CN111046424B - Control method and system for data set safety sharing - Google Patents

Control method and system for data set safety sharing Download PDF

Info

Publication number
CN111046424B
CN111046424B CN201911270237.0A CN201911270237A CN111046424B CN 111046424 B CN111046424 B CN 111046424B CN 201911270237 A CN201911270237 A CN 201911270237A CN 111046424 B CN111046424 B CN 111046424B
Authority
CN
China
Prior art keywords
group
data set
sharing
destroying
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911270237.0A
Other languages
Chinese (zh)
Other versions
CN111046424A (en
Inventor
范冰冰
黄达庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Bingo Software Co Ltd
Original Assignee
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Normal University filed Critical South China Normal University
Priority to CN201911270237.0A priority Critical patent/CN111046424B/en
Publication of CN111046424A publication Critical patent/CN111046424A/en
Application granted granted Critical
Publication of CN111046424B publication Critical patent/CN111046424B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • G06F16/24565Triggers; Constraints

Abstract

The invention discloses a control method and a system for safely sharing a data set, wherein the method mainly comprises the following steps: s1, creating a temporary data set security sharing group; s2, establishing the association operation of the data set and the security sharing group; s3, the user enters the created safe sharing group, selects the data set to be accessed, and completes the access permission operation according to the rule; s4, detecting the effective sharing time of the data set in the security sharing group, and determining whether to release the association between the group and the data and destroy the data set; and S5, detecting the effective time of the security sharing group, and determining whether to release the association of the group and the data and the user and destroy the group. The invention mainly aims at solving the inconvenience brought by the access control method based on the traditional role of the data open platform, and provides a small-range temporary data set safety sharing mode for users on the open data platform.

Description

Control method and system for data set safety sharing
Technical Field
The invention belongs to the field of data management, and particularly relates to a control method and a system for data set security sharing.
Background
At present, a large number of open data platforms for providing data set services for users exist at home and abroad, the open data platforms are commercial and free, and although different open data platforms have different differences, the open data platforms can basically provide service functions such as data set access, data set retrieval, data set visualization, data set API (application programming interface) calling, data set downloading and the like for the users. At present, most of the access control of the authority of the open data platform is realized by an access control method based on the traditional role, and the authority is distributed to the role, and then the role is distributed to the user, so that the user has the related access authority. The user can obtain corresponding authority and operate the related data set only through the traditional role-based access control list according to the identity authentication registered on the open data platform. Although the role-based access control method has the characteristics of mature technology, convenience in management and the like, users can be divided into different roles, and the complexity of authority management is reduced, the dynamic authorization and fine-grained authorization of a large number of users cannot be well supported, for example, in the face of a small-range and temporary data set security sharing requirement scene, such as emergency processing and business coordination, a certain sensitive data set needs to be shared for a certain part of users in a time limit manner, and the requirement is complex and difficult to realize for an existing open data platform of the role-based access control method.
If the need of realizing the small-range temporary data set security sharing by the role-based access control method is theoretically feasible, the implementation is more complicated and difficult. Firstly, an administrator needs to create a role, then the authority of the data set needing to be shared is distributed to the role, finally, the role is manually distributed to the users needing to share the data set, and the users with the specified role can access the specified data set. If the data set is allowed to have the sharing time limit, the administrator also detects whether the sharing time limit of the data set is expired, and if the sharing time limit of the data set is expired, the user role is manually destroyed and the role is deleted. Therefore, the operation steps of the practical method are not only complicated to operate and low in efficiency, but also easily cause the continuous growth of roles and are inconvenient to maintain. Since there are many inconvenient and limited places for implementing the safe sharing of the data set controlled in a small range, temporarily and attributes by using the role-based control method, research and exploration of an access control method which can combine group sharing and flexibility based on attributes are needed.
Disclosure of Invention
The invention mainly aims to overcome the defects of the prior art and provide a control method for safely sharing a data set, which combines group sharing and an access control method based on attributes to realize small-range and temporary data set safety sharing for the data set and a user on an open data platform on the premise of information safety.
Another object of the present invention is to provide a control system for secure sharing of data sets.
In order to achieve the first purpose, the invention adopts the following technical scheme:
a control method for safely sharing a data set comprises the following steps:
s1, creating a temporary data set security sharing group, wherein the data set security sharing group is a temporary group of a shared data set, has a security level attribute and a time attribute, is created by a platform administrator and is destroyed by a system;
s2, establishing the association operation of the data set and the security sharing group;
s3, the user enters the related safe sharing group, selects the data set to be accessed, and completes the permission operation;
s4, detecting the sharing effective time of the data set in the security sharing group, determining the association between the group and the data to be removed and destroying the data set, wherein the data destruction is executed according to a data set destruction queue, the data set destruction queue is an ordered linked list, and data set information which is arranged according to the ascending order of the sharing effective time of the data set is stored in the data set destruction queue and is used for the data set detection process triggered by the system at each time;
s5, detecting the effective time of the security sharing group, determining to release the association between the group and the data and the user and destroy the group, wherein the group destruction is executed through a group destruction queue, the group destruction queue is an ordered linked list, and the group information which is arranged according to the ascending order of the effective time of the group is stored in the group destruction queue and is used for the group destruction detection process triggered by the system at each time.
As a preferred technical solution, in step S1, the creating the temporary data set security sharing group specifically includes:
s11, entering a clustering interface;
s12, filling out names, safety levels, effective time, checking member users from the user list and sending a group building request to a server;
s13, the server judges whether the audit name, the security level and the valid time are valid according to the set rule, if so, the invalid parameter is returned, otherwise, the step S14 is executed;
s14, judging whether the security level of the member user is lower than that of the group, if so, returning that the security level of the user is insufficient, otherwise, executing the step S15;
s15, creating and storing the group and establishing the association relationship between the user and the group;
s16, inserting the group information into the group destroying queue according to the ascending order of the effective time of the group;
and S17, returning the clustering result.
As a preferred technical scheme, the security level is a security attribute commonly owned by a group, a user and a data set, and can be divided into a plurality of security levels according to requirements; the security level of the member users in the group is higher than or equal to the security level of the group, and the security level of the data set in the group is lower than or equal to the security level of the group.
As a preferred technical solution, step S2 specifically includes:
s21, selecting a data set to be shared and entering a data set sharing interface;
s22, filling in the shared group, the shared effective time and the allowed operation of the data set, and sending a shared data set request to the server;
s23, the server judges whether the shared group, the sharing effective time and the allowed operation are effective according to the set rule, if the shared group, the sharing effective time and the allowed operation are ineffective, the server returns ineffective parameters, otherwise, the server executes the step S24;
s24, judging whether the security level of the data set is higher than the group security level, if so, returning that the security level of the data set cannot be higher than the group security level, otherwise, executing a step S26;
s25, creating and storing a data set and establishing an association relationship between the data set and a cluster;
s26, inserting the data set information into a data set destruction queue according to the ascending order of the shared effective time;
and S27, returning a shared data set result.
Preferably, in step S3, the permission operation includes three modes, i.e., online preview, printing and downloading.
As a preferred technical solution, the step S3 specifically includes:
s31, after the user authentication login, acquiring a group list associated with the user authentication login, selecting a group needing to be accessed and acquiring a list of a data set associated with the group;
s32, the user selects the data set to be accessed to browse online, the operation of printing or downloading the data set needs to send a request to the server, if the operation is allowed, the operation request of the data set is executed and the execution result is returned, if not, no operation authority is returned.
As a preferred technical solution, in the step S4, the data destruction specifically includes:
s41, taking out first data set information from the head of the data set destruction queue;
s42, judging whether the sharing effective time of the data set is larger than the current time, if so, ending the detection, otherwise, executing the step S43;
s43, removing the association relationship between the cluster and the data set, and deleting the destroyed data set;
s44, removing the data set information from the data set destroying queue, and continuing to execute the step S41.
As a preferable technical solution, in the step S5, the specific method of destroying the population is as follows:
s51, taking out first group information from the head of the group destruction queue;
s52, judging whether the effective time of the group is larger than the current time, if so, ending the detection, otherwise, executing the step S63;
s53, removing the association relationship between the group and all member users;
s54, removing the association relation between the cluster and all the data sets and deleting all the data sets;
s55, deleting the group and removing the group information from the group destroy queue, and continuing to execute the step S51.
As a preferred technical solution, the method for destroying the group is continuously triggered by the system according to a specified frequency, and is used for detecting whether the effective time of each group expires, and if the effective time of each group expires, the group is to be destroyed, and the detection process is repeatedly executed until the group destruction queue is empty, and the detection is stopped.
In order to achieve the other purpose, the invention adopts the following technical scheme:
a control system for secure sharing of a data set, comprising: the system comprises a data set security sharing group module, an association module, a permission operation module, a data set destroying module and a group destroying module;
the data set security sharing group module is used for creating a temporary data set security sharing group, wherein the temporary data set sharing group is a temporary data set sharing group with a security level attribute and a time attribute, and is created by a platform administrator and destroyed by a system;
the association module is used for establishing association operation between the data set and the security sharing group;
the permission operation module is used for enabling a user to enter a related security sharing group, selecting a data set needing to be accessed and finishing permission operation;
the data set destroying module is used for detecting the sharing effective time of the data sets in the security sharing group, determining the association between the group and the data and destroying the data sets, executing the data destroying according to a data set destroying queue during data destroying, wherein the data set destroying queue is an ordered linked list, and data set information which is arranged according to the ascending order of the sharing effective time of the data sets is stored in the data set destroying queue and is used for the data set detecting and destroying process triggered by the system at each time;
the group destroying module is used for detecting the effective time of the security sharing group, determining to remove the association between the group and the data and the user and destroy the group, wherein the group destroying is executed through a group destroying queue, the group destroying queue is an ordered linked list, group information which is arranged according to the ascending order of the effective time of the group is stored in the group destroying queue, and the group destroying detection module is used for a group destroying detection process which is triggered by the system at each time.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the invention overcomes the defects of the control method based on the role by combining the access control method based on the attribute on the open data platform, and provides a small-range temporary data set safety sharing mode for users on the open data platform.
2. The invention limits the user to enter the lowest security level of the cluster and the data set to be shared to the highest security level of the cluster through the cluster security level so as to realize the small-range security sharing of the data set and ensure the security.
3. The invention controls the automatic destroying of the cluster and the automatic destroying process of the data set by setting the effective time of the cluster and the shared effective time of the data set without manual intervention of an administrator, thereby realizing the temporary creation of the cluster and the temporary sharing of the data set.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a block schematic diagram of the system of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
Examples
The control method for safely sharing the data set of the embodiment adopts the technical scheme that: 1. the method comprises the steps of establishing a group with a security level attribute and a time attribute by combining an access control method based on the attribute, limiting a user to enter the lowest security level of the group and limiting a data set to be shared to the highest security level of the group by setting the security level of the group, and controlling the automatic destruction process of the group by setting the effective time of the group. 2. In combination with an attribute-based access control method, when a data set is shared, the automatic destruction process of the data set is controlled by setting the effective sharing time of the data set, and the operation authority owned by a group user is limited by setting the allowed operation of the data set.
As shown in fig. 1, a method for controlling secure sharing of a data set of this embodiment includes the following steps:
step S1, creating a temporary data set security sharing group;
the administrator enters the application interface of group building and fills in the name of the group, the security level of the group, the effective time of the group, and selects the member users from the user list and sends the request of group building to the server, then the server judges whether the length of the group name is legal or not, whether the safety level of the group is in the safety level range divided by the platform or not, whether the format of the effective time of the group is correct or not and the difference between the effective time and the current time, that is, whether the time length meets the minimum requirement of the group survival time length or not, if the invalid parameter exists, the invalid parameter is returned, otherwise, the checked member user list is traversed, whether the security level of each user is lower than the security level set by the group or not is judged, if the group information exists, returning that the user security level is not enough, otherwise, creating and storing the group, establishing the association relationship between the user and the group, and inserting the group information into the group destruction queue according to the ascending order of the effective time of the group.
The data set security sharing group is created by a platform administrator, the shared data set is uploaded by the administrator, and members in the group are authenticated users on the platform. The division of the security level of the user, the security level of the data set and the security level of the user is consistent, and the security level of the group has two functions: one is to limit the minimum level of security for group member users and the other is to limit the maximum level of data set sharing. A user associated with a group, i.e., a member of the group, may access all of the data sets within the group.
S2, establishing the association operation of the data set and the security sharing group;
the administrator selects the data set to be shared and enters the data set sharing interface, fills out the group shared by the data set, shares the effective time and allowed operation and sends the shared data set request to the server, then the server judges whether the shared group exists or not, whether the format of the sharing effective time is correct or not and judges the difference between the sharing effective time and the current time according to the set rule, whether the time length meets the minimum requirement of the data set sharing time length, whether the allowed operation is in the type of platform division, if the invalid parameter exists, returning the invalid parameter, otherwise, judging whether the security level of the data set is higher than the group security level, if so, returning that the security level of the data set cannot be higher than the security level of the cluster, otherwise, creating and storing the data set, establishing the association relationship between the data set and the cluster, and inserting the data set information into a data set destruction queue in ascending order of the sharing effective time.
S3, the user enters the related safe sharing group, selects the data set to be accessed, and completes the permission operation;
firstly, a user enters a user group management interface after authentication and login and acquires a group list associated with the user group management interface, then a group needing to be accessed is selected and a list of data sets associated with the group is acquired, finally, the user selects the data set needing to be accessed to browse online, if the data set needs to be printed or downloaded, an operation request needs to be sent to a server, if the server judges that the operation in the request is within an operation range allowed by the data set, the operation request of the data set is executed and an execution result is returned, and if the operation in the request is not within the operation range allowed by the data set, no operation permission is returned.
S4, detecting the sharing effective time of the data set in the security sharing group, determining to release the association between the group and the data and destroy the data set;
and taking out the first data set information from the head of the data set destruction queue, judging whether the sharing effective time of the data set is greater than the current time, if so, finishing the detection, otherwise, removing the association relationship between the group and the data set, deleting the destruction data set, removing the data set information from the data set destruction queue and repeating the steps.
The above process is a detection process of the shared effective time of the data sets, the detection process is continuously triggered by the system according to the designated frequency and is used for detecting whether the shared effective time of each data set is expired, if the shared effective time of each data set is expired, the data set is destroyed, the detection process is repeatedly executed all the time, and the detection is stopped until the data set destruction queue is empty.
And S5, detecting the effective time of the security sharing group, determining to release the association between the group and the data and the user, and destroying the group.
And taking out the first group information from the head of the group destruction queue, judging whether the effective time of the group is longer than the current time, if so, finishing the detection, otherwise, removing the association relationship between the group and all member users, removing the association relationship between the group and all data sets, deleting the group, removing the group information from the group destruction queue, and repeating the steps.
The detection process is continuously triggered by the system according to specified frequency and is used for detecting whether the effective time of each group is expired, if the effective time of each group is expired, the group is destroyed, the detection process is repeatedly executed all the time, and the detection is stopped until the group destruction queue is empty.
As shown in fig. 2, this embodiment further provides a control system for secure sharing of a data set, including: the system comprises a data set security sharing group module, an association module, a permission operation module, a data set destroying module and a group destroying module;
the data set security sharing group module is used for creating a temporary data set security sharing group, wherein the temporary data set sharing group is a temporary data set sharing group with a security level attribute and a time attribute, and is created by a platform administrator and destroyed by a system;
the association module is used for establishing association operation between the data set and the security sharing group;
the permission operation module is used for enabling a user to enter a related security sharing group, selecting a data set needing to be accessed and finishing permission operation;
the data set destroying module is used for detecting the sharing effective time of the data sets in the security sharing group, determining the association between the group and the data and destroying the data sets, executing the data destroying according to a data set destroying queue during data destroying, wherein the data set destroying queue is an ordered linked list, and data set information which is arranged according to the ascending order of the sharing effective time of the data sets is stored in the data set destroying queue and is used for the data set detecting and destroying process triggered by the system at each time;
the group destroying module is used for detecting the effective time of the security sharing group, determining to remove the association between the group and the data and the user and destroy the group, wherein the group destroying is executed through a group destroying queue, the group destroying queue is an ordered linked list, group information which is arranged according to the ascending order of the effective time of the group is stored in the group destroying queue, and the group destroying detection module is used for a group destroying detection process which is triggered by the system at each time.
The invention solves the inconvenience caused by the role-based access control method of the open data platform, and provides a small-range temporary data set safe sharing mode for users on the open data platform
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.

Claims (10)

1. A control method for safely sharing a data set is characterized by comprising the following steps:
s1, creating a temporary data set security sharing group, wherein the data set security sharing group is a temporary group of a shared data set, has a security level attribute and a time attribute, is created by a platform administrator and is destroyed by a system;
s2, establishing the association operation of the data set and the security sharing group;
s3, the user enters the related safe sharing group, selects the data set to be accessed, and completes the permission operation;
s4, detecting the sharing effective time of the data set in the security sharing group, determining the association between the group and the data to be removed and destroying the data set, wherein the data destruction is executed according to a data set destruction queue, the data set destruction queue is an ordered linked list, and data set information which is arranged according to the ascending order of the sharing effective time of the data set is stored in the data set destruction queue and is used for the data set detection process triggered by the system at each time;
s5, detecting the effective time of the security sharing group, determining to release the association between the group and the data and the user and destroy the group, wherein the group destruction is executed through a group destruction queue, the group destruction queue is an ordered linked list, and the group information which is arranged according to the ascending order of the effective time of the group is stored in the group destruction queue and is used for the group destruction detection process triggered by the system at each time.
2. The method for controlling security sharing of data sets according to claim 1, wherein in step S1, the creating of the temporary security sharing group of data sets includes:
s11, entering a clustering interface;
s12, filling out names, safety levels, effective time, checking member users from the user list and sending a group building request to a server;
s13, the server judges whether the audit name, the security level and the valid time are valid according to the set rule, if so, the invalid parameter is returned, otherwise, the step S14 is executed;
s14, judging whether the security level of the member user is lower than that of the group, if so, returning that the security level of the user is insufficient, otherwise, executing the step S15;
s15, creating and storing the group and establishing the association relationship between the user and the group;
s16, inserting the group information into the group destroying queue according to the ascending order of the effective time of the group;
and S17, returning the clustering result.
3. The method for controlling the safe sharing of the data set according to claim 1, wherein the security level is a security attribute commonly owned by a group, a user and the data set, and can be divided into a plurality of security levels according to requirements; the security level of the member users in the group is higher than or equal to the security level of the group, and the security level of the data set in the group is lower than or equal to the security level of the group.
4. The method for controlling secure sharing of a data set according to claim 1, wherein step S2 specifically includes:
s21, selecting a data set to be shared and entering a data set sharing interface;
s22, filling in the shared group, the shared effective time and the allowed operation of the data set, and sending a shared data set request to the server;
s23, the server judges whether the shared group, the sharing effective time and the allowed operation are effective according to the set rule, if the shared group, the sharing effective time and the allowed operation are ineffective, the server returns ineffective parameters, otherwise, the server executes the step S24;
s24, judging whether the security level of the data set is higher than the group security level, if so, returning that the security level of the data set cannot be higher than the group security level, otherwise, executing a step S26;
s25, creating and storing a data set and establishing an association relationship between the data set and a cluster;
s26, inserting the data set information into a data set destruction queue according to the ascending order of the shared effective time;
and S27, returning a shared data set result.
5. The method for controlling the secure sharing of data set according to claim 1, wherein in step S3, the permission operation includes three modes of online preview, printing and downloading.
6. The method for controlling secure sharing of a data set according to claim 1, wherein the step S3 specifically includes:
s31, after the user authentication login, acquiring a group list associated with the user authentication login, selecting a group needing to be accessed and acquiring a list of a data set associated with the group;
s32, the user selects the data set to be accessed to browse online, the operation of printing or downloading the data set needs to send a request to the server, if the operation is allowed, the operation request of the data set is executed and the execution result is returned, if not, no operation authority is returned.
7. The method for controlling secure sharing of a data set according to claim 1, wherein in step S4, the specific steps of data destruction are as follows:
s41, taking out first data set information from the head of the data set destruction queue;
s42, judging whether the sharing effective time of the data set is larger than the current time, if so, ending the detection, otherwise, executing the step S43;
s43, removing the association relationship between the cluster and the data set, and deleting the destroyed data set;
s44, removing the data set information from the data set destroying queue, and continuing to execute the step S41.
8. The method for controlling security sharing of data sets according to claim 1, wherein in step S5, the specific method for destroying a group is as follows:
s51, taking out first group information from the head of the group destruction queue;
s52, judging whether the effective time of the group is larger than the current time, if so, ending the detection, otherwise, executing the step S63;
s53, removing the association relationship between the group and all member users;
s54, removing the association relation between the cluster and all the data sets and deleting all the data sets;
s55, deleting the group and removing the group information from the group destroy queue, and continuing to execute the step S51.
9. The method for controlling the secure sharing of data sets according to claim 8, wherein the method for destroying the groups is triggered by the system according to a designated frequency, and is used for detecting whether the valid time of each group expires, and if the valid time of each group expires, the group is destroyed, and the detection process is repeated until the group destruction queue is empty, and the detection is not stopped.
10. A control system for secure sharing of a data set, comprising: the system comprises a data set security sharing group module, an association module, a permission operation module, a data set destroying module and a group destroying module;
the data set security sharing group module is used for creating a temporary data set security sharing group, the data set security sharing group is a temporary group of a shared data set, has a security level attribute and a time attribute, is created by a platform administrator and is destroyed by a system;
the association module is used for establishing association operation between the data set and the security sharing group;
the permission operation module is used for enabling a user to enter a related security sharing group, selecting a data set needing to be accessed and finishing permission operation;
the data set destroying module is used for detecting the sharing effective time of the data sets in the security sharing group, determining the association between the group and the data and destroying the data sets, executing the data destroying according to a data set destroying queue during data destroying, wherein the data set destroying queue is an ordered linked list, and data set information which is arranged according to the ascending order of the sharing effective time of the data sets is stored in the data set destroying queue and is used for the data set detecting and destroying process triggered by the system at each time;
the group destroying module is used for detecting the effective time of the security sharing group, determining to remove the association between the group and the data and the user and destroy the group, wherein the group destroying is executed through a group destroying queue, the group destroying queue is an ordered linked list, group information which is arranged according to the ascending order of the effective time of the group is stored in the group destroying queue, and the group destroying detection module is used for a group destroying detection process which is triggered by the system at each time.
CN201911270237.0A 2019-12-11 2019-12-11 Control method and system for data set safety sharing Active CN111046424B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911270237.0A CN111046424B (en) 2019-12-11 2019-12-11 Control method and system for data set safety sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911270237.0A CN111046424B (en) 2019-12-11 2019-12-11 Control method and system for data set safety sharing

Publications (2)

Publication Number Publication Date
CN111046424A CN111046424A (en) 2020-04-21
CN111046424B true CN111046424B (en) 2022-04-12

Family

ID=70235829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911270237.0A Active CN111046424B (en) 2019-12-11 2019-12-11 Control method and system for data set safety sharing

Country Status (1)

Country Link
CN (1) CN111046424B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114491611B (en) * 2022-04-15 2022-06-21 广州万协通信息技术有限公司 Security chip anti-attack method and device based on backup data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101116080A (en) * 2005-02-04 2008-01-30 皇家飞利浦电子股份有限公司 Method, device, system, token creating authorized domains
CN105072180A (en) * 2015-08-06 2015-11-18 武汉科技大学 Cloud storage data security sharing method with permission time control
CN107528848A (en) * 2017-09-04 2017-12-29 上海海事大学 A kind of sensitive data of cloud storage system shares safely and self-destruction method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150143107A1 (en) * 2013-11-18 2015-05-21 Madhav K. Kale Data security tools for shared data
US10592108B2 (en) * 2014-09-30 2020-03-17 Anthony Tan Secured storage system with temporary external assignable memory
US9565184B2 (en) * 2014-09-30 2017-02-07 Anthony Tan Digital certification analyzer temporary external secured storage

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101116080A (en) * 2005-02-04 2008-01-30 皇家飞利浦电子股份有限公司 Method, device, system, token creating authorized domains
CN105072180A (en) * 2015-08-06 2015-11-18 武汉科技大学 Cloud storage data security sharing method with permission time control
CN107528848A (en) * 2017-09-04 2017-12-29 上海海事大学 A kind of sensitive data of cloud storage system shares safely and self-destruction method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于CP-ABE和区块链的数据安全共享方";黄穗 等;《计算机系统应用》;20191106;第28卷(第11期);79-86 *

Also Published As

Publication number Publication date
CN111046424A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
US10635793B2 (en) Restricted accounts on a mobile platform
CN107093228B (en) Authorization method, device and system applied to electronic lock
CN1285235C (en) Method and system of preventing handset from theft by using international id code of mobile facilities
US20030013485A1 (en) Remote control system in mobile communication terminal and method thereof
US9558341B1 (en) Integrated user profile administration tool
CN107645532B (en) User management method and device of hybrid cloud
CN109756446B (en) Access method and system for vehicle-mounted equipment
CN112532705A (en) Smart city service system based on big data
CN102104592A (en) Session migration between network policy servers
CN108881309A (en) Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform
CN110049031B (en) Interface security authentication method, server and authentication center server
CN106982430B (en) Portal authentication method and system based on user use habits
CN109150800A (en) Login access method, system and storage medium
CN111046424B (en) Control method and system for data set safety sharing
CN110766850B (en) Visitor information management method, access control system, server and storage medium
CN111181931A (en) Authorization system and method based on user terminal authentication
US20170063862A1 (en) System and method for authentication
CN112308542B (en) Method and system for realizing intelligent and non-inductive data input
CN110740122B (en) Method and device for improving safety of data warehouse
KR102020488B1 (en) An apparatus for Internet access control of IoT devices and a method therefor
CN102263797A (en) Session control method and device
CN113691539A (en) Enterprise internal unified function authority management method and system
KR101313108B1 (en) User data management server and operating method thereof, user terminal and recording medium
CN111447090A (en) Configuration management and control system among multi-service systems
CN114844961B (en) Distributed system protocol intercommunication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230803

Address after: Building G1, No.17 Software Road, Tianhe District, Guangzhou City, Guangdong Province, 510285

Patentee after: GUANGZHOU BINGO SOFTWARE CO.,LTD.

Address before: 510631 School of computer science, South China Normal University, 55 Zhongshan Avenue West, Tianhe District, Guangzhou City, Guangdong Province

Patentee before: SOUTH CHINA NORMAL University

TR01 Transfer of patent right