CN105718817A - Data safety exchange system and method based on authority mapping - Google Patents

Data safety exchange system and method based on authority mapping Download PDF

Info

Publication number
CN105718817A
CN105718817A CN201610048421.0A CN201610048421A CN105718817A CN 105718817 A CN105718817 A CN 105718817A CN 201610048421 A CN201610048421 A CN 201610048421A CN 105718817 A CN105718817 A CN 105718817A
Authority
CN
China
Prior art keywords
data
service request
authority
business
management module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610048421.0A
Other languages
Chinese (zh)
Other versions
CN105718817B (en
Inventor
丁帅
杨善林
金行
潘禹辰
王泽源
李叶青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei University of Technology
Original Assignee
Hefei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei University of Technology filed Critical Hefei University of Technology
Priority to CN201610048421.0A priority Critical patent/CN105718817B/en
Publication of CN105718817A publication Critical patent/CN105718817A/en
Application granted granted Critical
Publication of CN105718817B publication Critical patent/CN105718817B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data safety exchange system and method based on authority mapping.The data safety exchange system and method based on authority mapping are applied in a network composed of a plurality of service requesters.The data safety exchange system based on authority mapping is characterized in that the safety exchange system comprises a network port management module, a data management module and a center database.Operability, safety and expansibility of the data safety exchange system can be improved, and therefore diversified service operation and good user experience can be provided for providers.

Description

A kind of data security exchange system based on permissions mapping and method
Technical field
The present invention relates to a kind of data security exchange system based on permissions mapping and method.
Background technology
Along with development and the application of information technology, the information age just the living habit of people with unprecedented rapid change, meets the material and cultural needs that people are growing.Living as people minimum administrative dividing unit---the community lived, its administration way and service system are the cells of social management, are embody state treatment system and the modern importance of Governance Ability.
In informatization process, information system that all departments set up according to own situation or business application system, have employed different technologies and architecture, thus defining numerous information islands.Community development needs to realize these a large amount of diverse locations, the sharing and mutually access of different-format information, and makes community resource effectively integrate, and then integrated relevant business information, provides unified and consistent service for enterprise, the public and internal government system.
Nowadays, data security exchange system exploitation in application be still in the budding stage, existing the platform degree of coupling low, poor stability, function are comparatively single, service request business's interface can not be provided effectively and management interface effectively is provided, it is unfavorable for the effectively mutual of community resource, it is also difficult to support the handy service for the people, commerce services third party convenience-for-people community data interaction process effectively.
Summary of the invention
The present invention is for avoiding the deficiencies in the prior art part, a kind of data security exchange system based on permissions mapping and method are proposed, pay close attention to safety and the convenience of data exchange, to the operability of data security exchange system, safety and expansibility can be improved, thus provide diversified service operation and good Consumer's Experience for provider.
The present invention solves that technical problem adopts the following technical scheme that
A kind of data security exchange system based on permissions mapping of the present invention, is be applied to be asked, in the network that business forms, to be characterized in by several services, and described security exchange system includes: network interface management module, data management module and central database;
Described network interface management module is for realizing the response of service request business, and services, according to described, the network interface that the requested service distribution asking business is different, reprocesses the requested service of described service request business;
Described data management module is for realizing the mutual of data, and described service request business and central database are carried out control of authority, to guarantee the safety that data exchange;
Described central database is used for storing described data, and described data include: the authority of the essential information of business, authority information, exchange data essential information, exchange data is asked in service.
The feature of data security exchange system of the present invention lies also in:
Network interface management module includes: service provider's authorization interface, business datum input interface and business datum output interface;
Described central database comprises: exchange tables of data ExData, service provider information table UserInfo and service provider's authority--data permission table UsExData;
Described exchange tables of data ExData is for storing exchange data essential information and the authority of exchange data;
Described service provider information table UserInfo is for storing the essential information of service request quotient data;
Described service provider authority--data permission table UsExData is for storing the mapping relations of data permission and service request business's authority.
The mapping relations of described data permission and service provider's authority represent: the service request treatable maximum data authority of business with service request business authority flag1 is flag.
A kind of feature based on the data secure exchange method of permissions mapping of the present invention is to be applied in data security exchange system, and carries out as follows:
Step 1: the data template definition of dissimilar interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmitting procedure;
Step 1.2, the business asking business requested according to service are different, distribute different style interfaces, build different XML data templates according to different style interfaces, so that service request business can utilize different XML data templates to transmit data;
Step 2: the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to described authentication services, and distribution service provider authorization interface gives requested service request business;
Step 2.3, described service request business send corresponding XML document according to the XML data template in described service provider authorization interface to data management module;
Step 2.4, data management module accept XML document and resolve, thus distributing to the service request corresponding authority of business, and are stored in service provider information table UserInfo by the authority information that essential information and the service request business of service request business distribute;
Step 3: the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the authority of service request business, if described service request business has authority, then network interface management module distributes Data Input Interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes Data Input Interface to service request business;
Step 3.2, described service request business send corresponding XML document according to the XML data template in described Data Input Interface to data management module;
The XML document received is stored in buffer and resolves by step 3.3, data management module, checks service provider's authority--data permission table UsExData simultaneously, thus adding authority to the exchange data essential information that described service request business to input;And the authority added and exchange data essential information thereof are stored in described exchange tables of data ExData;
Step 3.4, described network interface management module return " inputting successfully " information to described service request business;
Step 4, service ask the data outgoing traffic request of business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's authority, if described service request business has authority, then network interface management module distributes data output interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes data output interface to service request business;
Step 4.3, described service request business send corresponding XML document according to the XML data template in described data output interface to data management module;
The XML document received is stored in buffer and resolves by step 4.4, data management module, checks service provider's authority--data permission table UsExData simultaneously;So that it is determined that whether described service request business has the authority of the exchange data essential information to export;If having, then perform step 4.5;Otherwise, described network interface management module returns " not having authority " information to described service request business;
Step 4.5, described network interface management module, according to exchange tables of data ExData, utilize another XML data template generation XML document in described data output interface and are stored in described buffer;XML document is sent to service request business, thus completing the data outgoing traffic of service request business then through described buffer.
Compared with the prior art, the present invention has the beneficial effect that:
1, the present invention is formed data security exchange system by network interface management module, data management module and central database, the service request of its network interface management module reply service request business carries out processing and response, centre data library storage service request quotient data data and exchange data, data management module is the intermediate connecting layer of related network interface administration module and central database, there is provided answer service request to consult and request data needed for the business asked for network interface, centered by data base carry out the input-output operation of data;Native system podium level aggregated(particle) structure is clear, functional independence and have good data transmission mechanism between system.
2, the network interface management module of the present invention is for realizing the response of service request business, and services, according to described, the network interface that the requested service distribution asking business is different;The data sent back according to the XML data template of interface for service request business resolve, and the permissions data called in utilizing data management module from the central database, carry out service provider's authority, the judgement of exchange data permission, final process data input, outgoing traffic;Thus improve intelligent, availability, expansion and the operability of data security exchange system, meet the various demand of user.
3, data management of the present invention management module is for conducting interviews to the data of central database and process, including the request of data of reply network interface management module;For security requirement, service is asked that business and exchange data carry out partition of the level and define, and service is asked that business's authority and exchange data permission link;Thus having ensured Information Security, eliminate owing to service request business is to the leaking data hidden danger involved by unconfined input, output data.
4, central database of the present invention is mapped form by exchanging data, service request quotient data and exchange data-service provider's data;Data management module is allowed to carry out the increase of data, deletion, amendment and inquiry in data base;Exchange data, service request quotient data and exchange data-service provider's data map and are stored separately, and make database redundancy degree little as far as possible, ensure that data high efficiency can increase, delete, revise and inquire about and committed memory is little as far as possible.
5, the present invention establishes deciding grade and level encryption mechanism data permission and service request business's authority is divided, and the service request data less than or equal to data permission flag corresponding to business authority flag1 can be carried out data input, outgoing traffic operation by the service request business that service request business's authority is flag1;For strengthening the safety in data storage, transmission and access process, and ensure the safety of service data.
Accompanying drawing explanation
Fig. 1 is overall structure figure of the present invention;
The network interface that Fig. 2 is the present invention comprises dissimilar interface displaying figure;
Fig. 3 is the network interface distribution authorization interface flow chart of the present invention;
The service that Fig. 4 is the present invention asks to consult and request to seek data input request flow chart;
Fig. 5 is service request business's request data output request flow chart of the present invention.
Detailed description of the invention
During this example is implemented, a kind of data security exchange system based on permissions mapping, being applied in the network being made up of several services request business, be integrated with third party's data, this security exchange system includes: network interface management module, data management module and central database;
Network interface management module is for realizing the response of service request business, and the network interface different according to servicing the requested service distribution asking business, and the requested service of business is asked in reprocessing service;
As shown in Figure 1: network interface management module includes: service provider's authorization interface, business datum input interface and business datum output interface;
Data management module is for realizing the mutual of data, and service request business and central database are carried out control of authority, to guarantee the safety that data exchange;
Central database is used for storing data, and data include: the authority of the essential information of business, authority information, exchange data essential information, exchange data is asked in service.
Central database comprises: exchange tables of data ExData, service provider information table UserInfo and service provider's authority--data permission table UsExData;Exchange tables of data ExData is used for storing the service data of exchange, including: the authority of exchange data essential information and exchange data;Such as, data major key, data essential information, Data Source, data permission flag;
Service provider information table UserInfo is for storing the service request quotient data of application business, for instance, the essential information of service request quotient data;Comprise service request business's major key, service request business's essential information, service request business authority flag1;
Service provider's authority--data permission table UsExData is for storing the mapping relations of data permission and service request business's authority, comprise data permission flag and service request business authority flag1, represent: the service request treatable maximum data authority of business with service request business authority flag1 is flag.
A kind of data secure exchange method based on permissions mapping is to be applied in the security exchange system of data, and carries out as follows:
Step 1: the data template definition of dissimilar interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmitting procedure;
Step 1.2, the business asking business requested according to service are different, distribute different style interfaces, build different XML data templates according to different style interfaces, so that service request business can utilize different XML data templates to transmit data;
Step 2: as shown in Figure 2 and Figure 3, the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to authentication services, and distribution service provider authorization interface gives requested service request business;
Step 2.3, service request business send corresponding XML document according to the XML data template in service provider's authorization interface to data management module;
Step 2.4, data management module accept XML document and resolve, thus distributing to the service request corresponding authority of business, and are stored in service provider information table UserInfo by the authority information that essential information and the service request business of service request business distribute;
Step 3: as shown in Figure 4, the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
If the authority service request business that step 3.2, central database check service request business has authority, then network interface management module distributes Data Input Interface to service request business;If service request business does not have authority, then network interface management module refusal distributes Data Input Interface to service request business;
In checking authority process, service is asked business authority flag1 to pass to network interface management module by central database, and network interface management module judges;If flag1=00** or 01**, then it is assumed that have data input authority.If flag1=11**, then it is assumed that do not have data input authority.
Step 3.2, service ask business according to the XML data template completion data in Data Input Interface, and send corresponding XML document to data management module;
The XML document received is stored in buffer and resolves by step 3.3, data management module, checks service provider's authority--data permission table UsExData simultaneously, thus adding authority to the service exchange data essential information that request business to input;And the authority added and exchange data essential information thereof are stored in exchange tables of data ExData;
Network interface management module sends exchange data to data management module, when adding authority, service is asked business authority flag1 to pass to data management module by central database, check service request business authority flag1 latter two, according to looking into service provider's authority--the mapping relations of data permission table UsExData, finding the data permission flag that service request business is corresponding, it is flag that data are added authority.Data are stored in central database by data management module.
Step 3.4, network interface management module return " inputting successfully " information to service request business;
Step 4, show such as Fig. 5, the data outgoing traffic request of service request business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's authority, if service request business has authority, then network interface management module distributes data output interface to service request business;If service request business does not have authority, then network interface management module refusal distributes data output interface to service request business;
In checking authority process, service is asked business authority flag1 to pass to network interface management module by central database, and network interface management module judges;If flag1=11** or 01**, then it is assumed that have data input authority.If flag=00**, then it is assumed that do not have data input authority.
Step 4.3, service request business send corresponding XML document according to the XML data template in data output interface to data management module;
The XML document received is stored in buffer and resolves by step 4.4, data management module, checks service provider's authority--data permission table UsExData simultaneously;So that it is determined that whether service request business has the authority of the exchange data essential information to export;If having, then perform step 4.5;Otherwise, network interface management module returns " not having authority " information to service request business;
Network interface management module sends exchange data to data management module, when adding authority, service is asked business authority flag1 to pass to data management module by central database, check service request business authority flag1 latter two, according to looking into service provider's authority--the mapping relations of data permission table UsExData, find the data permission flag that service request business is corresponding.Then judge whether the exchange data permission that this service asks business requested should service under the data permission flag that request business is corresponding, if, then it is assumed that have permission, otherwise it is assumed that lack of competence.
Step 4.5, network interface management module, according to exchange tables of data ExData, utilize another XML data template generation XML document in data output interface and are stored in buffer;XML document is sent to service request business, thus completing the data outgoing traffic of service request business then through buffer.
Wherein, in central database, service request business's authority and exchange data permission memory mechanism are:
1, in service request business table UserInfo, service request business's authority is stored as four figures: * * * *.Front two is stored as 00,01,11.00 represents this service request business data input authority, and 11 represent this service request business has data output authority, not only 01 represents this service request business has data input authority but also have data output authority;Latter two are stored as decimal number, represent the data manipulation authority that this service request business has, and numeral is more big, has authority more high.
2, in exchange data ExData, exchange data permission is stored as * *, and for decimal number, numeral is more big, has authority more high.
3, service provider's authority--data permission table UsExData stores and has: latter two of service request business's authority, exchange data permission.The exchange data permission of one level of correspondence of each service request business's authority levels, this exchange data permission represents the manageable highest authority data of the service request business of its corresponding level.

Claims (4)

1. based on a data security exchange system for permissions mapping, being be applied to be asked, in the network that business forms, to it is characterized in that by several services, described security exchange system includes: network interface management module, data management module and central database;
Described network interface management module is for realizing the response of service request business, and services, according to described, the network interface that the requested service distribution asking business is different, reprocesses the requested service of described service request business;
Described data management module is for realizing the mutual of data, and described service request business and central database are carried out control of authority, to guarantee the safety that data exchange;
Described central database is used for storing described data, and described data include: the authority of the essential information of business, authority information, exchange data essential information, exchange data is asked in service.
2. data security exchange system according to claim 1, is characterized in that,
Network interface management module includes: service provider's authorization interface, business datum input interface and business datum output interface;
Described central database comprises: exchange tables of data ExData, service provider information table UserInfo and service provider's authority--data permission table UsExData;
Described exchange tables of data ExData is for storing exchange data essential information and the authority of exchange data;
Described service provider information table UserInfo is for storing the essential information of service request quotient data;
Described service provider authority--data permission table UsExData is for storing the mapping relations of data permission and service request business's authority.
3. data security exchange system according to claim 2, is characterized in that, the mapping relations of described data permission and service provider's authority represent: the service request treatable maximum data authority of business with service request business authority flag1 is flag.
4., based on a data secure exchange method for permissions mapping, it is characterized in that being applied in data security exchange system, and carry out as follows:
Step 1: the data template definition of dissimilar interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmitting procedure;
Step 1.2, the business asking business requested according to service are different, distribute different style interfaces, build different XML data templates according to different style interfaces, so that service request business can utilize different XML data templates to transmit data;
Step 2: the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to described authentication services, and distribution service provider authorization interface gives requested service request business;
Step 2.3, described service request business send corresponding XML document according to the XML data template in described service provider authorization interface to data management module;
Step 2.4, data management module accept XML document and resolve, thus distributing to the service request corresponding authority of business, and are stored in service provider information table UserInfo by the authority information that essential information and the service request business of service request business distribute;
Step 3: the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the authority of service request business, if described service request business has authority, then network interface management module distributes Data Input Interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes Data Input Interface to service request business;
Step 3.2, described service request business send corresponding XML document according to the XML data template in described Data Input Interface to data management module;
The XML document received is stored in buffer and resolves by step 3.3, data management module, checks service provider's authority--data permission table UsExData simultaneously, thus adding authority to the exchange data essential information that described service request business to input;And the authority added and exchange data essential information thereof are stored in described exchange tables of data ExData;
Step 3.4, described network interface management module return " inputting successfully " information to described service request business;
Step 4, service ask the data outgoing traffic request of business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's authority, if described service request business has authority, then network interface management module distributes data output interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes data output interface to service request business;
Step 4.3, described service request business send corresponding XML document according to the XML data template in described data output interface to data management module;
The XML document received is stored in buffer and resolves by step 4.4, data management module, checks service provider's authority--data permission table UsExData simultaneously;So that it is determined that whether described service request business has the authority of the exchange data essential information to export;If having, then perform step 4.5;Otherwise, described network interface management module returns " not having authority " information to described service request business;
Step 4.5, described network interface management module, according to exchange tables of data ExData, utilize another XML data template generation XML document in described data output interface and are stored in described buffer;XML document is sent to service request business, thus completing the data outgoing traffic of service request business then through described buffer.
CN201610048421.0A 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping Active CN105718817B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610048421.0A CN105718817B (en) 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610048421.0A CN105718817B (en) 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping

Publications (2)

Publication Number Publication Date
CN105718817A true CN105718817A (en) 2016-06-29
CN105718817B CN105718817B (en) 2018-05-18

Family

ID=56154888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610048421.0A Active CN105718817B (en) 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping

Country Status (1)

Country Link
CN (1) CN105718817B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494647A (en) * 2008-01-21 2009-07-29 日本电气株式会社 Content asset management system, method and control program
CN101639882A (en) * 2009-08-28 2010-02-03 华中科技大学 Database security system based on storage encryption
US20100333172A1 (en) * 2008-04-25 2010-12-30 Wu Jiang Method, apparatus and system for monitoring database security
CN102063431A (en) * 2009-11-13 2011-05-18 郭承运 Information database system and access control method thereof
CN102968599A (en) * 2012-10-25 2013-03-13 北京邮电大学 User-defined access control system and method based on resource publisher
CN103366129A (en) * 2012-03-26 2013-10-23 英顺源(重庆)科技有限公司 Data file control and management system and method base on network
CN104348854A (en) * 2013-07-30 2015-02-11 李娜 Networked multi-access media data transmission system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494647A (en) * 2008-01-21 2009-07-29 日本电气株式会社 Content asset management system, method and control program
US20100333172A1 (en) * 2008-04-25 2010-12-30 Wu Jiang Method, apparatus and system for monitoring database security
CN101639882A (en) * 2009-08-28 2010-02-03 华中科技大学 Database security system based on storage encryption
CN102063431A (en) * 2009-11-13 2011-05-18 郭承运 Information database system and access control method thereof
CN103366129A (en) * 2012-03-26 2013-10-23 英顺源(重庆)科技有限公司 Data file control and management system and method base on network
CN102968599A (en) * 2012-10-25 2013-03-13 北京邮电大学 User-defined access control system and method based on resource publisher
CN104348854A (en) * 2013-07-30 2015-02-11 李娜 Networked multi-access media data transmission system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
胥斌: "基于物联网的信息共享平台设计", 《中国优秀硕士学位论文全文数据库》 *
邵桂伟: "基于角色的信息网格访问控制的研究", 《中国优秀硕士学位论文全文数据库》 *

Also Published As

Publication number Publication date
CN105718817B (en) 2018-05-18

Similar Documents

Publication Publication Date Title
CN109522735B (en) Data permission verification method and device based on intelligent contract
US9047462B2 (en) Computer account management system and realizing method thereof
US8381306B2 (en) Translating role-based access control policy to resource authorization policy
CN102947797B (en) The online service using directory feature extending transversely accesses and controls
US20240184775A1 (en) Blockchain database management system
CN104766024A (en) Cloud platform based medical system case information storage and calling method
CN101977184B (en) Multi-identity selection landing device and service system
CN112702402A (en) System, method, device, processor and storage medium for realizing government affair information resource sharing and exchange based on block chain technology
CN102073817B (en) Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model
SG181548A1 (en) Delegated and restricted asset-based permissions management for co-location facilities
CN106534199A (en) Distributed system authentication and permission management platform based on XACML and SAML under big data environment
CN111428257B (en) System and method for opening database metadata through automatic approval
CN112835977A (en) Database management method and system based on block chain
CN114285867A (en) Air-railway combined transport data sharing method and system based on alliance chain and attribute encryption
CN111832001B (en) Identity management method and identity management system based on block chain
CN109800234A (en) Service platform database system, upgrade method, equipment and storage medium
CN105653962B (en) A kind of user role access authorization for resource model management method of object-oriented
Liu et al. A consortium medical blockchain data storage and sharing model based on ipfs
CN113765925B (en) Improved method based on OSAC and PERM access control model
CN113127927B (en) Attribute reconstruction encryption method and system for license chain data sharing and supervision
CN112261109B (en) Multi-airport time slot exchange system and method based on block chain
CN105718817A (en) Data safety exchange system and method based on authority mapping
CN116318931A (en) Attribute mapping method and system based on cross-domain access control
KR100673329B1 (en) User Role / Permission Setting System using Certificate in Grid Environment and Its Method
CN113420083B (en) System with heterogeneous parallel block chain structure of extensible distributed ledger

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant