JSON format.
11. The system of claim 7, wherein the client sends the data exchange request to the server by:
and the client puts the requested data resource parameters and the identity token corresponding to the user identity certificate into an envelope through a RESTFul interface, and sends the data exchange request to the server through HTTPPOST.
12. The system of claim 7, wherein the server verifies the legitimacy of the data exchange request by:
And the server compares the identity token carried in the data exchange request with the identity token with the identity credential stored in the Redis cache database, and if the Redis cache database exists and the identity token carried in the data exchange request has validity and has the authority of information exchange, the data exchange request is verified to be legal.
CN202410233663.1A 2024-03-01 2024-03-01 Data security exchange and sharing method and system based on real world data platform Pending CN118041651A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410233663.1A CN118041651A (en) 2024-03-01 2024-03-01 Data security exchange and sharing method and system based on real world data platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410233663.1A CN118041651A (en) 2024-03-01 2024-03-01 Data security exchange and sharing method and system based on real world data platform

Publications (1)

Publication Number Publication Date
CN118041651A true CN118041651A (en) 2024-05-14

Family

ID=90998340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410233663.1A Pending CN118041651A (en) 2024-03-01 2024-03-01 Data security exchange and sharing method and system based on real world data platform

Country Status (1)

Country Link
CN (1) CN118041651A (en)

Similar Documents

Publication Publication Date Title
US9038138B2 (en) Device token protocol for authorization and persistent authentication shared across applications
US8955082B2 (en) Authenticating using cloud authentication
US8225385B2 (en) Multiple security token transactions
US20080168539A1 (en) Methods and systems for federated identity management
US20100077208A1 (en) Certificate based authentication for online services
JP6124687B2 (en) Image forming apparatus, server apparatus, information processing method, and program
US8196193B2 (en) Method for retrofitting password enabled computer software with a redirection user authentication method
EP2149102B1 (en) Request-specific authentication for accessing web service resources
CN108964885B (en) Authentication method, device, system and storage medium
JP6929181B2 (en) Devices and their control methods and programs
CN113316783A (en) Two-factor identity authentication using a combination of active directory and one-time password token
US11863677B2 (en) Security token validation
US9065828B2 (en) System for delegation of authority, access management service system, medium, and method for controlling the system for delegation of authority
US20130031359A1 (en) Method and system for modular authentication and session management
US6785729B1 (en) System and method for authorizing a network user as entitled to access a computing node wherein authenticated certificate received from the user is mapped into the user identification and the user is presented with the opprtunity to logon to the computing node only after the verification is successful
JP6141041B2 (en) Information processing apparatus, program, and control method
WO2022121461A1 (en) Method, apparatus and device for constructing token for cloud platform resource access control
US10681023B2 (en) Self-service portal for provisioning passwordless access
US20150149530A1 (en) Redirecting Access Requests to an Authorized Server System for a Cloud Service
WO2008051792A2 (en) Data file access control
CN111147525A (en) Authentication method, system, server and storage medium based on API gateway
US8875244B1 (en) Method and apparatus for authenticating a user using dynamic client-side storage values
JP2004287784A (en) Access control device and method
KR101803535B1 (en) Single Sign-On Service Authentication Method Using One-Time-Token
US7308578B2 (en) Method and apparatus for authorizing execution for applications in a data processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination