CN112184150A - Multi-party approval method, device and system in data sharing exchange and electronic device - Google Patents

Multi-party approval method, device and system in data sharing exchange and electronic device Download PDF

Info

Publication number
CN112184150A
CN112184150A CN202010980677.1A CN202010980677A CN112184150A CN 112184150 A CN112184150 A CN 112184150A CN 202010980677 A CN202010980677 A CN 202010980677A CN 112184150 A CN112184150 A CN 112184150A
Authority
CN
China
Prior art keywords
resource
use request
approval
signature
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010980677.1A
Other languages
Chinese (zh)
Inventor
谈修竹
范渊
刘博�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN202010980677.1A priority Critical patent/CN112184150A/en
Publication of CN112184150A publication Critical patent/CN112184150A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Databases & Information Systems (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a multi-party approval method, a device, a system and an electronic device in data sharing exchange, wherein the multi-party approval method comprises the following steps: receiving a resource use request initiated by a resource requester; sending the resource use request to a resource owner for signature, and carrying out signature verification on the resource use request signed by the resource owner; and carrying out approval according to the verification result, and further returning the resource matched with the resource use request to the resource requester under the condition that the approval is passed. By the method and the device, the problem of low processing safety of data sharing and exchange is solved, and authorized use of the resource after approval of a resource owner by a resource requester is realized.

Description

Multi-party approval method, device and system in data sharing exchange and electronic device
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method, an apparatus, a system, and an electronic apparatus for multi-party approval in data sharing exchange.
Background
At present, information processing systems of application, flow and data belonging to organizations and businesses per se are generally designed and built by various governments and enterprises; however, in the related art, in the information processing system which is independent, heterogeneous and covers respective service contents, due to different periods of system design and construction and different service modes, the information-based construction lacks effective overall planning and is repeatedly constructed; the system is lack of a uniform design standard, most systems are developed by different manufacturers on different platforms and by using different languages, information exchange is difficult to share, and a large amount of information islands and flow islands exist, so that the processing safety of data sharing exchange is low.
At present, no effective solution is provided for the problem of low processing security of data sharing exchange in the related technology.
Disclosure of Invention
The embodiment of the application provides a multi-party approval method, device, system and electronic device in data sharing exchange, so as to at least solve the problem of low processing safety of data sharing exchange in the related technology.
In a first aspect, an embodiment of the present application provides a multi-party approval method in data sharing exchange, where the method includes:
receiving a resource use request initiated by a resource requester;
sending the resource use request to a resource owner for signature, and carrying out signature verification on the resource use request signed by the resource owner;
and carrying out approval according to the verification result, and further returning the resource matched with the resource use request to the resource requester under the condition that the approval is passed.
In some embodiments, the sending the resource usage request to a resource owner for signing, and the signature verification of the resource usage request signed by the resource owner includes:
sending the resource use request;
and after the resource owner signs the resource use request according to the local private key file, verifying the signed resource use request through a public key.
In some embodiments, the sending the resource usage request to a resource owner for signing, and the signature verification of the resource usage request signed by the resource owner includes:
sending the resource use request;
and aiming at the detected USBKey information, after the resource owner signs the resource use request according to the USBKey information, verifying the signed resource use request.
In some embodiments, the returning the resource matching the resource usage request to the resource requester if the approval is passed includes:
performing data exchange application according to the resource use request, and constructing a data exchange task on a bottom layer according to the data exchange application;
and executing the data exchange task scheduling, and sharing or exchanging the matched resources to the resource request party.
In some of these embodiments, the resource usage request comprises: requestor information and resource objects;
wherein the requester information includes: visitor IP and visitor user; the resource object includes: data sets, programs, and operational instructions in a shared environment.
In a second aspect, an embodiment of the present application provides an apparatus for multi-party approval in data sharing exchange, where the apparatus includes: the system comprises a receiving module, a signature module and an approval module;
the receiving module is used for receiving a resource use request initiated by a resource requester;
the signature module is used for sending the resource use request to a resource owner for signature and carrying out signature verification on the resource use request signed by the resource owner;
and the approval module is used for performing approval according to the verification result and further returning the resource matched with the resource use request to the resource requester under the condition that the approval is passed.
In some embodiments, the signing module is further configured to verify, by a public key, the resource usage request obtained after the resource owner signs the resource usage request according to the local private key file.
In a third aspect, an embodiment of the present application provides a multi-party approval system in data sharing exchange, where the system includes a first terminal, a second terminal, and a server;
the server is used for receiving a resource use request initiated by a resource requester on the first terminal through a data sharing exchange platform on the server;
the server sends the resource use request to a resource owner for signature, and carries out signature verification on the resource use request signed by the resource owner;
and the server carries out approval according to the verification result through the data sharing exchange platform, and then returns the resource matched with the resource use request to the resource requester under the condition of passing approval.
In a fourth aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor, when executing the computer program, implements the multi-party approval method in the data sharing exchange according to the first aspect.
In a fifth aspect, the present application provides a storage medium, on which a computer program is stored, where the program, when executed by a processor, implements the multi-party approval method in data sharing exchange as described in the first aspect.
Compared with the related art, the multi-party approval method, the device, the system and the electronic device in the data sharing exchange provided by the embodiment of the application receive the resource use request initiated by the resource requesting party; sending the resource use request to a resource owner for signature, and carrying out signature verification on the resource use request signed by the resource owner; and the resource is approved according to the verification result, and then the resource matched with the resource use request is returned to the resource requester under the condition that the approval is passed, so that the problem of low processing safety of data sharing exchange is solved, and the authorized use of the resource approved by the resource owner by the resource requester is realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic diagram of an application scenario of a multi-party approval method in data sharing exchange according to the present application;
FIG. 2 is a flow chart of a method for multi-party approval in a data sharing exchange according to the present application;
FIG. 3 is a flow chart of another method for multi-party approval in a data sharing exchange according to the present application;
FIG. 4 is a flow chart of a method for multi-party approval in a data sharing exchange according to the present application;
FIG. 5 is a block diagram of a multi-party approval apparatus in a data sharing exchange according to the present application;
FIG. 6 is a block diagram of an alternative multi-party approval apparatus for data sharing exchange according to the present application;
FIG. 7 is a block diagram of the interior of a computer device according to the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference herein to "a plurality" means greater than or equal to two. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
In this embodiment, an application scenario of a multi-party approval method in data sharing exchange is provided, and fig. 1 is a schematic view of an application scenario of a multi-party approval method in data sharing exchange according to the present application, as shown in fig. 1, a first terminal 12 and a second terminal 14 respectively communicate with a server 16 through a network. The server 16 receives a resource usage request initiated by a resource requester on the first terminal 12 through a data sharing exchange platform on the server 16, and sends the resource usage request to a resource owner on the second terminal 25; the server 16 verifies the resource usage request obtained after the resource owner signs the resource usage request, and performs approval according to the verification result through the data sharing exchange platform, and further returns the resource matched with the resource usage request to the resource requester under the condition that the approval is passed. The first terminal 12 and the second terminal 14 may be, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the first terminal 12 and the second terminal 14 may also be the same device; the server 16 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In this embodiment, a multi-party approval method in data sharing exchange is provided, and fig. 2 is a flowchart of a multi-party approval method in data sharing exchange according to the present application, as shown in fig. 2, the flowchart includes the following steps:
step S202, receiving a resource use request initiated by a resource requester. Specifically, a resource use request is received through a data sharing exchange platform, and the request is distributed to a corresponding owner of the resource; it should be noted that the resource usage request includes: requestor information and resource objects; the requester information includes, but is not limited to, visitor Internet Protocol (IP for short) and a visitor; the resource objects include, but are not limited to, data sets, programs, and operational instructions in a shared environment.
Step S204, the resource use request is sent to the resource owner for signature, and the resource use request signed by the resource owner is signed and verified. After receiving the resource use request in step S202, the resource owner performs a signature process on the resource use request, that is, the digital signature process can be divided into two stages, namely, a digital signature and a signature verification, and after the identity validity of both the resource requester and the resource owner can be verified by using their respective digital certificates, the resource requester and the resource owner perform a digital signature and signature verification process. The digital signature can be realized by combining a hash function and an asymmetric encryption algorithm.
For example, the signature can be performed by a Message-Digest Algorithm 5 (MD 5 for short), the whole resource use request is regarded as a large text Message, a unique MD5 value is generated by an irreversible string transformation Algorithm, and the resource owner can be prevented from being repudiated by combining with a third-party certification authority; alternatively, the signature may be implemented by an RSA Algorithm or a Secure Hash Algorithm 1(Secure Hash Algorithm 1, abbreviated as SHA-1).
And step S206, carrying out approval according to the verification result, and further returning the resource matched with the resource use request to the resource requester under the condition that the approval is passed. Specifically, the result verified in the step S204 is approved by the data sharing switching platform, and if the result that is verified is obtained by the approval, it indicates that the signature of the resource usage request is confirmed to be consistent, so that the resource matching the resource usage request can be returned to the resource requester; if the approval is a failure result, an access refusing instruction can be returned; including but not limited to shared data, shared programs, or systems.
Through the steps S202 to S206, the resource owner signs the resource usage request initiated by the resource requestor and verifies the signed resource usage request through the data sharing exchange platform, so that the resource owner performs trusted, unforgeable and unreliability signature verification and confirmation on the resource usage request, and determines whether to issue the resource to the resource requestor according to the verification result, and then performs resource access to complete transaction calculation, so that the signature can be verified through the data sharing exchange platform and then the data is distributed, the data sharing is safe, the problem of low processing safety of data sharing exchange is solved, and authorized use of the resource approved by the resource owner by the resource requestor is realized.
In some embodiments, a method for multi-party approval in a data sharing exchange is provided, and fig. 3 is a flowchart of another method for multi-party approval in a data sharing exchange according to the present application, as shown in fig. 3, the flowchart includes the following steps:
step S302, sending the resource use request; and after the resource owner signs the resource use request according to the local private key file, verifying the signed resource use request through a public key. In the formal digital signature, a resource owner firstly adopts a Hash algorithm to a received resource use request to obtain a message digest with a fixed length; and then signing the message digest according to the local private key file to form a digital signature of the resource owner. The digital signature is sent to the resource requester as a team component together with the original text; the resource request party firstly decrypts the digital signature by using the public key of the resource owner to obtain the digital abstract of the sender, then carries out hash calculation on the original text by using the same hash function to obtain a new message abstract, and finally compares the message abstract with the received message abstract to carry out verification. It should be noted that the local private key file may be stored in advance, and the local private key file includes private keys corresponding to all resource owners.
Through the step S302, the resource owner signs the resource usage request according to the local private key file, and verifies the resource usage request obtained after the signature through the public key, so that the resource usage request can be completely standardized, visualized and monitored online for operation, thereby ensuring efficient and stable shared exchange of data resources.
In some embodiments, a method for multi-party approval in a data sharing exchange is provided, fig. 4 is a flowchart of a method for multi-party approval in a data sharing exchange according to the present application, and as shown in fig. 4, the flowchart includes the following steps:
step S402, sending the resource use request; and aiming at the detected USBKey information, after the resource owner signs the resource use request according to the USBKey information, verifying the signed resource use request. The USBKey is a hardware device USBKey with a USB interface, a built-in single chip microcomputer or a smart card chip is arranged in the USBKey, a certain storage space is provided, a private key and a digital certificate of a user can be stored, and the authentication of the user identity is realized by utilizing a public key algorithm arranged in the USBKey. The digital signature process based on the USBKey is as follows: a user generates a key pair through the USBKey, then applies for a digital Certificate to a Certificate Authority (CA), the digital Certificate applied from the CA is stored in the USBKey, and a Chip Scale Package (CSP) can read the Certificate from the USBKey through a command, but the private key of the user cannot be read by any command. During digital signature, the CSP sends a signature command to the USBKey, the signature operation can be automatically carried out in the USBKey, and the signature result is sent out, so that all the operations are carried out in the USBKey, and the private key can never leave the USBKey.
Through the step S402, the resource usage information is signed and verified based on the USBkey hardware device, each USBkey has a hardware Personal Identification Number (PIN) code protection, and the resource requester can operate with the USBkey only if the USBkey and the PIN code are owned simultaneously; compared with single password authentication in the related technology, the security of data sharing exchange is improved to a great extent. In addition, the USBKey is internally provided with the security chip, a secure data processing system can be constructed by combining a Public Key Infrastructure (PKI) technology, and the operation processing of various algorithms such as data summarization, data encryption and decryption, digital signature and the like used in the system is completely performed in the USBKey, so that the security is greatly improved, and the hardware operation efficiency is greatly improved compared with that of software operation.
In some embodiments, the process of returning the resource matching the resource usage request to the resource requestor in case of approval further comprises the following steps: performing data exchange application according to the resource use request, and constructing a data exchange task on a bottom layer through a data sharing exchange platform according to the data exchange application; and executing the data exchange task scheduling, and sharing or exchanging the matched resources to the resource requesting party, so that the data sharing exchange platform can quickly and accurately share or exchange the resources after the multi-party approval is passed.
The embodiments of the present application are described and illustrated below by means of preferred embodiments. In a preferred embodiment, the method for multi-party approval in data sharing exchange specifically comprises the following steps:
step S502, initiating a resource use request: the resource request party initiates a resource use request to the resource owner. The resources include, but are not limited to, shared data, shared programs, or systems; the resource use request information includes but is not limited to requester information, resource object; the requester information includes but is not limited to visitor IP, visiting user; the resource object includes, but is not limited to, a data set in a shared environment, or a program, corresponding operation, in a shared environment.
Step S504, signing the request: the data sharing exchange platform receives the resource use request and distributes the request to the corresponding owner of the resource; the resource owner receives the resource request in step S502 and signs the resource usage request. The signature mode includes but is not limited to a hardware mode USBKey and a private key file. The private key file signature is that the resource owner uses the local private key file to sign the resource use request; and the resource use request is signed in a hardware mode USBKey, namely after the resource owner verifies the request USBKey information.
And step S506, after signature, the public key verifies the signature, and after the data sharing exchange platform verifies the resource use request after signature through the public key, the corresponding resource is returned to the resource use requester according to the authorization result.
It should be understood that, although the steps in the flowcharts of fig. 2 to 4 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-4 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least some of the sub-steps or stages of other steps.
In this embodiment, a multi-party approval apparatus in data sharing exchange is provided, and the apparatus is used to implement the foregoing embodiments and preferred embodiments, and the details of which have been already described are not repeated. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 5 is a block diagram illustrating a multi-party approval apparatus in data sharing exchange according to the present application, and as shown in fig. 5, the apparatus includes: a receiving module 52, a signature module 54, and an approval module 56; the receiving module 52 is configured to receive a resource usage request initiated by a resource requestor; the signature module 54 is configured to send the resource usage request to a resource owner for signature, and perform signature verification on the resource usage request signed by the resource owner; the approval module 56 is configured to approve according to the verification result, and then return the resource matching with the resource usage request to the resource requestor when the approval is passed.
Through the embodiment, the signature module 54 signs the resource use request initiated by the resource requester through the resource owner, and verifies the signed resource use request through the data sharing exchange platform, so that the resource owner verifies and confirms the trusted, unforgeable and unreliable signature of the resource use request, the approval module 56 approves and judges whether to issue the resource to the resource requester according to the verification result, and then performs resource access to complete transaction calculation, so that the signature can be verified through the data sharing exchange platform and then distributes data, the data sharing is safe, the problem of low processing safety of data sharing exchange is solved, and authorized use of the resource approved by the resource owner of the resource requester is realized.
In some embodiments, the signature module 54 is further configured to verify, by using the public key, the resource usage request obtained after the resource owner signs the resource usage request according to the local private key file.
In some embodiments, a multi-party approval apparatus in a data sharing exchange is provided, fig. 6 is a block diagram illustrating a structure of another multi-party approval apparatus in a data sharing exchange according to the present application, and as shown in fig. 6, the apparatus includes all modules shown in fig. 5, and further includes: a detection module 62; the detecting module 62 is configured to verify the signed resource usage request after the resource owner signs the resource usage request according to the USBkey information for the detected USBkey information.
Referring to fig. 5, in some embodiments, the approval module 56 is further configured to apply for data exchange according to the resource usage request, and construct a data exchange task at a bottom layer according to the data exchange application; the approval module 56 performs the data exchange task scheduling, and shares or exchanges the matched resource to the resource requester.
In some of these embodiments, the resource usage request includes: requestor information and resource objects; wherein the requester information includes: visitor IP and visitor user; the resource object includes: data sets, programs, and operational instructions in a shared environment.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
In the embodiment, a multi-party approval system in data sharing exchange is provided, which comprises a first terminal 12, a second terminal 14 and a server 16; the server 16 is configured to receive, through the data sharing switching platform on the server 16, a resource usage request initiated by a resource requestor on the first terminal 12; the server 16 sends the resource use request to a resource owner for signature, and performs signature verification on the resource use request signed by the resource owner; the server 16 performs approval according to the result of the verification through the data sharing exchange platform, and further returns the resource matching the resource use request to the resource requester when the approval is passed.
Through the embodiment, the server 16 signs the resource use request initiated by the resource requester through the resource owner, and verifies the signed resource use request through the data sharing exchange platform, so that the resource owner performs credible, unforgeable and unreliable signature verification and confirmation on the resource use request, and judges whether to issue the resource to the resource requester according to the verification result, and then performs resource access to complete transaction calculation, so that the signature can be verified through the data sharing exchange platform and then the data is distributed, the data sharing is safe, the problem of low processing safety of data sharing exchange is solved, and the authorized use of the resource approved by the resource owner of the resource requester is realized.
In some embodiments, the server 16 is further configured to verify, by using the public key, the resource usage request obtained after the resource owner signs the resource usage request according to the local private key file.
In some embodiments, the server 16 is further configured to verify the signed resource usage request after the resource owner signs the resource usage request according to the USBkey information for the detected USBkey information.
In some embodiments, the server 16 is further configured to perform a data exchange application according to the resource usage request, and construct a data exchange task at a bottom layer according to the data exchange application; and executing the data exchange task scheduling, and sharing or exchanging the matched resources to the resource requester.
In some of these embodiments, the server 16 is further configured to request the resource usage including: requestor information and resource objects; wherein the requester information includes: visitor IP and visitor user; the resource object includes: data sets, programs, and operational instructions in a shared environment.
In this embodiment, a computer device is provided, the computer device may be a server, and fig. 7 is a structural diagram of the inside of a computer device according to the present application, as shown in fig. 7. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is for storing resource usage request data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method for multi-party approval in a data sharing exchange.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The present embodiment also provides an electronic device comprising a memory having a computer program stored therein and a processor configured to execute the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
and S1, receiving the resource use request initiated by the resource requester and sending the resource use request to the resource owner.
And S2, verifying the resource use request obtained by the resource owner signing the resource use request.
And S3, performing examination and approval according to the verification result, and returning the resource matched with the resource use request to the resource requester under the condition that the examination and approval is passed.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
In addition, in combination with the multi-party approval method in data sharing exchange in the foregoing embodiments, the embodiments of the present application may provide a storage medium to implement. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any one of the above-described embodiments of a method for multi-party approval in a data sharing exchange.
It should be understood by those skilled in the art that various features of the above-described embodiments can be combined in any combination, and for the sake of brevity, all possible combinations of features in the above-described embodiments are not described in detail, but rather, all combinations of features which are not inconsistent with each other should be construed as being within the scope of the present disclosure.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A multi-party approval method in data sharing exchange is characterized by comprising the following steps:
receiving a resource use request initiated by a resource requester;
sending the resource use request to a resource owner for signature, and carrying out signature verification on the resource use request signed by the resource owner;
and carrying out approval according to the verification result, and further returning the resource matched with the resource use request to the resource requester under the condition that the approval is passed.
2. The multi-party approval method of claim 1, wherein the sending the resource usage request to a resource owner for signature, and the signature verification of the resource usage request signed by the resource owner comprises:
sending the resource use request;
and after the resource owner signs the resource use request according to the local private key file, verifying the signed resource use request through a public key.
3. The multi-party approval method of claim 1, wherein the sending the resource usage request to a resource owner for signature, and the signature verification of the resource usage request signed by the resource owner comprises:
sending the resource use request;
and aiming at the detected USBKey information, after the resource owner signs the resource use request according to the USBKey information, verifying the signed resource use request.
4. The multi-party approval method of claim 1, wherein the returning the resource matching the resource usage request to the resource requestor if approval is passed comprises:
performing data exchange application according to the resource use request, and constructing a data exchange task on a bottom layer according to the data exchange application;
and executing the data exchange task scheduling, and sharing or exchanging the matched resources to the resource request party.
5. The multi-party approval method of any one of claims 1 to 4, wherein the resource usage request comprises: requestor information and resource objects;
wherein the requester information includes: visitor IP and visitor user; the resource object includes: data sets, programs, and operational instructions in a shared environment.
6. A multi-party approval apparatus in a data sharing exchange, the apparatus comprising: the system comprises a receiving module, a signature module and an approval module;
the receiving module is used for receiving a resource use request initiated by a resource requester;
the signature module is used for sending the resource use request to a resource owner for signature and carrying out signature verification on the resource use request signed by the resource owner;
and the approval module is used for performing approval according to the verification result and further returning the resource matched with the resource use request to the resource requester under the condition that the approval is passed.
7. The multi-party approval apparatus of claim 6, wherein the signature module is further configured to verify the signed resource usage request with a public key after the resource owner signs the resource usage request according to a local private key file.
8. A multi-party approval system in data sharing exchange is characterized by comprising a first terminal, a second terminal and a server;
the server is used for receiving a resource use request initiated by a resource requester on the first terminal through a data sharing exchange platform on the server;
the server sends the resource use request to a resource owner for signature, and carries out signature verification on the resource use request signed by the resource owner;
and the server carries out approval according to the verification result through the data sharing exchange platform, and then returns the resource matched with the resource use request to the resource requester under the condition of passing approval.
9. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and the processor is configured to execute the computer program to perform the multi-party approval method in the data sharing exchange according to any one of claims 1 to 5.
10. A storage medium having a computer program stored thereon, wherein the computer program is configured to execute the multi-party approval method in the data sharing exchange according to any one of claims 1 to 5.
CN202010980677.1A 2020-09-17 2020-09-17 Multi-party approval method, device and system in data sharing exchange and electronic device Pending CN112184150A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010980677.1A CN112184150A (en) 2020-09-17 2020-09-17 Multi-party approval method, device and system in data sharing exchange and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010980677.1A CN112184150A (en) 2020-09-17 2020-09-17 Multi-party approval method, device and system in data sharing exchange and electronic device

Publications (1)

Publication Number Publication Date
CN112184150A true CN112184150A (en) 2021-01-05

Family

ID=73920298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010980677.1A Pending CN112184150A (en) 2020-09-17 2020-09-17 Multi-party approval method, device and system in data sharing exchange and electronic device

Country Status (1)

Country Link
CN (1) CN112184150A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338031A (en) * 2021-11-22 2022-04-12 珠海格力电器股份有限公司 Data sharing method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102176709A (en) * 2010-12-13 2011-09-07 北京交通大学 Method and device with privacy protection function for data sharing and publishing
CN103401844A (en) * 2013-07-12 2013-11-20 天地融科技股份有限公司 Operation request processing method and system
CN105791272A (en) * 2016-02-23 2016-07-20 青岛海尔智能家电科技有限公司 Method and device for secure communication in Internet of Things
CN106453195A (en) * 2015-08-04 2017-02-22 腾讯科技(深圳)有限公司 Resource request processing, authentication request processing and authentication method, system and device
CN109919617A (en) * 2019-03-17 2019-06-21 中国建设银行股份有限公司 A kind of endorsement method, system, device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102176709A (en) * 2010-12-13 2011-09-07 北京交通大学 Method and device with privacy protection function for data sharing and publishing
CN103401844A (en) * 2013-07-12 2013-11-20 天地融科技股份有限公司 Operation request processing method and system
CN106453195A (en) * 2015-08-04 2017-02-22 腾讯科技(深圳)有限公司 Resource request processing, authentication request processing and authentication method, system and device
CN105791272A (en) * 2016-02-23 2016-07-20 青岛海尔智能家电科技有限公司 Method and device for secure communication in Internet of Things
CN109919617A (en) * 2019-03-17 2019-06-21 中国建设银行股份有限公司 A kind of endorsement method, system, device and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马刚: "《电子商务支付与结算》", 东北财经大学出版社 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338031A (en) * 2021-11-22 2022-04-12 珠海格力电器股份有限公司 Data sharing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109951489B (en) Digital identity authentication method, equipment, device, system and storage medium
CN111213171B (en) Method and apparatus for secure offline payment
EP3985916A1 (en) Secure dynamic threshold signature scheme employing trusted hardware
CN108259438B (en) Authentication method and device based on block chain technology
CN112104665B (en) Block chain-based identity authentication method and device, computer and storage medium
US8689290B2 (en) System and method for securing a credential via user and server verification
CN111383021B (en) Node management method, device, equipment and medium based on block chain network
US10270757B2 (en) Managing exchanges of sensitive data
US20120084565A1 (en) Cryptographic device that binds an additional authentication factor to multiple identities
CN103718500A (en) Credential validation
Yan et al. A lightweight authentication and key agreement scheme for smart grid
EP3133791B1 (en) Double authentication system for electronically signed documents
CN111461799B (en) Data processing method, data processing device, computer equipment and medium
CN114143312A (en) Block chain-based edge computing terminal authentication method, system and equipment
US8904508B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
CN112184150A (en) Multi-party approval method, device and system in data sharing exchange and electronic device
CN111901359A (en) Resource account authorization method, device, system, computer equipment and medium
CN112150151B (en) Secure payment method, apparatus, electronic device and storage medium
CN111489157B (en) Method and system for controlling blockchain transaction
CN117063174A (en) Security module and method for inter-app trust through app-based identity
CN113595742A (en) Data transmission method, system, computer device and storage medium
WO2020260195A1 (en) Cryptographic signing of a data item
CN113572616B (en) Authentication method and device based on distributed bidding platform and related equipment
CN116095671B (en) Resource sharing method based on meta universe and related equipment thereof
US12034865B2 (en) Secure dynamic threshold signature scheme employing trusted hardware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105