CN105718817A - Data safety exchange system and method based on authority mapping - Google Patents
Data safety exchange system and method based on authority mapping Download PDFInfo
- Publication number
- CN105718817A CN105718817A CN201610048421.0A CN201610048421A CN105718817A CN 105718817 A CN105718817 A CN 105718817A CN 201610048421 A CN201610048421 A CN 201610048421A CN 105718817 A CN105718817 A CN 105718817A
- Authority
- CN
- China
- Prior art keywords
- data
- service request
- authority
- business
- management module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data safety exchange system and method based on authority mapping.The data safety exchange system and method based on authority mapping are applied in a network composed of a plurality of service requesters.The data safety exchange system based on authority mapping is characterized in that the safety exchange system comprises a network port management module, a data management module and a center database.Operability, safety and expansibility of the data safety exchange system can be improved, and therefore diversified service operation and good user experience can be provided for providers.
Description
Technical field
The present invention relates to a kind of data security exchange system based on permissions mapping and method.
Background technology
Along with development and the application of information technology, the information age just the living habit of people with unprecedented rapid change, meets the material and cultural needs that people are growing.Living as people minimum administrative dividing unit---the community lived, its administration way and service system are the cells of social management, are embody state treatment system and the modern importance of Governance Ability.
In informatization process, information system that all departments set up according to own situation or business application system, have employed different technologies and architecture, thus defining numerous information islands.Community development needs to realize these a large amount of diverse locations, the sharing and mutually access of different-format information, and makes community resource effectively integrate, and then integrated relevant business information, provides unified and consistent service for enterprise, the public and internal government system.
Nowadays, data security exchange system exploitation in application be still in the budding stage, existing the platform degree of coupling low, poor stability, function are comparatively single, service request business's interface can not be provided effectively and management interface effectively is provided, it is unfavorable for the effectively mutual of community resource, it is also difficult to support the handy service for the people, commerce services third party convenience-for-people community data interaction process effectively.
Summary of the invention
The present invention is for avoiding the deficiencies in the prior art part, a kind of data security exchange system based on permissions mapping and method are proposed, pay close attention to safety and the convenience of data exchange, to the operability of data security exchange system, safety and expansibility can be improved, thus provide diversified service operation and good Consumer's Experience for provider.
The present invention solves that technical problem adopts the following technical scheme that
A kind of data security exchange system based on permissions mapping of the present invention, is be applied to be asked, in the network that business forms, to be characterized in by several services, and described security exchange system includes: network interface management module, data management module and central database;
Described network interface management module is for realizing the response of service request business, and services, according to described, the network interface that the requested service distribution asking business is different, reprocesses the requested service of described service request business;
Described data management module is for realizing the mutual of data, and described service request business and central database are carried out control of authority, to guarantee the safety that data exchange;
Described central database is used for storing described data, and described data include: the authority of the essential information of business, authority information, exchange data essential information, exchange data is asked in service.
The feature of data security exchange system of the present invention lies also in:
Network interface management module includes: service provider's authorization interface, business datum input interface and business datum output interface;
Described central database comprises: exchange tables of data ExData, service provider information table UserInfo and service provider's authority--data permission table UsExData;
Described exchange tables of data ExData is for storing exchange data essential information and the authority of exchange data;
Described service provider information table UserInfo is for storing the essential information of service request quotient data;
Described service provider authority--data permission table UsExData is for storing the mapping relations of data permission and service request business's authority.
The mapping relations of described data permission and service provider's authority represent: the service request treatable maximum data authority of business with service request business authority flag1 is flag.
A kind of feature based on the data secure exchange method of permissions mapping of the present invention is to be applied in data security exchange system, and carries out as follows:
Step 1: the data template definition of dissimilar interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmitting procedure;
Step 1.2, the business asking business requested according to service are different, distribute different style interfaces, build different XML data templates according to different style interfaces, so that service request business can utilize different XML data templates to transmit data;
Step 2: the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to described authentication services, and distribution service provider authorization interface gives requested service request business;
Step 2.3, described service request business send corresponding XML document according to the XML data template in described service provider authorization interface to data management module;
Step 2.4, data management module accept XML document and resolve, thus distributing to the service request corresponding authority of business, and are stored in service provider information table UserInfo by the authority information that essential information and the service request business of service request business distribute;
Step 3: the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the authority of service request business, if described service request business has authority, then network interface management module distributes Data Input Interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes Data Input Interface to service request business;
Step 3.2, described service request business send corresponding XML document according to the XML data template in described Data Input Interface to data management module;
The XML document received is stored in buffer and resolves by step 3.3, data management module, checks service provider's authority--data permission table UsExData simultaneously, thus adding authority to the exchange data essential information that described service request business to input;And the authority added and exchange data essential information thereof are stored in described exchange tables of data ExData;
Step 3.4, described network interface management module return " inputting successfully " information to described service request business;
Step 4, service ask the data outgoing traffic request of business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's authority, if described service request business has authority, then network interface management module distributes data output interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes data output interface to service request business;
Step 4.3, described service request business send corresponding XML document according to the XML data template in described data output interface to data management module;
The XML document received is stored in buffer and resolves by step 4.4, data management module, checks service provider's authority--data permission table UsExData simultaneously;So that it is determined that whether described service request business has the authority of the exchange data essential information to export;If having, then perform step 4.5;Otherwise, described network interface management module returns " not having authority " information to described service request business;
Step 4.5, described network interface management module, according to exchange tables of data ExData, utilize another XML data template generation XML document in described data output interface and are stored in described buffer;XML document is sent to service request business, thus completing the data outgoing traffic of service request business then through described buffer.
Compared with the prior art, the present invention has the beneficial effect that:
1, the present invention is formed data security exchange system by network interface management module, data management module and central database, the service request of its network interface management module reply service request business carries out processing and response, centre data library storage service request quotient data data and exchange data, data management module is the intermediate connecting layer of related network interface administration module and central database, there is provided answer service request to consult and request data needed for the business asked for network interface, centered by data base carry out the input-output operation of data;Native system podium level aggregated(particle) structure is clear, functional independence and have good data transmission mechanism between system.
2, the network interface management module of the present invention is for realizing the response of service request business, and services, according to described, the network interface that the requested service distribution asking business is different;The data sent back according to the XML data template of interface for service request business resolve, and the permissions data called in utilizing data management module from the central database, carry out service provider's authority, the judgement of exchange data permission, final process data input, outgoing traffic;Thus improve intelligent, availability, expansion and the operability of data security exchange system, meet the various demand of user.
3, data management of the present invention management module is for conducting interviews to the data of central database and process, including the request of data of reply network interface management module;For security requirement, service is asked that business and exchange data carry out partition of the level and define, and service is asked that business's authority and exchange data permission link;Thus having ensured Information Security, eliminate owing to service request business is to the leaking data hidden danger involved by unconfined input, output data.
4, central database of the present invention is mapped form by exchanging data, service request quotient data and exchange data-service provider's data;Data management module is allowed to carry out the increase of data, deletion, amendment and inquiry in data base;Exchange data, service request quotient data and exchange data-service provider's data map and are stored separately, and make database redundancy degree little as far as possible, ensure that data high efficiency can increase, delete, revise and inquire about and committed memory is little as far as possible.
5, the present invention establishes deciding grade and level encryption mechanism data permission and service request business's authority is divided, and the service request data less than or equal to data permission flag corresponding to business authority flag1 can be carried out data input, outgoing traffic operation by the service request business that service request business's authority is flag1;For strengthening the safety in data storage, transmission and access process, and ensure the safety of service data.
Accompanying drawing explanation
Fig. 1 is overall structure figure of the present invention;
The network interface that Fig. 2 is the present invention comprises dissimilar interface displaying figure;
Fig. 3 is the network interface distribution authorization interface flow chart of the present invention;
The service that Fig. 4 is the present invention asks to consult and request to seek data input request flow chart;
Fig. 5 is service request business's request data output request flow chart of the present invention.
Detailed description of the invention
During this example is implemented, a kind of data security exchange system based on permissions mapping, being applied in the network being made up of several services request business, be integrated with third party's data, this security exchange system includes: network interface management module, data management module and central database;
Network interface management module is for realizing the response of service request business, and the network interface different according to servicing the requested service distribution asking business, and the requested service of business is asked in reprocessing service;
As shown in Figure 1: network interface management module includes: service provider's authorization interface, business datum input interface and business datum output interface;
Data management module is for realizing the mutual of data, and service request business and central database are carried out control of authority, to guarantee the safety that data exchange;
Central database is used for storing data, and data include: the authority of the essential information of business, authority information, exchange data essential information, exchange data is asked in service.
Central database comprises: exchange tables of data ExData, service provider information table UserInfo and service provider's authority--data permission table UsExData;Exchange tables of data ExData is used for storing the service data of exchange, including: the authority of exchange data essential information and exchange data;Such as, data major key, data essential information, Data Source, data permission flag;
Service provider information table UserInfo is for storing the service request quotient data of application business, for instance, the essential information of service request quotient data;Comprise service request business's major key, service request business's essential information, service request business authority flag1;
Service provider's authority--data permission table UsExData is for storing the mapping relations of data permission and service request business's authority, comprise data permission flag and service request business authority flag1, represent: the service request treatable maximum data authority of business with service request business authority flag1 is flag.
A kind of data secure exchange method based on permissions mapping is to be applied in the security exchange system of data, and carries out as follows:
Step 1: the data template definition of dissimilar interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmitting procedure;
Step 1.2, the business asking business requested according to service are different, distribute different style interfaces, build different XML data templates according to different style interfaces, so that service request business can utilize different XML data templates to transmit data;
Step 2: as shown in Figure 2 and Figure 3, the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to authentication services, and distribution service provider authorization interface gives requested service request business;
Step 2.3, service request business send corresponding XML document according to the XML data template in service provider's authorization interface to data management module;
Step 2.4, data management module accept XML document and resolve, thus distributing to the service request corresponding authority of business, and are stored in service provider information table UserInfo by the authority information that essential information and the service request business of service request business distribute;
Step 3: as shown in Figure 4, the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
If the authority service request business that step 3.2, central database check service request business has authority, then network interface management module distributes Data Input Interface to service request business;If service request business does not have authority, then network interface management module refusal distributes Data Input Interface to service request business;
In checking authority process, service is asked business authority flag1 to pass to network interface management module by central database, and network interface management module judges;If flag1=00** or 01**, then it is assumed that have data input authority.If flag1=11**, then it is assumed that do not have data input authority.
Step 3.2, service ask business according to the XML data template completion data in Data Input Interface, and send corresponding XML document to data management module;
The XML document received is stored in buffer and resolves by step 3.3, data management module, checks service provider's authority--data permission table UsExData simultaneously, thus adding authority to the service exchange data essential information that request business to input;And the authority added and exchange data essential information thereof are stored in exchange tables of data ExData;
Network interface management module sends exchange data to data management module, when adding authority, service is asked business authority flag1 to pass to data management module by central database, check service request business authority flag1 latter two, according to looking into service provider's authority--the mapping relations of data permission table UsExData, finding the data permission flag that service request business is corresponding, it is flag that data are added authority.Data are stored in central database by data management module.
Step 3.4, network interface management module return " inputting successfully " information to service request business;
Step 4, show such as Fig. 5, the data outgoing traffic request of service request business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's authority, if service request business has authority, then network interface management module distributes data output interface to service request business;If service request business does not have authority, then network interface management module refusal distributes data output interface to service request business;
In checking authority process, service is asked business authority flag1 to pass to network interface management module by central database, and network interface management module judges;If flag1=11** or 01**, then it is assumed that have data input authority.If flag=00**, then it is assumed that do not have data input authority.
Step 4.3, service request business send corresponding XML document according to the XML data template in data output interface to data management module;
The XML document received is stored in buffer and resolves by step 4.4, data management module, checks service provider's authority--data permission table UsExData simultaneously;So that it is determined that whether service request business has the authority of the exchange data essential information to export;If having, then perform step 4.5;Otherwise, network interface management module returns " not having authority " information to service request business;
Network interface management module sends exchange data to data management module, when adding authority, service is asked business authority flag1 to pass to data management module by central database, check service request business authority flag1 latter two, according to looking into service provider's authority--the mapping relations of data permission table UsExData, find the data permission flag that service request business is corresponding.Then judge whether the exchange data permission that this service asks business requested should service under the data permission flag that request business is corresponding, if, then it is assumed that have permission, otherwise it is assumed that lack of competence.
Step 4.5, network interface management module, according to exchange tables of data ExData, utilize another XML data template generation XML document in data output interface and are stored in buffer;XML document is sent to service request business, thus completing the data outgoing traffic of service request business then through buffer.
Wherein, in central database, service request business's authority and exchange data permission memory mechanism are:
1, in service request business table UserInfo, service request business's authority is stored as four figures: * * * *.Front two is stored as 00,01,11.00 represents this service request business data input authority, and 11 represent this service request business has data output authority, not only 01 represents this service request business has data input authority but also have data output authority;Latter two are stored as decimal number, represent the data manipulation authority that this service request business has, and numeral is more big, has authority more high.
2, in exchange data ExData, exchange data permission is stored as * *, and for decimal number, numeral is more big, has authority more high.
3, service provider's authority--data permission table UsExData stores and has: latter two of service request business's authority, exchange data permission.The exchange data permission of one level of correspondence of each service request business's authority levels, this exchange data permission represents the manageable highest authority data of the service request business of its corresponding level.
Claims (4)
1. based on a data security exchange system for permissions mapping, being be applied to be asked, in the network that business forms, to it is characterized in that by several services, described security exchange system includes: network interface management module, data management module and central database;
Described network interface management module is for realizing the response of service request business, and services, according to described, the network interface that the requested service distribution asking business is different, reprocesses the requested service of described service request business;
Described data management module is for realizing the mutual of data, and described service request business and central database are carried out control of authority, to guarantee the safety that data exchange;
Described central database is used for storing described data, and described data include: the authority of the essential information of business, authority information, exchange data essential information, exchange data is asked in service.
2. data security exchange system according to claim 1, is characterized in that,
Network interface management module includes: service provider's authorization interface, business datum input interface and business datum output interface;
Described central database comprises: exchange tables of data ExData, service provider information table UserInfo and service provider's authority--data permission table UsExData;
Described exchange tables of data ExData is for storing exchange data essential information and the authority of exchange data;
Described service provider information table UserInfo is for storing the essential information of service request quotient data;
Described service provider authority--data permission table UsExData is for storing the mapping relations of data permission and service request business's authority.
3. data security exchange system according to claim 2, is characterized in that, the mapping relations of described data permission and service provider's authority represent: the service request treatable maximum data authority of business with service request business authority flag1 is flag.
4., based on a data secure exchange method for permissions mapping, it is characterized in that being applied in data security exchange system, and carry out as follows:
Step 1: the data template definition of dissimilar interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmitting procedure;
Step 1.2, the business asking business requested according to service are different, distribute different style interfaces, build different XML data templates according to different style interfaces, so that service request business can utilize different XML data templates to transmit data;
Step 2: the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to described authentication services, and distribution service provider authorization interface gives requested service request business;
Step 2.3, described service request business send corresponding XML document according to the XML data template in described service provider authorization interface to data management module;
Step 2.4, data management module accept XML document and resolve, thus distributing to the service request corresponding authority of business, and are stored in service provider information table UserInfo by the authority information that essential information and the service request business of service request business distribute;
Step 3: the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the authority of service request business, if described service request business has authority, then network interface management module distributes Data Input Interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes Data Input Interface to service request business;
Step 3.2, described service request business send corresponding XML document according to the XML data template in described Data Input Interface to data management module;
The XML document received is stored in buffer and resolves by step 3.3, data management module, checks service provider's authority--data permission table UsExData simultaneously, thus adding authority to the exchange data essential information that described service request business to input;And the authority added and exchange data essential information thereof are stored in described exchange tables of data ExData;
Step 3.4, described network interface management module return " inputting successfully " information to described service request business;
Step 4, service ask the data outgoing traffic request of business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's authority, if described service request business has authority, then network interface management module distributes data output interface to service request business;If described service request business does not have authority, then network interface management module refusal distributes data output interface to service request business;
Step 4.3, described service request business send corresponding XML document according to the XML data template in described data output interface to data management module;
The XML document received is stored in buffer and resolves by step 4.4, data management module, checks service provider's authority--data permission table UsExData simultaneously;So that it is determined that whether described service request business has the authority of the exchange data essential information to export;If having, then perform step 4.5;Otherwise, described network interface management module returns " not having authority " information to described service request business;
Step 4.5, described network interface management module, according to exchange tables of data ExData, utilize another XML data template generation XML document in described data output interface and are stored in described buffer;XML document is sent to service request business, thus completing the data outgoing traffic of service request business then through described buffer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610048421.0A CN105718817B (en) | 2016-01-22 | 2016-01-22 | A kind of data safety exchange system and method based on permissions mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610048421.0A CN105718817B (en) | 2016-01-22 | 2016-01-22 | A kind of data safety exchange system and method based on permissions mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105718817A true CN105718817A (en) | 2016-06-29 |
CN105718817B CN105718817B (en) | 2018-05-18 |
Family
ID=56154888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610048421.0A Active CN105718817B (en) | 2016-01-22 | 2016-01-22 | A kind of data safety exchange system and method based on permissions mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105718817B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494647A (en) * | 2008-01-21 | 2009-07-29 | 日本电气株式会社 | Content asset management system, method and control program |
CN101639882A (en) * | 2009-08-28 | 2010-02-03 | 华中科技大学 | Database security system based on storage encryption |
US20100333172A1 (en) * | 2008-04-25 | 2010-12-30 | Wu Jiang | Method, apparatus and system for monitoring database security |
CN102063431A (en) * | 2009-11-13 | 2011-05-18 | 郭承运 | Information database system and access control method thereof |
CN102968599A (en) * | 2012-10-25 | 2013-03-13 | 北京邮电大学 | User-defined access control system and method based on resource publisher |
CN103366129A (en) * | 2012-03-26 | 2013-10-23 | 英顺源(重庆)科技有限公司 | Data file control and management system and method base on network |
CN104348854A (en) * | 2013-07-30 | 2015-02-11 | 李娜 | Networked multi-access media data transmission system |
-
2016
- 2016-01-22 CN CN201610048421.0A patent/CN105718817B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494647A (en) * | 2008-01-21 | 2009-07-29 | 日本电气株式会社 | Content asset management system, method and control program |
US20100333172A1 (en) * | 2008-04-25 | 2010-12-30 | Wu Jiang | Method, apparatus and system for monitoring database security |
CN101639882A (en) * | 2009-08-28 | 2010-02-03 | 华中科技大学 | Database security system based on storage encryption |
CN102063431A (en) * | 2009-11-13 | 2011-05-18 | 郭承运 | Information database system and access control method thereof |
CN103366129A (en) * | 2012-03-26 | 2013-10-23 | 英顺源(重庆)科技有限公司 | Data file control and management system and method base on network |
CN102968599A (en) * | 2012-10-25 | 2013-03-13 | 北京邮电大学 | User-defined access control system and method based on resource publisher |
CN104348854A (en) * | 2013-07-30 | 2015-02-11 | 李娜 | Networked multi-access media data transmission system |
Non-Patent Citations (2)
Title |
---|
胥斌: "基于物联网的信息共享平台设计", 《中国优秀硕士学位论文全文数据库》 * |
邵桂伟: "基于角色的信息网格访问控制的研究", 《中国优秀硕士学位论文全文数据库》 * |
Also Published As
Publication number | Publication date |
---|---|
CN105718817B (en) | 2018-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109522735B (en) | Data permission verification method and device based on intelligent contract | |
US9047462B2 (en) | Computer account management system and realizing method thereof | |
US8381306B2 (en) | Translating role-based access control policy to resource authorization policy | |
CN102947797B (en) | The online service using directory feature extending transversely accesses and controls | |
US20240184775A1 (en) | Blockchain database management system | |
CN104766024A (en) | Cloud platform based medical system case information storage and calling method | |
CN101977184B (en) | Multi-identity selection landing device and service system | |
CN112702402A (en) | System, method, device, processor and storage medium for realizing government affair information resource sharing and exchange based on block chain technology | |
CN102073817B (en) | Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model | |
SG181548A1 (en) | Delegated and restricted asset-based permissions management for co-location facilities | |
CN106534199A (en) | Distributed system authentication and permission management platform based on XACML and SAML under big data environment | |
CN111428257B (en) | System and method for opening database metadata through automatic approval | |
CN112835977A (en) | Database management method and system based on block chain | |
CN114285867A (en) | Air-railway combined transport data sharing method and system based on alliance chain and attribute encryption | |
CN111832001B (en) | Identity management method and identity management system based on block chain | |
CN109800234A (en) | Service platform database system, upgrade method, equipment and storage medium | |
CN105653962B (en) | A kind of user role access authorization for resource model management method of object-oriented | |
Liu et al. | A consortium medical blockchain data storage and sharing model based on ipfs | |
CN113765925B (en) | Improved method based on OSAC and PERM access control model | |
CN113127927B (en) | Attribute reconstruction encryption method and system for license chain data sharing and supervision | |
CN112261109B (en) | Multi-airport time slot exchange system and method based on block chain | |
CN105718817A (en) | Data safety exchange system and method based on authority mapping | |
CN116318931A (en) | Attribute mapping method and system based on cross-domain access control | |
KR100673329B1 (en) | User Role / Permission Setting System using Certificate in Grid Environment and Its Method | |
CN113420083B (en) | System with heterogeneous parallel block chain structure of extensible distributed ledger |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |