CN105718817B - A kind of data safety exchange system and method based on permissions mapping - Google Patents
A kind of data safety exchange system and method based on permissions mapping Download PDFInfo
- Publication number
- CN105718817B CN105718817B CN201610048421.0A CN201610048421A CN105718817B CN 105718817 B CN105718817 B CN 105718817B CN 201610048421 A CN201610048421 A CN 201610048421A CN 105718817 B CN105718817 B CN 105718817B
- Authority
- CN
- China
- Prior art keywords
- data
- service request
- permission
- request business
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data safety exchange systems and method based on permissions mapping, are applied in the network being made of several service requests business, it is characterized in that, the security exchange system includes:Network interface management module, data management module and central database.The present invention can improve the operability, security and expansibility of data safety exchange system, so as to provide diversified service operation and good user experience for provider.
Description
Technical field
The present invention relates to a kind of data safety exchange systems and method based on permissions mapping.
Background technology
With the development and application of information technology, the information age is just changing people’s lives habit at an unprecedented rate
It is used, meet the growing material and cultural needs of people.Make administrative dividing unit --- the society of the minimum lived for people's lives
Area, administration way and the cell that service system is social management, are that embodiment state treatment system and Governance Ability modernize
Importance.
During informatization, information system or business application system that all departments establish according to own situation use
Different technologies and architecture, so as to form numerous information islands.Community development needs to realize these a large amount of different positions
It puts, the shared and mutually access of different-format information, effectively integrates community resource, and then integrate relevant business information, be
Enterprise, the public and internal government system provide unification and consistent service.
Nowadays, application of the exploitation of data safety exchange system in is still in budding stage, existing existing platform coupling
It is right it is low, security is poor, function is more single, it is impossible to effectively provide service request business interface and provide effectively management connects
Mouthful, it is unfavorable for effectively interacting for community resource, it is also difficult to convenience service, the convenience-for-people community data of commerce services third party be supported to have
Effect ground interaction process.
The content of the invention
The present invention is to avoid the deficiencies in the prior art part, proposes that a kind of data safety based on permissions mapping exchanges system
System and method pay close attention to the security and convenience of data exchange, to improve the operable of data safety exchange system
Property, security and expansibility, operated and good user experience so as to provide diversified service for provider.
The present invention adopts the following technical scheme that solve technical problem:
A kind of data safety exchange system based on permissions mapping of the present invention is applied to by several service requests business institute
In the network of composition, its main feature is that, the security exchange system includes:Network interface management module, data management module and in
Heart database;
The network interface management module is used to implement the response of service request business, and asking according to the service request business
The network interface that traffic assignments are different is sought, reprocesses the requested service of the service request business;
The data management module is used to implement the interaction of data, and the service request business and central database are carried out
Permission controls, to ensure the safety of data exchange;
For storing the data, the data include the central database:Essential information, the permission of service request business
Information, the permission for exchanging data essential information, exchanging data.
The characteristics of data safety exchange system of the present invention, lies also in:
Network interface management module includes:Service provider's authorization interface, business datum input interface and business datum output connect
Mouthful;
The central database includes:Exchange tables of data ExData, service provider information table UserInfo and service provider's power
Limit -- data permission table UsExData;
It is described to exchange tables of data ExData for storing the permission for exchanging data essential information and exchanging data;
Service provider's information table UserInfo asks the essential information of quotient data for storage service;
Service provider's permission -- data permission table UsExData is used to store data permission and service request business's permission
Mapping relations.
The data permission and the mapping relations of service provider's permission represent:Service with service request business's permission flag1
It is flag to ask the treatable maximum data permission of business.
A kind of the characteristics of data safety exchange method based on permissions mapping of the present invention is to be applied to data safety to exchange system
In system, and carry out as follows:
Step 1:The data template definition of different type interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmission process;
It is step 1.2, different according to the requested business of service request business, different style interfaces is distributed, according to different
Style interface builds different XML data templates, so that service request business can utilize different XML data templates to transfer number
According to;
Step 2:The authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to the authentication services, and distribution service provider authorization interface is asked
The service request business asked;
Step 2.3, XML data template of the service request business in service provider's authorization interface are to data management
Module sends corresponding XML document;
Step 2.4, data management module receive XML document and are parsed, corresponding so as to distribute to service request business
Permission, and the authority information deposit service provider information table that the essential information of service request business and service request business are distributed
In UserInfo;
Step 3:The data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the permission of service request business, if the service request business possesses permission, net
Network interface administration module distributes Data Input Interface to service request business;If the service request business does not have permission, network connects
Mouth management module is refused to distribute Data Input Interface to service request business;
Step 3.2, XML data template of the service request business in the Data Input Interface are to data management mould
Block sends corresponding XML document;
The XML document received is stored in buffer and parsed by step 3.3, data management module, is checked simultaneously
Service provider's permission -- data permission table UsExData, so as to the service request business exchange data essential information to be inputted
Add permission;And it by the permission added and its exchanges in the data essential information deposit exchange tables of data ExData;
Step 3.4, the network interface management module return to " inputting successfully " information to the service request business;
Step 4, the data outgoing traffic request of service request business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's permission, if the service request business possesses permission, network
Interface administration module distributes data output interface to service request business;If the service request business does not have permission, network interface
Management module is refused to distribute data output interface to service request business;
Step 4.3, XML data template of the service request business in the data output interface are to data management mould
Block sends corresponding XML document;
The XML document received is stored in buffer and parsed by step 4.4, data management module, is checked simultaneously
Service provider's permission -- data permission table UsExData;So that it is determined that whether the service request business possesses the exchange number to be exported
According to the permission of essential information;If possessing, step 4.5 is performed;Otherwise, the network interface management module is to the service request
Business returns to " not having permission " information;
Step 4.5, the network interface management module utilize the data output interface according to tables of data ExData is exchanged
In another XML data template generation XML document and be stored in the buffer;Using the buffer to service request
Business sends XML document, so as to complete the data outgoing traffic of service request business.
Compared with the prior art, the present invention has the beneficial effect that:
1st, the present invention is by network interface management module, data management module and central database composition data secure exchange system
System, the service request of service request business should be handled for network interface management module and response, centre data library storage clothes
Business request quotient data data and exchange data, data management module is in related network interface administration module and central database
Between articulamentum, provide answer service request for network interface and consult and request data needed for the business asked, centered on database into line number
According to input-output operation;The system platform level is clear in structure, functional independence and has preferable data transmission between system
Mechanism.
2nd, network interface management module of the invention is used to implement the response of service request business, and according to the service request
The requested service of business distributes different network interfaces;The number sent back for service request business according to the XML data template of interface
According to being parsed, and using the permissions data of data management module middle calling from the central database, service provider's permission is carried out, is exchanged
The judgement of data permission, the input of final process data, outgoing traffic;So as to improve data safety exchange system it is intelligent,
Availability, expansion and operability meet the various demands of user.
3rd, data management management module of the present invention is for accessing and handling to the data of central database, including reply
The request of data of network interface management module;For security requirement, by service request business and data progress partition of the level is exchanged
With define, and by service request business permission and exchange data permission link;So as to having ensured Information Security, eliminate by
In service request business to the leaking data hidden danger involved by unconfined input, output data.
4th, central database of the present invention by exchange data, service request quotient data and exchanges data-service quotient data mapping
Composition;Data management module is allowed to carry out increase, deletion, modification and the inquiry of data in the database;Exchange data, service is asked
It seeks quotient data and exchanges data-service quotient data mapping and be stored separately, make database redundancy degree as small as possible, ensure that data can
With it is efficient increase, delete, modification and inquiry and committed memory it is as small as possible.
5th, the present invention establishes deciding grade and level encryption mechanism and data permission and service request business's permission is divided, service request
The service request business that business's permission is flag1 corresponding to service request business's permission flag1 can be less than or equal to data permission flag
Data carry out data inputs, outgoing traffic operation;For enhancing the security in data storage, transmission and access process, and
The security of service data is ensured.
Description of the drawings
Fig. 1 is overall structure figure of the present invention;
The network interface that Fig. 2 is the present invention includes different type interface displaying figure;
The network interface that Fig. 3 is the present invention distributes authorization interface flow chart;
Fig. 4 is consulted and request for the service request of the present invention and is sought data input request flow chart;
Fig. 5 is the service request business request data output request flow chart of the present invention.
Specific embodiment
During this example is implemented, a kind of data safety exchange system based on permissions mapping, applied to by several service requests
In the network that business is formed, third party's data are integrated with, which includes:Network interface management module, data pipe
Manage module and central database;
Network interface management module is used to implement the response of service request business, and according to the requested service of service request business point
With different network interfaces, the requested service of reprocessing service request business;
As shown in Figure 1:Network interface management module includes:Service provider's authorization interface, business datum input interface and business
Data output interface;
Data management module is used to implement the interaction of data, and carries out permission control to service request business and central database
System, to ensure the safety of data exchange;
For storing data, data include central database:The essential information of service request business, authority information, exchange number
According to essential information, the permission of exchange data.
Central database includes:Exchange tables of data ExData, service provider information table UserInfo and service provider's permission -- number
According to authority list UsExData;Tables of data ExData is exchanged for storing the service data exchanged, including:Exchange data essential information
With the permission for exchanging data;For example, data major key, data essential information, data source, data permission flag;
Service provider information table UserInfo is used to store the service request quotient data of application business, for example, service request business
The essential information of data;Include service request business's major key, service request business's essential information, service request business's permission flag1;
Service provider's permission -- data permission table UsExData is used to store data permission and the mapping of service request business's permission
Relation comprising data permission flag and service request business permission flag1, represents:Service with service request business's permission flag1
It is flag to ask the treatable maximum data permission of business.
A kind of data safety exchange method based on permissions mapping is applied in the security exchange system of data, and by such as
Lower step carries out:
Step 1:The data template definition of different type interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmission process;
It is step 1.2, different according to the requested business of service request business, different style interfaces is distributed, according to different
Style interface builds different XML data templates, so that service request business can utilize different XML data templates to transfer number
According to;
Step 2:As shown in Figure 2 and Figure 3, the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to authentication services, and distribution service provider's authorization interface is to requested
Service request business;
The XML data template of step 2.3, service request business in service provider's authorization interface is sent to data management module
Corresponding XML document;
Step 2.4, data management module receive XML document and are parsed, corresponding so as to distribute to service request business
Permission, and the authority information deposit service provider information table that the essential information of service request business and service request business are distributed
In UserInfo;
Step 3:As shown in figure 4, the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check that if the permission service request business of service request business possesses permission, network interface
Management module distributes Data Input Interface to service request business;If service request business does not have permission, network interface management module
Refuse to distribute Data Input Interface to service request business;
During permission is checked, service request business's permission flag1 is transmitted to network interface management module by central database,
Network interface management module judges;If flag1=00** or 01**, then it is assumed that possess data input permission.If flag1
=11**, then it is assumed that do not possess data input permission.
The XML data template completion data of step 3.2, service request business in Data Input Interface, and to data pipe
It manages module and sends corresponding XML document;
The XML document received is stored in buffer and parsed by step 3.3, data management module, is checked simultaneously
Service provider's permission -- data permission table UsExData, so as to which the exchange data essential information to be inputted is added to service request business
Permission;And it by the permission added and its exchanges in data essential information deposit exchange tables of data ExData;
Network interface management module sends data management module to by data are exchanged, and when adding permission, central database will
Service request business's permission flag1 is transmitted to data management module, check service request business's permission flag1 latter two, is taken according to looking into
Business business's permission -- the mapping relations of data permission table UsExData, find the corresponding data permission flag of service request business, by number
It is flag according to addition permission.Data are stored in central database by data management module.
Step 3.4, network interface management module return to " inputting successfully " information to service request business;
Step 4, such as Fig. 5 show that the data outgoing traffic of service request business is asked;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's permission, if service request business possesses permission, network interface
Management module distributes data output interface to service request business;If service request business does not have permission, network interface management module
Refuse to distribute data output interface to service request business;
During permission is checked, service request business's permission flag1 is transmitted to network interface management module by central database,
Network interface management module judges;If flag1=11** or 01**, then it is assumed that possess data input permission.If flag
=00**, then it is assumed that do not possess data input permission.
The XML data template of step 4.3, service request business in data output interface sends phase to data management module
The XML document answered;
The XML document received is stored in buffer and parsed by step 4.4, data management module, is checked simultaneously
Service provider's permission -- data permission table UsExData;So that it is determined that whether service request business possesses the exchange data base to be exported
The permission of this information;If possessing, step 4.5 is performed;Otherwise, network interface management module is returned to service request business and " not had
Permission " information;
Network interface management module sends data management module to by data are exchanged, and when adding permission, central database will
Service request business's permission flag1 is transmitted to data management module, check service request business's permission flag1 latter two, is taken according to looking into
Business business's permission -- the mapping relations of data permission table UsExData, find the corresponding data permission flag of service request business.Then
Judge that service request business is requested and exchange whether data permission is somebody's turn to do under the corresponding data permission flag of service request business,
If so, think to have permission, otherwise it is assumed that lack of competence.
Step 4.5, network interface management module are according to tables of data ExData is exchanged, using another in data output interface
A XML data template generation XML document is simultaneously stored in buffer;XML document is sent to service request business using buffer, from
And complete the data outgoing traffic of service request business.
Wherein, service request business permission and exchange data permission memory mechanism are in central database:
1st, service request business's permission is stored as four figures in service request business table UserInfo:****.Front two is stored as
00,01,11.00, which represents service request business, has data to input permission, and 11, which represent service request business, possesses data output permission,
01 represent service request business possess data input permission possess again data output permission;Two are stored as decimal number afterwards,
The data manipulation permission that service request business is possessed is represented, number is bigger, and it is higher to possess permission.
2nd, exchange exchange data permission in data ExData and be stored as * *, be decimal number, number is bigger, possesses permission and gets over
It is high.
3rd, service provider's permission -- it is stored in data permission table UsExData:Latter two of service request business's permission exchange
Data permission.The exchange data permission of one level of correspondence of each service request business authority levels, the exchange data permission table
Show that it corresponds to the manageable highest authority data of the service request business of level.
Claims (3)
1. a kind of data safety exchange system based on permissions mapping is to be applied to the net being made of several service requests business
In network, it is characterized in that, the security exchange system includes:Network interface management module, data management module and central database;
The network interface management module is used to implement the response of service request business, and according to the request industry of the service request business
Business distributes different network interfaces, reprocesses the requested service of the service request business;
The data management module is used to implement the interaction of data, and carries out permission to the service request business and central database
Control, to ensure the safety of data exchange;
For storing the data, the data include the central database:The essential information of service request business, permission letter
Breath, the permission for exchanging data essential information, exchanging data;
Network interface management module includes:Service provider's authorization interface, business datum input interface and business datum output interface;
The central database includes:Exchange tables of data ExData, service provider information table UserInfo and service provider's permission -- number
According to authority list UsExData;
It is described to exchange tables of data ExData for storing the permission for exchanging data essential information and exchanging data;
Service provider's information table UserInfo asks the essential information of quotient data for storage service;
Service provider's permission -- data permission table UsExData is used to store data permission and the mapping of service request business's permission
Relation.
2. data safety exchange system according to claim 1, it is characterized in that, the data permission and service provider's permission
Mapping relations include data permission flag and service request business permission flag1, represent:With service request business's permission flag1's
The treatable maximum data permission of service request business is flag.
3. a kind of data safety exchange method based on permissions mapping, it is characterized in that be applied in data safety exchange system, and
It carries out as follows:
Step 1:The data template definition of different type interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmission process;
It is step 1.2, different according to the requested business of service request business, different style interfaces is distributed, according to different types
Interface builds different XML data templates, so that service request business can utilize different XML data templates to transfer data;
Step 2:The authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to the authentication services, and distribution service provider's authorization interface is to requested
Service request business;
Step 2.3, XML data template of the service request business in service provider's authorization interface are to data management module
Send corresponding XML document;
Step 2.4, data management module receive XML document and are parsed, so as to distribute to the corresponding permission of service request business,
And the authority information for being distributed the essential information of service request business and service request business is stored in service provider information table UserInfo
In;
Step 3:The data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the permission of service request business, if the service request business possesses permission, network connects
Mouth management module distributes Data Input Interface to service request business;If the service request business does not have permission, network interface pipe
Reason module is refused to distribute Data Input Interface to service request business;
Step 3.3, XML data template of the service request business in the Data Input Interface are sent out to data management module
Send corresponding XML document;
The XML document received is stored in buffer and parsed, while checks service by step 3.4, data management module
Business's permission -- data permission table UsExData, so as to the exchange data essential information the to be inputted addition to the service request business
Permission;And it by the permission added and exchanges in data essential information deposit exchange tables of data ExData;
Step 3.5, the network interface management module return to " inputting successfully " information to the service request business;
Step 4, the data outgoing traffic request of service request business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's permission, if the service request business possesses permission, network interface
Management module distributes data output interface to service request business;If the service request business does not have permission, network interface management
Module is refused to distribute data output interface to service request business;
Step 4.3, XML data template of the service request business in the data output interface are sent out to data management module
Send corresponding XML document;
The XML document received is stored in buffer and parsed, while checks service by step 4.4, data management module
Business's permission -- data permission table UsExData;So that it is determined that whether the service request business possesses the exchange data base to be exported
The permission of this information;If possessing, step 4.5 is performed;Otherwise, the network interface management module is returned to the service request business
Return " not having permission " information;
Step 4.5, the network interface management module are according to tables of data ExData is exchanged, using in the data output interface
Another XML data template generation XML document is simultaneously stored in the buffer;It is sent out using the buffer to service request business
XML document is sent, so as to complete the data outgoing traffic of service request business.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610048421.0A CN105718817B (en) | 2016-01-22 | 2016-01-22 | A kind of data safety exchange system and method based on permissions mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610048421.0A CN105718817B (en) | 2016-01-22 | 2016-01-22 | A kind of data safety exchange system and method based on permissions mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105718817A CN105718817A (en) | 2016-06-29 |
CN105718817B true CN105718817B (en) | 2018-05-18 |
Family
ID=56154888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610048421.0A Active CN105718817B (en) | 2016-01-22 | 2016-01-22 | A kind of data safety exchange system and method based on permissions mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105718817B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494647A (en) * | 2008-01-21 | 2009-07-29 | 日本电气株式会社 | Content asset management system, method and control program |
CN101639882A (en) * | 2009-08-28 | 2010-02-03 | 华中科技大学 | Database security system based on storage encryption |
CN102063431A (en) * | 2009-11-13 | 2011-05-18 | 郭承运 | Information database system and access control method thereof |
CN102968599A (en) * | 2012-10-25 | 2013-03-13 | 北京邮电大学 | User-defined access control system and method based on resource publisher |
CN103366129A (en) * | 2012-03-26 | 2013-10-23 | 英顺源(重庆)科技有限公司 | Data file control and management system and method base on network |
CN104348854A (en) * | 2013-07-30 | 2015-02-11 | 李娜 | Networked multi-access media data transmission system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101639879B (en) * | 2008-07-28 | 2012-06-20 | 成都市华为赛门铁克科技有限公司 | Database security monitoring method, device and system |
-
2016
- 2016-01-22 CN CN201610048421.0A patent/CN105718817B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494647A (en) * | 2008-01-21 | 2009-07-29 | 日本电气株式会社 | Content asset management system, method and control program |
CN101639882A (en) * | 2009-08-28 | 2010-02-03 | 华中科技大学 | Database security system based on storage encryption |
CN102063431A (en) * | 2009-11-13 | 2011-05-18 | 郭承运 | Information database system and access control method thereof |
CN103366129A (en) * | 2012-03-26 | 2013-10-23 | 英顺源(重庆)科技有限公司 | Data file control and management system and method base on network |
CN102968599A (en) * | 2012-10-25 | 2013-03-13 | 北京邮电大学 | User-defined access control system and method based on resource publisher |
CN104348854A (en) * | 2013-07-30 | 2015-02-11 | 李娜 | Networked multi-access media data transmission system |
Non-Patent Citations (2)
Title |
---|
基于物联网的信息共享平台设计;胥斌;《中国优秀硕士学位论文全文数据库》;20120215(第2期);全文 * |
基于角色的信息网格访问控制的研究;邵桂伟;《中国优秀硕士学位论文全文数据库》;20060915(第9期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN105718817A (en) | 2016-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109522735B (en) | Data permission verification method and device based on intelligent contract | |
CN102307185B (en) | Data isolation method used in storage cloud | |
US9047462B2 (en) | Computer account management system and realizing method thereof | |
CN104094261B (en) | Access the optimized treatment method and system of restricted data | |
CN109286676B (en) | Electric power data safety information system based on block chain | |
CN102053969A (en) | Web ERP (enterprise resource planning) user right management system | |
CN104766024A (en) | Cloud platform based medical system case information storage and calling method | |
CN101197023A (en) | Method for establishing visible document file management system facing to minor enterprises | |
CN102073817B (en) | Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model | |
CN112835977B (en) | Database management method and system based on block chain | |
US20100257204A1 (en) | Providing access to a data item using access graphs | |
CN102724221A (en) | Enterprise information system using cloud computing and method for setting user authority thereof | |
CN109962805A (en) | A kind of multi-platform cut-in method and equipment based on Authority and Domain Based Management | |
CN102043931A (en) | Private data access control method based on role permission dynamic conversion | |
CN105871914A (en) | Customer-relationship-management-system access control method | |
CN105653962B (en) | A kind of user role access authorization for resource model management method of object-oriented | |
CN111988173A (en) | Tenant management platform and tenant management method based on multi-layer parent-child structure tenant | |
CN113765925B (en) | Improved method based on OSAC and PERM access control model | |
Liu et al. | A consortium medical blockchain data storage and sharing model based on ipfs | |
US7890394B2 (en) | Secure access to transaction based information | |
CN113407626B (en) | Planning management and control method based on blockchain, storage medium and terminal equipment | |
CN113127927B (en) | Attribute reconstruction encryption method and system for license chain data sharing and supervision | |
CN109784084B (en) | Data transaction method, device and system | |
CN100570635C (en) | Distribution type knowledge management integrating system and integrated approach thereof | |
CN112261109B (en) | Multi-airport time slot exchange system and method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |