CN114780963A - Security reinforcement method and system for identification analysis data - Google Patents

Security reinforcement method and system for identification analysis data Download PDF

Info

Publication number
CN114780963A
CN114780963A CN202210385137.8A CN202210385137A CN114780963A CN 114780963 A CN114780963 A CN 114780963A CN 202210385137 A CN202210385137 A CN 202210385137A CN 114780963 A CN114780963 A CN 114780963A
Authority
CN
China
Prior art keywords
data
identification
information
analysis
requester
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210385137.8A
Other languages
Chinese (zh)
Inventor
陈晨
刘文军
陈涛
周正宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Lixing Information Technology Co ltd
Original Assignee
Suzhou Lixing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Lixing Information Technology Co ltd filed Critical Suzhou Lixing Information Technology Co ltd
Priority to CN202210385137.8A priority Critical patent/CN114780963A/en
Publication of CN114780963A publication Critical patent/CN114780963A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a security reinforcement method and a system for identification analysis data, wherein the method comprises the following steps: a requester initiates an identification analysis request and verifies the identity of the requester, wherein the identity of the requester comprises an information producer and an information consumer; if the identity of the requester is the information producer, a metadata model is constructed, desensitization rules and strategies are set, data processing is carried out according to the metadata model, the desensitization rules and the strategies, and an identification registration request is initiated for the processed data; if the identity of the requester is the information consumer, the identifier analysis request is forwarded to the recursive node after the verification is passed, the identifier analysis result returned by the recursive node is decrypted, and the identifier analysis result is returned to the consumer according to the access control strategy. The method helps enterprises to rapidly access the industrial Internet identification analysis system, and the data security and data privacy problems are guaranteed.

Description

Security reinforcement method and system for identification-oriented analysis data
Technical Field
The invention relates to the technical field of industrial internet identification analysis, in particular to a security reinforcement method and system for identification analysis data.
Background
The industrial internet identification analysis is used as a novel infrastructure, supports industrial data circulation and information interaction of people, machines, objects, materials, methods and the like, is a foundation for breaking an information island and realizing information sharing, and is gradually becoming new kinetic energy for driving economic growth. Although many enterprises have conducted some exploration on the identification application, the identification system itself is in fast iteration, and work needs to be carried out on the aspects of access, use convenience and security of the identification system.
On one hand, most of small and medium-sized enterprises have insufficient informatization level, and an access identifier analysis system has a certain threshold, so that the cooperation degree among the industrial enterprises is low. On the other hand, the identifier analysis technology is used for solving an 'information isolated island' and realizing information sharing, but at present, recursive analysis information is transparent, privacy data protection is lacked, certain data risk exists, and fine granularity management is not performed on identities and authorities, so that many enterprises are unwilling to access an identifier analysis system.
Therefore, an identification analysis public service platform is established, an encryption mechanism and a fine-grained authority rapid checking mechanism are designed, and a cross-industry, cross-field and cross-analysis protocol recognized trust system is realized. Meanwhile, a corresponding identification analysis adapter is provided to help enterprises to quickly access an industrial internet identification analysis system, registration analysis application of the identification is realized, industrial internet identification analysis application and popularization and ecological construction process are perfected, and existing data resources and capacity in industrial enterprises are integrated to form open normal.
Disclosure of Invention
The invention aims to provide a security reinforcement method and system for identification analysis data, so as to realize the authority control and the sharing of identification information according to requirements.
In order to achieve the purpose, the invention provides the following scheme:
a security reinforcing method for identification-oriented analysis data comprises the following steps:
a requester initiates an identification analysis request and verifies the identity of the requester, wherein the identity of the requester comprises an information producer and an information consumer;
if the identity of the requester is an information producer, a metadata model is constructed, desensitization rules and strategies are set, data processing is carried out according to the metadata model, the desensitization rules and the strategies, and an identification registration request is initiated for the processed data;
if the identity of the requester is the information consumer, the identifier analysis request is forwarded to the recursive node after the verification is passed, the identifier analysis result returned by the recursive node is decrypted, and the identifier analysis result is returned to the consumer according to the access control strategy.
Preferably, the information producer and the information consumer perform identifier registration or identifier analysis, and apply for a trusted certificate before performing the identifier registration or identifier analysis, where the trusted certificate is obtained by encrypting basic information and public key information of an enterprise through a private key of a platform CA, and is used to ensure the certainty of the identity of a requester, and the confidentiality and integrity of information.
Preferably, when the information producer and the information consumer carry the trusted certificate to perform identifier registration or identifier resolution, the certificate is decrypted by using a public key, and if the decryption is successful, the identity authentication of the requester is completed; if the decryption is not successful, the identity of the requester is abnormal.
Preferably, the information producer establishes the metadata model according to a service scenario, extracts metadata for describing features and contents of the information resources from the information resources, and provides complete data definition information for data users to form a standard specification, wherein the complete data definition information includes a chinese name, an english name, a data type, a minimum length, a maximum length, whether padding is necessary, and a data authority attribute.
Preferably, fine-grained authority design is performed through metadata standard specifications, differentiated authority strategies are set based on different access subjects, field-level data access control strategies are designed for the access data, and fine-grained access control is achieved for the access subjects and the accessed data, wherein the access subjects comprise people, equipment and nodes.
Preferably, the information producer can also interface the enterprise service system, perform data integration and fusion, perform a hash algorithm on the data information to generate a digest, and perform encryption processing on the data by using an enterprise private key to obtain a digital signature.
Preferably, after receiving the identifier registration request, decrypting by using a private key to obtain a symmetric key, decrypting data and a digital signature by using the symmetric key, comparing the digital signature with the data, and if the comparison is passed, representing that the data is complete and effective; and then, encrypting the data and the signature by using a symmetric encryption mode, encrypting the symmetric encryption key by using a public key, and sending the encrypted data and the signature together for identification registration.
Preferably, the information consumer uses an identifier resolution adapter to carry a trusted certificate to initiate an identifier resolution request to the identifier resolution public service platform, verifies the identity of the requester through the identifier resolution public service platform, and forwards the identifier resolution request to the recursion node after the verification is passed.
Preferably, the identifier resolution public service platform performs data format processing on the result of the recursive node resolution according to a metadata template and an authority policy, queries a symmetric key of an enterprise node to which the identifier belongs, encrypts the symmetric key by using a platform private key, and returns the encrypted symmetric key and the processed data to the identifier resolution adapter; the identification adaptation analyzer receives the information returned by the identification analysis public service platform, decrypts by using a public key of the identification analysis public service platform to obtain a symmetric key, decrypts sensitive data by using the symmetric key to finally obtain an identification analysis result, and returns the identification analysis result to the access subject based on an access control strategy, wherein the sensitive data comprises private data of access enterprise node production and operation.
The system is applied to a security reinforcing method for the identification-oriented analysis data, and comprises the following steps:
the identification analysis public service platform comprises: the system is used for verifying the identity of the requester and providing adaptation service based on the verification result;
the identification analysis adapter: the system is used for processing data based on the identity of the requester, and initiating an identification registration request or obtaining an identification analysis result;
an enterprise data acquisition unit: and the data source is used for acquiring a data source accessed to the enterprise node, and an identifier registration request is initiated to the identifier analysis public service platform after data encryption processing is carried out on the basis of the identifier analysis adapter.
The invention has the beneficial effects that:
1. by the identification analysis data security reinforcing method and the identification analysis data security reinforcing method packaged as the identification analysis public service platform, seamless butt joint of an identification analysis system and an enterprise industrial information system is realized based on a platform service mode, an enterprise is helped to quickly access the industrial internet identification analysis system, and the identification analysis application threshold is remarkably reduced;
2. aiming at the problems of transparent recursive analysis information and lack of privacy data protection at present, the identification analysis public service platform and the identification analysis adapter provided by the invention realize a security control strategy of a combination of 'role + field level + desensitization' in identification data, greatly guarantee the problems of identification data security and data privacy, and lay a solid foundation for the industrial innovation application based on identification.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is an overall architecture diagram of a security reinforcing method and system for identifier-oriented parsed data according to an embodiment of the present invention;
fig. 2 is an identity authentication flowchart of a security reinforcing method and system for identifier-oriented analysis data according to an embodiment of the present invention;
fig. 3 is a sequence diagram of identifier registration in a security reinforcing method and system for identifier-oriented parsed data according to an embodiment of the present invention;
fig. 4 is a sequence diagram of identifier resolution of a security reinforcing method and system for identifier resolution data according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to make the aforementioned objects, features and advantages of the present invention more comprehensible, the present invention is described in detail with reference to the accompanying drawings and the detailed description thereof.
Referring to fig. 1-4, a security reinforcing method for label-oriented parsed data includes:
initiating an identification analysis request through an identification analysis public service platform based on an identification analysis adapter, and verifying the identity of a requester by the identification analysis public service platform, wherein the identity of the requester comprises an information producer and an information consumer;
if the identity of the requester is an information producer, a metadata model is built on the identification analysis public service platform, desensitization rules and strategies are set, the identification analysis adapter carries out data processing according to the metadata model, the desensitization rules and the strategies, and an identification registration request is sent to the identification analysis public service platform for the processed data;
if the identity of the requester is an information consumer, the identifier analysis request is forwarded to a recursion node after the verification is passed to obtain an analysis result, the analysis result is processed through the identifier analysis public service platform, and the processed result is returned to the identifier analysis adapter for decryption to obtain an identifier analysis result.
According to the further optimization scheme, the information producer and the information consumer apply for a trusted certificate to an identification analysis public service platform before using the identification analysis adapter to perform identification registration or identification analysis, wherein the trusted certificate is obtained by encrypting basic information and public key information of an enterprise through a private key of a platform CA (certificate authority) and is used for ensuring the certainty of the identity of a requester, and the confidentiality and the integrity of the information.
Fig. 2 shows an identity authentication flowchart of a security reinforcing method for identifier resolution data according to an embodiment of the present invention, which includes the following steps:
step 1: application for trusted certificate
Before using the identification resolving adapter to perform identification registration or identification resolving, the information producer and the information consumer apply for a trusted certificate from the identification resolving public service platform. The trusted certificate is obtained by encrypting basic information, a public key and other information of the enterprise through a private key of the platform CA.
The role of the trusted certificate is to ensure the certainty of identity, the confidentiality and the integrity of information. Identity certainty: the information sender considers whether the shared information is received by the information receiver, and the information receiver also can worry whether the received information is real and complete, so that the information main body can be conveniently and reliably confirmed to be the premise of information sharing; confidentiality of information: mainly emphasizes the feature that useful information is only used by authorized objects. In an actual service scene, the logistics and fund flow are required to be kept secret, and if the real-time position of a vehicle and payment information are known by people, the vehicle can be stolen. Therefore, the information sharing generally has the encryption requirement, and the information is prevented from being illegally leaked; integrity of the information: the index identification information is in the process of registration and analysis. The information is kept from being corrupted or modified, lost, and unauthorized alteration of the information is not possible.
And 2, step: identity verification
When the information producer and the information consumer carry the certificate to carry out identification registration or identification analysis, the public service platform for identification analysis decrypts the certificate by using the public key, and if decryption is successful, identity authentication of the requester is finished. If the decryption is not successful, the identity of the requester is indicated to have an abnormal condition.
And further optimizing the scheme, wherein the information producer establishes the metadata model according to a service scene, extracts metadata for describing the characteristics and the content of the information resources from the information resources, provides complete data definition information for data users, and forms a standard specification, wherein the complete data definition information comprises Chinese names, English names, data types, minimum lengths, maximum lengths, whether to fill in and data authority attributes.
Fig. 3 is an identifier registration timing diagram of a security reinforcing method for identifier resolution data according to an embodiment of the present application, which specifically includes the following steps:
step 1: metadata modeling
The information producer carries out metadata modeling according to a service scene, extracts data for describing characteristics and contents of the information resource, can provide complete data definition information for a data user, and forms a standardized data format by attributes such as Chinese names, English names, data types, minimum lengths, maximum lengths, whether filling is necessary or not, data authorities and the like to form a standard specification for identification registration and identification analysis.
And 2, step: fine grain privilege design
And performing fine-grained authority design on the metadata template information, reconstructing a security access mechanism aiming at the non-public and transparent identification data of the enterprise on the basis of role-based access control, designing a data access control strategy, and realizing fine-grained access control on an access subject (including people, equipment, nodes and the like) and accessed data. Specific metadata model tables can be seen in table 1 below:
TABLE 1
Figure BDA0003593316290000081
Figure BDA0003593316290000091
And step 3: data processing
An information producer uses an identification analysis adapter to connect an enterprise business system, performs data integration and fusion, performs a hash algorithm on data information to generate an abstract, and uses an enterprise private key to encrypt data to obtain a digital signature. The digital signature can realize the integrity and the validity of data, and because the private key is owned by an enterprise only, the uniqueness of a signature file can be ensured, namely: the data is signed and sent by a signer, and the signer cannot deny or cannot deny the data; the data is not modified in the process from the issuance to the reception, and the issued file is real.
And 4, step 4: data verification label
The identification analysis public service platform receives the registration request, decrypts by using a private key of the identification analysis public service platform to obtain a symmetric key, decrypts the data and the signature by using the symmetric key, and compares the signature with the data, if the comparison is passed, the data is complete and effective.
And encrypting the data and the signature by using a symmetric encryption mode, encrypting the symmetric encryption key by using a public key of the public service platform for identifier analysis, and sending the symmetric encryption key and the symmetrically encrypted data and signature to the public service platform for identifier registration. The mixed encryption mode can ensure the confidentiality of data and improve the efficiency.
And 5: identity registration
And (3) performing identifier registration on the symmetrically encrypted data by calling an IDIS interface of an industrial Internet identifier resolution system, and storing and managing the identifier and the symmetric key after successful registration.
Fine-grained authority design is carried out through metadata standard specifications, a security access mechanism is rebuilt aiming at identification data on the basis of role access control, a data access control strategy is designed, and fine-grained access control is achieved on an access subject and accessed data, wherein the access subject comprises people, equipment and nodes.
Fig. 4 is a timing diagram of identifier resolution in a security reinforcing method for identifier resolution data according to an embodiment of the present application, where the specific process includes:
an information consumer uses an identification analysis adapter to carry a certificate to initiate an identification analysis request to an identification analysis public service platform, the identity of a requester is verified through the platform, and the identification analysis request is forwarded to a recursion node after the verification is passed; the platform processes the data format of the result of the recursive node analysis according to the metadata template and the authority strategy, queries the symmetric key of the enterprise node to which the identifier belongs, encrypts the symmetric key by using a platform private key, and returns the encrypted symmetric key and the processed data to the identifier analysis adapter; and the identifier adaptation analyzer receives the information returned by the platform, decrypts by using the public key of the platform to obtain a symmetric key, and then decrypts the sensitive data by using the symmetric key to finally obtain an identifier analysis result.
A system applied to a security reinforcement method for identification-oriented analysis data comprises the following steps:
identification resolution public service platform: the system is used for being in butt joint with the identification analysis secondary node, the identification analysis adapter, the enterprise node and the business system; the identification analysis secondary node is a public node for providing identification service for a specific industry or a general platform and is used for providing identification code distribution, identification registration and data analysis service for industrial enterprises;
the identification analysis adapter: the system is used for providing identification registration, identification analysis and identification data processing services, and butting enterprise nodes and application systems to realize information acquisition, information association and information sharing;
an enterprise data acquisition unit: and the system is used for acquiring a data source accessed to the enterprise node, performing related processing such as data encryption and the like based on the identifier analysis adapter, and then initiating an identifier registration request to the identifier analysis public service platform. The enterprise node data source provides an enterprise production, management and management related data information source, and the main forms are enterprise data assets, business system data and the like, such as production equipment, monitoring equipment, information acquisition equipment, enterprise management data resources and the like; the production equipment comprises enterprise manufacturing and processing equipment and manufacturing and executing equipment; the monitoring equipment comprises an industrial camera and an early warning device; the information acquisition equipment comprises a sensor, a communication module, identification reading equipment and the like.
The above-described embodiments are only intended to describe the preferred embodiments of the present invention, and not to limit the scope of the present invention, and various modifications and improvements made to the technical solution of the present invention by those skilled in the art without departing from the spirit of the present invention should fall within the protection scope defined by the claims of the present invention.

Claims (10)

1. A security reinforcement method for identification-oriented analysis data is characterized by comprising the following steps:
a requester initiates an identification analysis request and verifies the identity of the requester, wherein the identity of the requester comprises an information producer and an information consumer;
if the identity of the requester is the information producer, a metadata model is constructed, desensitization rules and strategies are set, data processing is carried out according to the metadata model, the desensitization rules and the strategies, and an identification registration request is sent to the processed data;
if the identity of the requester is the information consumer, the identifier analysis request is forwarded to the recursion node after the verification is passed, the identifier analysis result returned by the recursion node is decrypted, and the identifier analysis result is returned to the consumer according to the access control strategy.
2. The method for strengthening security of identification-oriented analysis data according to claim 1, wherein the information producer and the information consumer perform identification registration or identification analysis, and apply for a trusted certificate before performing the identification registration or identification analysis, wherein the trusted certificate is obtained by encrypting basic information and public key information of an enterprise through a private key of a platform CA, and is used for ensuring the certainty of requester identity, confidentiality and integrity of information.
3. The security strengthening method for the identification-oriented analysis data according to claim 2, wherein when the information producer and the information consumer carry the trusted certificate to perform identification registration or identification analysis, a public key is used to decrypt the certificate, and if decryption is successful, identity authentication of a requester is completed; if the decryption is unsuccessful, the identity of the requester is abnormal.
4. The method for security reinforcement oriented to identification parsing data of claim 1, wherein the information producer builds the metadata model according to a business scenario, extracts metadata used for describing features and contents of the information resources from the information resources, and provides complete data definition information for data users to form a standard specification, wherein the complete data definition information includes a chinese name, an english name, a data type, a minimum length, a maximum length, whether to fill in, and a data authority attribute.
5. The security reinforcement method for the identification-oriented analysis data according to claim 4, characterized in that fine-grained authority design is performed through metadata standard specifications, differentiated authority policies are set based on different access subjects, meanwhile, field-level data access control policies are designed for the access data, and fine-grained access control is implemented for the access subjects and the accessed data, wherein the access subjects include people, equipment and nodes.
6. The method for strengthening security of identification-oriented analysis data according to claim 1, wherein the information producer can also interface an enterprise service system, perform data integration and fusion, perform a hash algorithm on the data information to generate a digest, and perform encryption processing on the data by using an enterprise private key to obtain a digital signature.
7. The method for security reinforcement oriented to the identification analysis data according to claim 1, wherein after receiving the identification registration request, a symmetric key is obtained by decryption using a private key, the symmetric key is used to decrypt the data and the digital signature, the digital signature and the data are compared, and if the comparison is passed, the data is complete and valid; and then, encrypting the data and the signature by using a symmetric encryption mode, encrypting the symmetric encryption key by using a public key, and sending the encrypted data and the signature together for identification registration.
8. The identification resolution data oriented security reinforcement method according to claim 1, wherein the information consumer uses an identification resolution adapter to carry a trusted certificate to initiate an identification resolution request to the identification resolution public service platform, checks the identity of the requester through the identification resolution public service platform, and forwards the identification resolution request to the recursion node after the check is passed.
9. The method for strengthening security of identification-oriented analysis data according to claim 8, wherein the identification analysis public service platform processes the result of the recursive node analysis according to a metadata template and a permission policy, queries a symmetric key of an enterprise node to which an identification belongs, encrypts the symmetric key with a platform private key, and returns the encrypted symmetric key and the processed data to the identification analysis adapter; the identification adaptation analyzer receives the information returned by the identification analysis public service platform, decrypts by using a public key of the identification analysis public service platform to obtain a symmetric key, decrypts sensitive data by using the symmetric key to finally obtain an identification analysis result, and returns the identification analysis result to the access subject based on an access control strategy, wherein the sensitive data comprises private data of access enterprise node production and operation.
10. The system is applied to a security reinforcing method for the identification-oriented analysis data, and comprises the following steps:
the identification analysis public service platform comprises: the system comprises a verification module, a service module and a service module, wherein the verification module is used for verifying the identity of a requester and providing an adaptation service based on a verification result;
the identification analysis adapter: the system is used for processing data based on the identity of the requester, and initiating an identification registration request or obtaining an identification analysis result;
an enterprise data acquisition unit: and the data source is used for acquiring a data source accessed to the enterprise node, and initiating an identifier registration request to the identifier resolution public service platform after data encryption processing is carried out on the basis of the identifier resolution adapter.
CN202210385137.8A 2022-04-13 2022-04-13 Security reinforcement method and system for identification analysis data Pending CN114780963A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210385137.8A CN114780963A (en) 2022-04-13 2022-04-13 Security reinforcement method and system for identification analysis data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210385137.8A CN114780963A (en) 2022-04-13 2022-04-13 Security reinforcement method and system for identification analysis data

Publications (1)

Publication Number Publication Date
CN114780963A true CN114780963A (en) 2022-07-22

Family

ID=82428712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210385137.8A Pending CN114780963A (en) 2022-04-13 2022-04-13 Security reinforcement method and system for identification analysis data

Country Status (1)

Country Link
CN (1) CN114780963A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935328A (en) * 2020-07-01 2020-11-13 国家工业信息安全发展研究中心 Cross-region and cross-industry industrial internet entity identification method
CN112491960A (en) * 2020-10-30 2021-03-12 中国科学院计算机网络信息中心 SCM (Single chip microcomputer) -oriented industrial internet identifier registration and analysis method, identifier connection platform and system
CN113591119A (en) * 2021-08-09 2021-11-02 国家工业信息安全发展研究中心 Cross-domain identification analysis node data privacy protection and safety sharing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935328A (en) * 2020-07-01 2020-11-13 国家工业信息安全发展研究中心 Cross-region and cross-industry industrial internet entity identification method
CN112491960A (en) * 2020-10-30 2021-03-12 中国科学院计算机网络信息中心 SCM (Single chip microcomputer) -oriented industrial internet identifier registration and analysis method, identifier connection platform and system
CN113591119A (en) * 2021-08-09 2021-11-02 国家工业信息安全发展研究中心 Cross-domain identification analysis node data privacy protection and safety sharing method and system

Similar Documents

Publication Publication Date Title
US11115197B1 (en) Secret sharing information management and security system
US7392535B2 (en) Access privilege transferring method
US20100150352A1 (en) Secure self managed data (ssmd)
CN1395776A (en) Method for issuing an electronic identity
CN111954211B (en) Novel authentication key negotiation system of mobile terminal
CN106100836A (en) A kind of industrial user's authentication and the method and system of encryption
CN113420319A (en) Data privacy protection method and system based on block chain and permission contract
CN103095704A (en) Trusted medium online validation method and device
US20230138368A1 (en) Long-lasting refresh tokens in self-contained format
CN112035895A (en) Electronic contract evidence obtaining method and system based on transaction mode
Griffin Telebiometric authentication objects
Guirat et al. Formal verification of the W3C web authentication protocol
CN115842680A (en) Network identity authentication management method and system
US20220020019A1 (en) Smart Contract-Based Electronic Contract Forensics Method and System
CN110572392A (en) Identity authentication method based on HyperLegger network
WO2021170049A1 (en) Method and apparatus for recording access behavior
CN114238878A (en) Traceable data authorization transfer control method and system
CN112039857B (en) Calling method and device of public basic module
CN111538973A (en) Personal authorization access control system based on state cryptographic algorithm
CN113992336B (en) Encryption network offline data trusted exchange method and device based on block chain
CN102819695A (en) Authorization method and application server based on java archive (Jar)
CN114780963A (en) Security reinforcement method and system for identification analysis data
CN112822217A (en) Server access method, device, equipment and storage medium
CN114117553B (en) Block chain-based control method and system for Internet of things terminal
CN115996126B (en) Information interaction method, application device, auxiliary platform and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220722