CN116011019A - Privacy computing system, method, device, equipment and medium - Google Patents

Privacy computing system, method, device, equipment and medium Download PDF

Info

Publication number
CN116011019A
CN116011019A CN202310089158.XA CN202310089158A CN116011019A CN 116011019 A CN116011019 A CN 116011019A CN 202310089158 A CN202310089158 A CN 202310089158A CN 116011019 A CN116011019 A CN 116011019A
Authority
CN
China
Prior art keywords
target
privacy computing
computing device
credential
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310089158.XA
Other languages
Chinese (zh)
Inventor
李定洲
王超
周雍恺
张远健
张玉风
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN202310089158.XA priority Critical patent/CN116011019A/en
Publication of CN116011019A publication Critical patent/CN116011019A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a privacy computing system, a method, a device, equipment and a medium, which are used for accessing resources which can be safely cooperated among different privacy computing equipment. The first privacy computing device acquires a second device identifier of a second privacy computing device and target item information of a resource to be accessed, determines a target license credential corresponding to the second device identifier and the target item information, and sends a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to the second privacy computing device corresponding to the second device identifier; the second privacy computing device determines a target authorization credential corresponding to the first device identifier and the target item information, if the target authorization credential is judged to be matched with the target license credential, a verification passing notification is sent to the first privacy computing device, and the first privacy computing device accesses resources to be accessed in the second privacy computing device, so that safe and collaborative access resources among different privacy computing devices are realized.

Description

Privacy computing system, method, device, equipment and medium
Technical Field
The present disclosure relates to the field of data security technologies, and in particular, to a privacy computing system, a method, an apparatus, a device, and a medium.
Background
The Privacy computing (Privacy computing) refers to a technical set for realizing data analysis and computing on the premise of protecting data itself from external disclosure, so as to achieve the purpose of 'availability and invisibility' of the data, and realize conversion and release of data value on the premise of fully protecting the data and Privacy security.
With the enhancement of industry data protection awareness and the tightening of privacy regulatory policies, privacy computing has received extensive attention from the industry due to its "available, invisible" nature. Numerous technical manufacturers put forward their privacy computing products with industry features. Numerous privacy computing products have also presented new challenges while enriching market choices. For example, privacy computing products introduced by different technical vendors are usually realized based on different system platform designs, and when the privacy computing products of different system platforms are respectively stored in different privacy computing devices, information interaction between the privacy computing products of different system platforms cannot be usually completed, so that a "data island" is changed into a "computing island".
Therefore, the problem of interworking between privacy algorithm products maintained in different privacy computing devices has become an absolute pain point in the industry. Among them, how one privacy computing device safely accesses resources in other privacy computing devices, that is, how different privacy computing devices safely cooperate to access resources, is a technical problem that needs to be solved at present.
Disclosure of Invention
The application provides a privacy computing system, a method, a device, equipment and a medium, which are used for accessing resources which can be safely cooperated among different privacy computing equipment.
In a first aspect, the present application provides a privacy computing system, the system comprising:
the first privacy computing device is used for acquiring a second device identifier of the second privacy computing device and target item information of the resource to be accessed if the privacy computing device of the resource to be accessed is determined to be a second privacy computing device which is not the first privacy computing device; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; transmitting a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier;
The second privacy computing device is configured to receive the resource access request, and determine a target authorization credential corresponding to the first device identifier and the target item information according to a pre-stored privacy computing device identifier, a corresponding relation between the item information and the authorization credential; if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing device;
the first privacy computing device is further configured to receive the verification pass notification and access a resource to be accessed in the second privacy computing device.
In one possible implementation, the second privacy computing device is specifically configured to:
and if the security access policy information carried in the target license credential is consistent with the security access policy information carried in the target authorization credential, determining that the target authorization credential is matched with the target license credential.
In one possible implementation, the second privacy computing device is further configured to:
if the security access policy information carried in the target license credential does not accord with the security access policy information carried in the target authorization credential, determining that the target authorization credential is not matched with the target license credential, and sending verification failing prompt information to the first privacy computing device.
In one possible implementation, the security access policy information is a hierarchical authorization policy of externally accessible information by the private computing system, including: at least one of authority classification of the type of the resource which can be accessed, access mode limit information, access frequency limit information and access time limit information. Through the scalable loosely-coupled security access policy information, the security policy strong association problem among the multiparty nodes is decoupled, so that the security policies among heterogeneous privacy computing systems have better universality, maintainability and expandability.
In one possible implementation, the second privacy computing device is further configured to:
establishing an access session, and storing the corresponding relation between the session identifier of the access session and the target token identifier in the target license credential;
transmitting the session identification to the first privacy computing device;
the first privacy computing device is further to:
receiving the session identifier, and when the resource to be accessed needs to be accessed, transmitting the session identifier and a target token identifier in the target license credential to the second privacy computing device;
the second privacy computing device is further to:
And receiving the session identifier and the target token identifier, and sending a verification passing notification to the first privacy computing device when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally.
In one possible implementation, the first privacy computing device is specifically configured to:
sending an authorized access resource application carrying the first device identifier and target item information to the second privacy computing device;
the second privacy computing device is specifically configured to determine, when it is determined that the first device identifier is located in a pre-stored security device identifier that has been subjected to identity authentication, target security access policy information corresponding to the first device identifier and the target item information according to a correspondence between the pre-stored device identifier, the item information, and the security access policy information, and generate the target license credential and the target authorization credential, where the target license credential and the target authorization credential both carry the target security access policy information; storing the corresponding relation among the first equipment identifier, the target item information and the target authorization credential, and sending the target permission credential to the first privacy computing equipment;
The first privacy computing device is further configured to receive the target license credential and store a correspondence between the second device identifier, the target item information, and the target license credential.
In a second aspect, the present application provides a method of privacy calculation, the method being applied to a second privacy computing device, the method comprising:
receiving a resource access request sent by first privacy computing equipment, wherein the resource access request carries a target license credential, target item information and a first equipment identifier of the first privacy computing equipment;
determining a target authorization credential corresponding to the first equipment identifier and the target project information according to a pre-stored corresponding relation between the privacy computing equipment identifier, the project information and the authorization credential; and if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing equipment, enabling the first privacy computing equipment to receive the verification passing notification, and accessing resources to be accessed, which belong to the target item information, in the second privacy computing equipment.
In one possible implementation, the determining that the target authorization credential matches the target license credential includes:
And if the security access policy information carried in the target license credential is consistent with the security access policy information carried in the target authorization credential, determining that the target authorization credential is matched with the target license credential.
In one possible embodiment, the method further comprises:
if the security access policy information carried in the target license credential does not accord with the security access policy information carried in the target authorization credential, determining that the target authorization credential is not matched with the target license credential, and sending verification failing prompt information to the first privacy computing device.
In one possible implementation, the security access policy information includes: at least one of authority classification of the type of the resource which can be accessed, access mode limit information, access frequency limit information and access time limit information.
In one possible implementation, after determining that the target authorization credential matches the target license credential, the method further comprises, prior to sending a verification pass notification to the first privacy computing device:
establishing an access session, and storing the corresponding relation between the session identifier of the access session and the target token identifier in the target license credential;
Transmitting the session identification to the first privacy computing device;
and if the session identifier and the target token identifier sent by the first privacy computing device are received, and when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally, the step of sending a verification passing notification to the first privacy computing device is performed.
In one possible implementation, the process of pre-preserving the correspondence between the private computing device identification, the item information, and the authorization credential includes:
receiving an authorized access resource application which is sent by the first privacy computing device and carries the first device identifier and target item information;
when the first equipment identifier is judged to be positioned in a pre-stored safety equipment identifier which is subjected to identity authentication, determining target safety access strategy information corresponding to the first equipment identifier and the target item information according to the corresponding relation between the pre-stored equipment identifier, the item information and the safety access strategy information, and generating a target license credential and a target authorization credential, wherein the target license credential and the target authorization credential both carry the target safety access strategy information; transmitting the target license credential to the first privacy computing device;
And storing the corresponding relation among the first equipment identification, the target item information and the target authorization credential.
In a third aspect, the present application provides a method of privacy calculation, the method being applied to a first privacy computing device, the method comprising:
if the privacy computing equipment to which the resource to be accessed belongs is determined to be second privacy computing equipment which is not the first privacy computing equipment, acquiring a second equipment identifier of the second privacy computing equipment and target item information to which the resource to be accessed belongs; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; transmitting a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier;
and if the verification passing notification sent by the second privacy computing equipment is received, accessing the resources to be accessed in the second privacy computing equipment.
In a possible implementation manner, after the sending, to the second privacy computing device corresponding to the second device identifier, a resource access request carrying the target license credential, the target item information, and the first device identifier of the first privacy computing device, before receiving the verification passing notification sent by the second privacy computing device, the method further includes:
And if the session identifier sent by the second privacy computing device is received, when the resource to be accessed needs to be accessed, the session identifier and the target token identifier in the target license credential are sent to the second privacy computing device.
In one possible implementation, the pre-maintaining the correspondence between the private computing device identification, the item information, and the license credential for the resource access includes:
sending an authorized access resource application carrying the first device identifier and target item information to the second privacy computing device;
and if the target license credential sent by the second privacy computing device is received, storing the corresponding relation among the second device identifier, the target item information and the target license credential.
In a fourth aspect, the present application provides a privacy computing apparatus for use with a second privacy computing device, the apparatus comprising:
the device comprises a receiving module, a first privacy computing device and a second privacy computing device, wherein the receiving module is used for receiving a resource access request sent by the first privacy computing device, and the resource access request carries a target license credential, target item information and a first device identifier of the first privacy computing device;
the authentication module is used for determining a target authorization credential corresponding to the first equipment identifier and the target item information according to the pre-stored privacy computing equipment identifier and the corresponding relation between the item information and the authorization credential; and if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing equipment, enabling the first privacy computing equipment to receive the verification passing notification, and accessing resources to be accessed, which belong to the target item information, in the second privacy computing equipment.
In a possible implementation manner, the authentication module is specifically configured to determine that the target authorization credential matches the target license credential if the security access policy information carried in the target license credential matches the security access policy information carried in the target authorization credential.
In a possible implementation manner, the authentication module is further configured to determine that the target authorization credential does not match the target license credential if the security access policy information carried in the target license credential does not match the security access policy information carried in the target authorization credential, and send a verification failed prompt message to the first privacy computing device.
In a possible implementation manner, the authentication module is further configured to establish an access session, and store a correspondence between a session identifier of the access session and a target token identifier in the target license credential; transmitting the session identification to the first privacy computing device;
and if the session identifier and the target token identifier sent by the first privacy computing device are received, and when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally, sending a verification passing notification to the first privacy computing device.
In a possible implementation manner, the authentication module is specifically configured to receive an authorized access resource application that is sent by the first privacy computing device and carries the first device identifier and the target item information;
when the first equipment identifier is judged to be positioned in a pre-stored safety equipment identifier which is subjected to identity authentication, determining target safety access strategy information corresponding to the first equipment identifier and the target item information according to the corresponding relation between the pre-stored equipment identifier, the item information and the safety access strategy information, and generating a target license credential and a target authorization credential, wherein the target license credential and the target authorization credential both carry the target safety access strategy information; transmitting the target license credential to the first privacy computing device;
and storing the corresponding relation among the first equipment identification, the target item information and the target authorization credential.
In a fifth aspect, the present application provides a privacy computing apparatus applied to a first privacy computing device, the apparatus comprising:
a sending module, configured to, if it is determined that a privacy computing device to which a resource to be accessed belongs is a second privacy computing device that is not the first privacy computing device, obtain a second device identifier of the second privacy computing device and target item information to which the resource to be accessed belongs; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; transmitting a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier;
And the access module is used for accessing the resources to be accessed in the second privacy computing equipment if the verification passing notification sent by the second privacy computing equipment is received.
In a possible implementation manner, the sending module is further configured to, if receiving a session identifier sent by the second privacy computing device, send the session identifier and a target token identifier in the target license credential to the second privacy computing device when the resource to be accessed needs to be accessed.
In a possible implementation manner, the sending module is specifically configured to send, to the second privacy computing device, an authorized access resource application carrying the first device identifier and the target item information;
and if the target license credential sent by the second privacy computing device is received, storing the corresponding relation among the second device identifier, the target item information and the target license credential.
In a sixth aspect, the present application provides an electronic device comprising a processor and a memory, wherein the memory stores program code that, when executed by the processor, causes the processor to perform the steps of the privacy calculation method of any of the above.
In a seventh aspect, the present application provides a computer readable storage medium comprising program code for causing an electronic device to perform the steps of any one of the above-described privacy calculation methods when the storage medium is run on the electronic device.
The first privacy computing device can acquire a second device identifier of the second privacy computing device and target item information of the resource to be accessed when the privacy computing device of the resource to be accessed is determined to be a second privacy computing device which is not self; determining a target license corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license; transmitting a resource access request carrying a target license credential, target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier; after receiving the resource access request, the second privacy computing device can determine a target authorization credential corresponding to the first device identifier and the target item information according to the corresponding relation between the pre-stored privacy computing device identifier and the item information and the authorization credential; if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing device; the first privacy computing device receives the verification pass notification and accesses the resource to be accessed in the second privacy computing device. Because the target license credential corresponds to the second equipment identifier and the target item information, and the target authorization credential corresponds to the first equipment identifier and the target item information, when the target license credential is judged to be matched with the target license credential, a verification passing notification is sent to the first privacy computing equipment, and on one hand, the first privacy computing equipment can be ensured not to access resources of other privacy computing equipment at will; on the other hand, the resources in the second privacy computing device can be ensured not to be accessed by other privacy computing devices at will; in the third aspect, it may be further ensured that the first privacy computing device cannot arbitrarily override access to the resources of the other items except the target item, and resource access security and flexibility may be ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the implementation in the related art, a brief description will be given below of the drawings required for the embodiments or the related art descriptions, and it is apparent that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings for those of ordinary skill in the art.
FIG. 1 illustrates a schematic diagram of a privacy computing system provided by some embodiments;
FIG. 2 illustrates a resource type schematic diagram provided by some embodiments;
FIG. 3 illustrates a schematic diagram of one process for determining security access policy information provided by some embodiments;
FIG. 4 illustrates a first privacy calculation process schematic provided by some embodiments;
FIG. 5 illustrates a second privacy calculation process schematic provided by some embodiments;
FIG. 6 illustrates a third privacy calculation process schematic provided by some embodiments;
FIG. 7 illustrates a fourth privacy calculation process schematic provided by some embodiments;
FIG. 8 illustrates a schematic diagram of a privacy computing device provided by some embodiments;
FIG. 9 illustrates another privacy computing device schematic provided by some embodiments;
Fig. 10 illustrates a schematic structural diagram of an electronic device provided in some embodiments.
Detailed Description
In order to enable secure collaborative access to resources between different privacy computing devices, the application provides a privacy computing device, a method, an apparatus, a device and a medium.
For purposes of clarity and implementation of the present application, the following description will make clear and complete descriptions of exemplary implementations of the present application with reference to the accompanying drawings in which exemplary implementations of the present application are illustrated, it being apparent that the exemplary implementations described are only some, but not all, of the examples of the present application.
It should be noted that the brief description of the terms in the present application is only for convenience in understanding the embodiments described below, and is not intended to limit the embodiments of the present application. Unless otherwise indicated, these terms should be construed in their ordinary and customary meaning.
The terms "first," second, "" third and the like in the description and in the claims and in the above-described figures are used for distinguishing between similar or similar objects or entities and not necessarily for limiting a particular order or sequence, unless otherwise indicated. It is to be understood that the terms so used are interchangeable under appropriate circumstances.
The terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a product or apparatus that comprises a list of elements is not necessarily limited to all elements explicitly listed, but may include other elements not expressly listed or inherent to such product or apparatus.
The term "module" refers to any known or later developed hardware, software, firmware, artificial intelligence, fuzzy logic, or combination of hardware or/and software code that is capable of performing the function associated with that element.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.
Example 1:
FIG. 1 illustrates a schematic diagram of a privacy computing system provided by some embodiments, the system comprising: a first privacy computing device 11 and a second privacy computing device 12, wherein:
The first privacy computing device 11 is configured to, if it is determined that the privacy computing device to which the resource to be accessed belongs is a second privacy computing device 12 that is not the first privacy computing device 11, obtain a second device identifier of the second privacy computing device 12 and target item information to which the resource to be accessed belongs; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; transmitting a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier;
the second privacy computing device 12 is configured to receive the resource access request, and determine a target authorization credential corresponding to the first device identifier and the target item information according to a pre-stored privacy computing device identifier, a corresponding relationship between the item information and the authorization credential; if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing device;
The first privacy computing device 11 is further configured to receive the verification passing notification, and access a resource to be accessed in the second privacy computing device.
In one possible implementation, the first privacy computing device 11 and the second privacy computing device 12 may be devices such as a PC, a mobile terminal, or a server, which is not specifically limited in this application. The first privacy computing device 11 and the second privacy computing device 12 may be two different devices. The first privacy computing device 11 and the second privacy computing device 12 each store a sub-algorithm of any privacy algorithm, and for convenience of description, the sub-algorithm stored in the first privacy computing device 11 is referred to as a first sub-algorithm, and the sub-algorithm stored in the second privacy computing device 12 is referred to as a second sub-algorithm. In a possible implementation manner, the first sub-algorithm and the second sub-algorithm may be part of sub-algorithms included in the same privacy computing product proposed by the same technical manufacturer, or the first sub-algorithm and the second sub-algorithm may be different privacy computing products proposed by different technical manufacturers based on different system platforms, etc., and may be flexibly set according to requirements, which is not specifically limited herein and not described herein again.
In one possible implementation, the first privacy computing device 11 may be a device of a resource consumer and the second privacy computing device 12 may be a device of a resource holder. The number of the first privacy computing device 11 and the number of the second privacy computing devices 12 may be one or more, and the number of the first privacy computing devices 11 and the number of the second privacy computing devices 12 are not specifically limited and may be flexibly set according to requirements, where, no matter whether the number of the first privacy computing devices 11 or the number of the second privacy computing devices 12 is one or more, for each first privacy computing device, the process that the first privacy computing device accesses a resource in any second privacy computing device may adopt a resource access process provided in the embodiments of the present application, which is not described herein again. For ease of understanding, the resource access procedure (privacy calculation procedure) provided in the present application will be explained below taking the number of the first privacy calculation device 11 and the second privacy calculation device 12 as one example, respectively, unless otherwise specified.
In one possible implementation, the first privacy computing device 11 and the second privacy computing device 12 may be network connected and authenticated prior to interworking. Alternatively, the privacy algorithm developer or the like may send identification information (for convenience of description, the identification information of the first privacy computing device 11 is referred to as the first device identification hereinafter) such as an internet protocol (Internet Protocol, IP) address, unique code (Identity document, ID) or the like of the first privacy computing device 11 to the second privacy computing device 12 offline in advance. That is, the first privacy computing device 11 and the second privacy computing device 12 may each be one node, and the identification information such as the IP of the node of the first privacy computing device 11, the ID of the organization to which the node belongs, and the like may be transmitted to the second privacy computing device 12 offline. The second privacy computing device 12 may use the first privacy computing device 11 corresponding to the first device identifier as a secure compliance device, and store the first device identifier in its own secure device identifier that has been authenticated. In addition, other identity authentication methods may be used to authenticate the private computing device, which is not particularly limited in this application.
In one possible implementation, the second privacy computing device 12 may be a device of a resource holder, where the second privacy computing device may include a plurality of resources, and the second privacy computing device 12 may divide its own resources into a plurality of types based on a type tag of each resource, and so on. Optionally, referring to fig. 2, fig. 2 illustrates a schematic view of resource types provided in some embodiments, where a resource may be divided into nine types of resources, such as a Node (Node), an item (Project) in which the Node participates, a data set (Dataset) required by the item, a Flow (Flow) related to the item, a Job (Job) included in the Flow, a Task (Task) included in the Job, a Component (Component) related to the Task, a Model (Model) related to the Flow, and a Service (Service) that can be provided by the Model.
In one possible implementation, considering that the resource holder and the resource user may cooperate with different items, to increase the security and flexibility of resource access, for each item, the resource holder may rank the resources in the second privacy computing device 12 by the type of resource to which the item relates. The method for classifying the resources by different resource holders may be different, and each resource holder may flexibly and independently classify the resources in the second privacy computing device 12, which is not specifically limited in this application. Referring to table 1, table 1 illustrates an example table of resource hierarchies provided by some embodiments.
TABLE 1
Resource level Resource type
1 Node
2 Data set, model
3 Project
4 Flow, service
5 Work is carried out
6 Tasks
As shown in Table 1, resource levels can be categorized into six levels, level 1, level 2, level 3, level 4, level 5, and level 6, wherein the higher the level value, the more resource information that can be viewed is considered. For example, when viewing a level 6 resource, it is often desirable to view a level 1-5 resource, while when viewing a level 1 resource, it is often unnecessary to view a level 2-6 resource. When setting the security access policy information for each resource-using party, the resource-using party can see more resource information if the authority classification (level) of the type of the accessible resource contained in the security access policy information of which resource-using party is higher. The lower the authority level (level) of the type of resource that can be accessed contained in the security access policy information of which resource-consuming party, the less the resource-consuming party can view the resource information. The configuration of security access policy information for each resource consumer is described below. It will be appreciated that any resource may be described by three fields, which may be: resource Type (Resource Type), resource identification (Resource ID), resource Level (Resource Level). The resource type may be determined based on a classification rule unified in the industry, and the resource ID may be set independently by each node, for example, may be set independently by each resource holder based on a corresponding privacy computing device. The resource levels may be independently ranked by the nodes and are not described in detail herein.
Referring to fig. 3, fig. 3 illustrates a schematic diagram of a process for determining security access policy information according to some embodiments. The resource holders can independently and flexibly configure the security access policy information, that is, for each resource holder, the resource holder can independently and flexibly set the corresponding security access policy information for each resource user. The security access policy information may be a hierarchical authorization policy of externally accessible information of the privacy computing system (privacy computing device), and for each resource user, the security access policy information set for the resource user may include at least one of authority hierarchy, access mode limitation information, access frequency limitation information, and access time limitation information of a resource type that the resource user can access. The security access policy information may be flexibly set according to requirements, which is not specifically limited in this application. Through the scalable loosely-coupled security access policy information, the security policy strong association problem among the multiparty nodes is decoupled, so that the security policies among heterogeneous privacy computing systems (different privacy computing devices) have better universality, maintainability and expandability.
In one possible implementation, the authority classification of the type of the resource which can be accessed can be flexibly set according to the requirement when the resource user is set. Optionally, if the authority of the resource user is higher, when all the resources of the resource holder can be checked, the authority of the resource type that can be accessed by the resource user can be directly set as a global security policy in a grading manner, and the resource user can check all the resources of the resource holder. In addition, the resource users may be grouped, and the authority levels of the resource users in different groups may be different, or the manner of setting the authority levels may be referred to as a grouping security policy, for example, the authority levels of the accessible resource types may be set for the resource users in each group based on the division of the resource levels. Taking the above six levels of 1 level, 2 level, 3 level, 4 level, 5 level and 6 level as examples, each resource user may be divided into a plurality of groups, and the authority level of the resource user in each group may be 1 level, 2 level, 3 level, 4 level, 5 level, 6 level and so on, where when the authority level is 6 level, the authority level of the corresponding resource user may be considered to be higher, and the corresponding resource user may view the resources of 1 level to 6 level in the resource holder; when the authority level is 1, the authority level of the corresponding resource user can be considered to be lower, and the corresponding resource user can view the 1-level resource in the resource holder, which is not described herein. In addition, the authority level of the accessible resource type may be set separately for one or some resource users, for example, the authority level of the resource users may be level 1, level 2, level 3, level 4, level 5 or level 6, and the like, which will not be described herein. It can be appreciated that the authority classification of the accessible resource type carried in the target license of the subsequent resource consumer may be the highest level that the resource consumer can access, for example, if for a certain item, the resource consumer can view the resource with the resource level of 6 at most, the authority classification of the accessible resource type may be 6; if a resource consumer can only view resources with a resource level of 3 at most, the authority level of the type of resources that can be accessed by the consumer can be 3. The authority classification of the accessible resource type carried in the target authorization credential of the subsequent resource holder may also be the highest level that the resource user can access to the resource, which is not described herein.
The security access policy information may further include access mode limitation information of the resource user to access the resource, for example, the access mode limitation information may include access based on a web page mode, and may be flexibly set according to requirements. The security access policy information may include access time limit information, and the like of the resource user. For example, the access time limit information may include no more than 5 accesses, 10 accesses, etc. within a week, and the access time limit information may include between 8:00-18:00 accessible, etc.
After setting the security access policy information of the privacy computing device of the resource user for a certain item, the second privacy computing device can save the corresponding relationship between the device identifier of the privacy computing device of the resource user, the item information and the security access policy information.
In one possible implementation, when the first privacy computing device 11 of the resource user wants to access the resource in the second privacy computing device 12 of the resource holder, an authorized access resource application may be sent to the second privacy computing device 12 first, where in order to enable the second privacy computing device 12 to recognize which item of the first privacy computing device and the first privacy computing device needs to view the resource, the authorized access resource application may carry the first device identifier of the first privacy computing device 11 and the target item information of the item to be viewed.
When the second privacy computing device 12 receives the request for authorizing access to the resource, it may be determined whether the first device identifier is located in a pre-stored security device identifier that has been subjected to identity authentication, and if the first device identifier is located in a pre-stored security device identifier that has been subjected to identity authentication, the second privacy computing device 12 may determine target security access policy information corresponding to the first device identifier and the target item information according to a correspondence between the pre-stored device identifier, the item information, and the security access policy information. After determining the target security access policy information, still referring to fig. 3, the second privacy computing device 12 may generate a set of paired credentials based on an authorization processor or the like in itself: namely a target license credential and a target authorization credential, wherein the target license credential and the target authorization credential both carry the target security access policy information. The second privacy computing device 12 may leave the target authorization credential local and store the corresponding relationship between the first device identifier, the target item information, and the target authorization credential for use in later authentication, and detailed description of how to authenticate is omitted herein. In addition, the second privacy computing device 12 may send the target license credential to the privacy computing device of the resource-consumer, i.e., the first privacy computing device 11, and the first privacy computing device 11 may receive the target license credential and maintain a correspondence of the second device identification of the second privacy computing device 12, the target item information, and the target license credential. The subsequent first privacy computing device may obtain access rights to the resource in the target item information in the second privacy computing device 12 by means of the target permissions credential. Based on the same manner, the first privacy computing device 11 may obtain the corresponding relationships between the privacy computing device identifiers of the plurality of resource holders, the item information and the license credentials of the resource access, which are not described herein.
In one possible implementation, the target license credential and the target authorization credential may each contain the following information: token (Token), type of Resource (Resource Type) that can be accessed, rights hierarchy (Resource Level) of Type of Resource that can be accessed, resource ID (Resource Id) that can be accessed, node ID (Resourse Node Id) of the second privacy computing device of the Resource holder, organization name etc. ID (Resourse Inst Id) of the Resource holder, node ID (Reques tNode Id) of the first privacy computing device of the Resource user, organization name etc. ID (Request Inst Id) of the Resource user. Wherein, the Resource Node Id and the Resource Inst Id can be used as the second device identifier, and the Request tNode Id and the Request Inst Id can be used as the first device identifier. Optionally, the target license credential and the target authorization credential may each further include access Time Limit information (Time Limit), access Times Limit information (Times Limit), and the like. The token can be a unique authorization credential issued to the resource user by the resource holder, and has binding correspondence with the resource holder, the resource user, accessible resources and the like.
A detailed description of how the first privacy computing device 11 accesses the resources of the second privacy computing device 12 is provided below.
In a possible implementation manner, if the first privacy computing device 11 determines that the privacy computing device to which the resource to be accessed belongs is another privacy computing device, that is, a second privacy computing device that is not the first privacy computing device, the first privacy computing device 11 may obtain the second device identifier of the second privacy computing device, and in addition, may determine, according to the correspondence between the saved resource and the item information to which the resource belongs, the target item information to which the resource to be accessed belongs. The first privacy computing device 11 may determine the target license credential corresponding to the second device identifier and the target item information according to the pre-stored correspondence of the privacy computing device identifier, the item information, and the license credential for resource access. After determining the target license credential, the first privacy computing device 11 may send a resource access request to the second privacy computing device 12 corresponding to the second device identification, where the resource access request may carry the target license credential, the target item information, and the first device identification of the first privacy computing device.
After receiving the resource access request, the second privacy computing device 12 may determine, according to the pre-stored privacy computing device identifier, the corresponding relationship between the item information and the authorization credential, a target authorization credential corresponding to the first device identifier and the target item information. After determining the target authorization credential, the second privacy computing device may authenticate whether the first privacy computing device has permission to access the resource to be accessed based on the target authorization credential. Specifically, the second privacy computing device 12 may determine whether the target authorization credential and the target permission credential match, if the target authorization credential and the target permission credential match, the first privacy computing device 11 may be considered to have permission to access the resource to be accessed, and if the target authorization credential and the target permission credential do not match, the first privacy computing device 11 may be considered to have no permission to access the resource with access.
Optionally, when determining whether the target authorization credential matches the target license credential, the second privacy computing device 12 may determine whether the security access policy information carried in the target license credential matches the security access policy information carried in the target authorization credential, and if it is determined that the security access policy information carried in the target license credential matches the security access policy information carried in the target authorization credential, may consider that the target authorization credential matches the target license credential. And if the security access policy information carried in the target license credential does not conform to the security access policy information carried in the target authorization credential, the target authorization credential may be considered to be mismatched with the target license credential, optionally, the second privacy computing device 12 may send a verification non-passing hint information to the first privacy computing device 11 when the target authorization credential and the target license credential do not match.
In a possible implementation manner, when judging whether the security access policy information carried in the target license credential is consistent with the security access policy information carried in the target authorization credential (for convenience of description, the security access policy information carried in the target license credential and the security access policy information carried in the target authorization credential are referred to as two-party security access policy information in the following), it may be judged whether each sub-policy information such as authority classification, access mode limitation information, access frequency limitation information, access time limitation information and the like of the accessible resource types contained in the two-party security access policy information are consistent, and when each sub-policy information is consistent, it may be determined that the two-party security access policy information is consistent; if any sub-policy information is not consistent, the fact that the security access policy information of the two parties is not consistent can be determined.
When the sub-policy information of the accessible resource type is judged to be the same as the authority classification of the accessible resource type in the target authorization credential, it may be judged whether the authority classification of the accessible resource type carried in the target authorization credential is the same as the authority classification of the accessible resource type in the target authorization credential, if the authority classification of the accessible resource type carried in the target authorization credential is different from the authority classification of the accessible resource type in the target authorization credential, for example, the authority classification of the accessible resource type carried in the target authorization credential is 6, and if the authority classification of the accessible resource type summarized by the target authorization credential is 3, it may be considered that the authority classification of the accessible resource type in the target authorization credential is not the same as the authority classification of the accessible resource type in the target authorization credential, it may be determined that the target authorization credential is not matched with the target authorization credential, and the verification failure notification information may be sent to the first privacy computing device. If the authority classification of the accessible resource type carried in the target license is the same as the authority classification of the accessible resource type in the target authorization credential, the authority classification of the accessible resource type in the security access policy information of the two parties can be considered to be consistent.
When the two-party security access policy information includes the sub-policy information, that is, the access mode limitation information, the first privacy computing device 11 of the resource user sends a resource access request to the second privacy computing device 12, the resource access request may also carry an access mode, the access mode may be the same as an access mode allowed in the access mode limitation information carried in the target license credential, when judging whether the sub-policy information in the two-party security access policy information matches, it may be judged whether the access mode limitation information carried in the target license credential is the same as the access mode limitation information in the target authorization credential, if the access mode limitation information carried in the target license credential is not the same as the access mode limitation information in the target authorization credential, it may be considered that the access mode limitation information in the two-party security access policy information does not match, and it may be determined that the target license credential does not match with the target license credential, and a verification failed prompt message may be sent to the first privacy computing device. If the access mode limitation information carried in the target license credential is the same as the access mode limitation information in the target authorization credential, the access mode limitation information in the security access policy information of both parties can be considered to be consistent.
In a possible implementation manner, when the security access policy information of the two parties includes the sub-policy information of the access number limitation information, the first privacy computing device 11 of the resource user may further carry the current accumulated access number when sending the resource access request to the second privacy computing device 12, the current accumulated access number should meet the requirement of the access number limitation information in the security access policy information, when judging whether the sub-policy information in the security access policy information of the two parties is consistent, it may be judged whether the access number limitation information carried in the target license credential is the same as the access number limitation information in the target authorization credential, if the access number limitation information carried in the target license credential is not the same as the access number limitation information in the target authorization credential, it may be considered that the sub-policy information of the access number limitation information in the security access policy information of the two parties is not consistent, it may be determined that the target authorization credential is not matched with the target license credential, and the verification failed prompt information may be sent to the first privacy computing device. If the access number limit information carried in the target license credential is the same as the access number limit information in the target authorization credential, the access number limit information in the security access policy information of both parties can be considered to be in agreement.
In one possible implementation manner, when the two-party security access policy information includes sub-policy information, which is access number limitation information, the second privacy computing device 12 of the resource holder may record the current accumulated access number of the first privacy computing device 11, and when the first privacy computing device 11 of the resource user sends a resource access request to the second privacy computing device 12, if it is determined that the sub-policy information in the two-party security access policy information matches, it may be determined whether the access number limitation information carried in the target license credential is the same as the access number limitation information in the target authorization credential, and if the current accumulated access number of the first privacy computing device 11 meets the requirement of the access number limitation information in the target authorization credential, it may be considered that the sub-policy information in the two-party security access policy information does not match, and if the current accumulated access number of the target license credential does not meet the requirement of the access number limitation information in the target authorization credential, it may be determined that the target authorization credential does not match the target authorization credential to the first privacy computing device. If the access number limitation information carried in the target license credential is the same as the access number limitation information in the target authorization credential, the current accumulated access number of the first privacy computing device 11 also satisfies the requirement of the access number limitation information in the target authorization credential, and it may be considered that the access number limitation information in the security access policy information of both parties is consistent.
In one possible implementation, when the two-party security access policy information includes the sub-policy information, that is, the access time limitation information, the first privacy computing device 11 of the resource user sends a resource access request to the second privacy computing device 12, the second privacy computing device 12 of the resource holder may record the current access time of the first privacy computing device 11, when judging whether the sub-policy information in the two-party security access policy information matches, may judge whether the access time limitation information carried in the target license credential is the same as the access time limitation information in the target authorization credential, and whether the current access time of the first privacy computing device 11 meets the requirement of the access time limitation information in the target authorization credential, if the access time limitation information carried in the target license credential is different from the access time limitation information in the target authorization credential, or if the current access time of the first privacy computing device 11 does not meet the requirement of the access time limitation information in the target authorization credential, may consider that the access time limitation information in the security access policy information does not match, and may determine that the target license credential does not match the first privacy computing device and may send a request to the first privacy computing device. If the access time limitation information carried in the target license credential is the same as the access time limitation information in the target authorization credential, the current access time of the first privacy computing device 11 also satisfies the requirement of the access time limitation information in the target authorization credential, and it may be considered that the access time limitation information in the security access policy information of both parties coincides.
In one possible implementation, when the second privacy computing device 12 determines that the target authorization credential matches the target permission credential, a verification pass notification may be sent to the first privacy computing device 11. The first privacy computing device 11, upon receiving the verification pass notification, may begin accessing the resource to be accessed in the second privacy computing device.
The first privacy computing device can acquire a second device identifier of the second privacy computing device and target item information of the resource to be accessed when the privacy computing device of the resource to be accessed is determined to be a second privacy computing device which is not self; determining a target license corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license; transmitting a resource access request carrying a target license credential, target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier; after receiving the resource access request, the second privacy computing device can determine a target authorization credential corresponding to the first device identifier and the target item information according to the corresponding relation between the pre-stored privacy computing device identifier and the item information and the authorization credential; if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing device; the first privacy computing device receives the verification pass notification and accesses the resource to be accessed in the second privacy computing device. Because the target license credential corresponds to the second equipment identifier and the target item information, and the target authorization credential corresponds to the first equipment identifier and the target item information, when the target license credential is judged to be matched with the target license credential, a verification passing notification is sent to the first privacy computing equipment, and on one hand, the first privacy computing equipment can be ensured not to access resources of other privacy computing equipment at will; on the other hand, the resources in the second privacy computing device can be ensured not to be accessed by other privacy computing devices at will; in the third aspect, it may be further ensured that the first privacy computing device cannot arbitrarily override access to the resources of the other items except the target item, and resource access security and flexibility may be ensured.
In addition, when the security access policy information comprises the authority classification of the accessible resource type, when the authority classification in the security access policy information of both sides is judged to be matched, the verification passing notification is sent to the first privacy computing device only when the target authorization credential is judged to be matched with the target permission credential, so that the resource user can be ensured not to override access to the resources of other levels except the self authority in the longitudinal direction, and the security of resource access can be ensured.
In addition, each resource holder can independently and flexibly set or maintain and update corresponding security access policy information for each resource user, and the flexibility, diversity, maintainability, expandability and loose coupling of the security access policy information can be ensured. The security policy strong association problem among the multiparty nodes is decoupled through the scalable loosely-coupled security access policy information, so that the security policies among heterogeneous privacy computing systems have better universality, maintainability and expandability. When the first privacy computing device of the resource user wants to access the resource to be accessed, the resource holder independently and flexibly authorizes, authenticates and the like the resource to be accessed by the resource user, the resource user can not pay attention to specific security access policy information, only needs to transmit standard license credentials to the privacy computing device of the resource holder when the resource to be accessed needs to be accessed, and can improve the flexibility, convenience and the like when the resource is accessed on the basis of ensuring the security access of the resource.
In addition, the privacy computing mode provided by the application can be suitable for interconnection and intercommunication among privacy computing products (also can be called as heterogeneous privacy computing platforms and heterogeneous privacy computing systems) of different system platforms, is suitable for various network structures such as a point-to-point network and a centralized network, is also suitable for interconnection and intercommunication among heterogeneous privacy computing platforms of two parties and more than two parties, and has universality.
In addition, the privacy computing mode provided by the application has lower function invasiveness to the privacy computing platform in the related technology, and in the process of standardizing the resource access mechanism, the safety access strategy information can be flexibly set, so that the compatibility problem in the implementation process is ensured, and the implementation performance is good.
In one possible implementation, to further secure resource access, after determining that the target authorization credential matches the target permission credential, the second privacy computing device 12 may also establish an access Session and maintain a correspondence of a Session identification (Session ID) of the access Session with a target Token identification (Token) in the target permission credential before sending a verification pass notification to the first privacy computing device. The second privacy computing device 12 may send the session identifier to the first privacy computing device 11, in the computing execution stage, when the first privacy computing device 11 needs to access the resource to be accessed, the first privacy computing device 11 may send the session identifier and the target token identifier in the target license credential to the second privacy computing device 12, and the second privacy computing device 12 checks validity of the target token identifier, specifically, when checking validity of the target token identifier, the second privacy computing device 12 may determine whether a correspondence relationship between the session identifier and the target token identifier is locally stored, and if the correspondence relationship between the session identifier and the target token identifier is locally stored, the target token identifier may be considered valid, and may authorize the first privacy computing device 11 of the resource user to access the resource to be accessed, and the second privacy computing device 12 may send a verification passing notification to the first privacy computing device 11. The first privacy computing device 11 receives the verification pass notification and, when executing a certain privacy computing task, can access the resource to be accessed in the second privacy computing device 12. Optionally, the second privacy computing device may record and maintain the correspondence of the privacy computing task, the session identifier, and the target token identifier.
In one possible implementation, if the second privacy computing device 12 determines that the correspondence between the session identifier and the target token identifier is not stored locally, the target token identifier may be considered invalid, and the second privacy computing device 12 may send a verification failed prompt message to the first privacy computing device 11, which is not limited in this application.
For ease of understanding, the privacy calculation process provided in the present application is described below with one specific embodiment. Referring to fig. 4, fig. 4 is a schematic diagram illustrating a first privacy calculation process according to some embodiments, the process including the steps of:
s401: if the first privacy computing device determines that the privacy computing device to which the resource to be accessed belongs is a second privacy computing device which is not the first privacy computing device, acquiring a second device identifier of the second privacy computing device and target item information to which the resource to be accessed belongs; and determining a target license corresponding to the second equipment identifier and the target item information according to the corresponding relation among the pre-stored privacy computing equipment identifier, the item information and the resource access license. The first privacy computing device sends a resource access request carrying the target license credential, the target item information and the first device identification of the first privacy computing device to a second privacy computing device corresponding to the second device identification.
S402: the second privacy computing equipment receives the resource access request, and determines a target authorization credential corresponding to the first equipment identifier and the target item information according to the pre-stored privacy computing equipment identifier and the corresponding relation between the item information and the authorization credential; the second privacy computing device judges whether each piece of sub-policy information such as authority classification, access mode limiting information, access frequency limiting information and access time limiting information of the accessible resource types in the security access policy information in the target license credential is matched with the corresponding piece of sub-policy information in the target authorization credential, and if any piece of sub-policy information is not matched, S403 is carried out; if each sub-policy information matches, then S404 is performed.
S403: the second privacy computing device determines that the target authorization credential does not match the target permission credential, and sends a verification failed hint message to the first privacy computing device.
S404: if the second privacy computing device judges that the target authorization credential is matched with the target permission credential, an access session is established, the corresponding relation between the session identifier of the access session and the target token identifier in the target permission credential is saved, and the session identifier is sent to the first privacy computing device.
S405: the first privacy computing device receives the session identification, and when the resource to be accessed needs to be accessed, the session identification and the target token identification in the target license credential are sent to the second privacy computing device.
S406: the second privacy computing device receives the session identifier and the target token identifier, and sends a verification passing notification to the first privacy computing device when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally.
S407: the first privacy computing device receives the verification pass notification and accesses the resource to be accessed in the second privacy computing device.
In one possible implementation manner, the resource access process (i.e., the privacy calculation process) of the present application may be fused with the interconnection framework by relying on the privacy calculation interconnection framework in the related art, so as to implement the resource access process of the present application. Referring to fig. 5, fig. 5 illustrates a schematic view of a second privacy computing process provided by some embodiments, in the research of heterogeneous privacy computing interconnection technology, a layered framework scheme meeting industry interconnection standards is provided for an interconnection architecture in the industry, and the layered framework scheme includes a management layer, a control layer and a transmission layer from top to bottom. The method can define each entity based on a management layer, form consensus for general attributes corresponding to the entity, define interaction and authorization interfaces of information of various resource entities, and meet the labeling flow of interconnection and interworking of the information layers of the current privacy computing sub-resources in a standardized mode. The coordination mechanism and the standardized interface of different privacy computing devices (multiple parties) on the aspects of the operation and the task can be standardized and defined based on the control layer in the interconnection and interworking process, so that the coordination of the operation and the task among different privacy computing platforms is realized. The method can be used for carrying out east-west data transmission work among privacy computing platforms based on a transmission layer, and the interconnection and the intercommunication of the computing layers are realized mainly through a standard interface and a modularized design in the aspect of communication transmission.
In the embodiment of the application, when resource access is performed between different privacy computing devices, three layers of a management layer, a control layer and a transmission layer are needed to be implemented together, and coordination is achieved. Referring again to fig. 5, the resource access procedure provided in the embodiment of the present application mainly includes three main steps of establishing authorization and permission, authenticating and establishing session, and accessing.
Wherein, (1) the process of establishing authorization and permission mainly comprises the following steps:
the first privacy computing device 11 sends an authorized access resource application carrying the first device identification and the target item information to the second privacy computing device 12 based on a management layer in the first privacy computing device. The second privacy computing device 12 receives the application for authorized access resources based on a management layer in the second privacy computing device, determines target security access policy information corresponding to the first device identifier and the target item information according to the corresponding relation between the pre-stored device identifier, the item information and the security access policy information when judging that the first device identifier is located in the pre-stored security device identifier subjected to identity authentication, and generates a target permission credential and a target authorization credential, wherein the target permission credential and the target authorization credential both carry the target security access policy information. The second privacy computing device 12 maintains the correspondence of the first device identification, the target item information, and the target authorization credential, and sends the target license credential to the first privacy computing device 11. At the same time, the management layer of the second privacy computing device sends the Token (Token) in the target authorization credential to the control layer in the second privacy computing device itself.
The first privacy computing device receives the target license credential based on a management layer in the first privacy computing device and maintains a correspondence of the second device identification, the target item information, and the target license credential. At the same time, the management layer in the first privacy computing device sends the Token (Token) in the target license credential to the control layer in the first privacy computing device itself.
(2) The process of authentication and session establishment is mainly as follows:
when the first privacy computing device 11 wants to access the resource to be accessed in the second privacy computing device 12, the first privacy computing device 11 can acquire the second device identifier of the second privacy computing device and the target item information to which the resource to be accessed belongs based on a control layer in the first privacy computing device 11, and determine the target license credential corresponding to the second device identifier and the target item information according to the corresponding relation between the pre-stored privacy computing device identifier, the item information and the license credential for resource access; and sending a resource access request carrying the target license credential, the target item information and the first device identifier of the first privacy computing device to the second privacy computing device corresponding to the second device identifier.
The second privacy computing device 12 may receive the resource access request and perform corresponding authentication on the basis of a control layer in the second privacy computing device, and specifically, may determine a target authorization credential corresponding to the first device identifier and the target item information according to a pre-stored corresponding relationship between the privacy computing device identifier, the item information and the authorization credential; if it is determined that the target authorization credential matches the target permission credential, an access session may be established based on a control layer in the second privacy computing device, a correspondence between a session identifier (session Id) of the access session and a target token identifier in the target permission credential may be maintained, and the session identifier may be sent to the first privacy computing device 11. Meanwhile, the second privacy computing device may send, based on the control layer, a correspondence of a session identification (session Id) of the access session and a target Token identification (Token) in the target license credential to a transport layer in the second privacy computing device. Different sessions can be distinguished based on session identification (session id), and execution of each session task is performed in an independent container, so that multiple session tasks can be executed correctly at the same time.
The first privacy computing device 11 may receive the session identification based on a control layer in the first privacy computing device, and may send the session identification and the target token identification in the target license credential to a transport layer in the first privacy computing device.
(3) The access process mainly comprises the following steps:
the first privacy computing device 11 may send the session identifier and the target token identifier in the target license credential to the second privacy computing device based on a transport layer in the first privacy computing device when the first privacy computing device needs to access the resource to be accessed and perform the privacy computing process.
The second privacy computing device may receive the session identifier and the target token identifier based on a transport layer in the second privacy computing device, and send a verification pass notification to the first privacy computing device when it is determined that a correspondence between the session identifier and the target token identifier is locally maintained. The first privacy computing device may access resources to be accessed in the second privacy computing device based on the respective transport layers.
Example 2:
based on the same technical concept, the present application further provides a privacy calculation method, which is applied to the second privacy calculation device, fig. 6 shows a schematic diagram of a third privacy calculation process provided by some embodiments, and the process includes the following steps:
S601: and receiving a resource access request sent by a first privacy computing device, wherein the resource access request carries a target license credential, target item information and a first device identifier of the first privacy computing device.
S602: determining a target authorization credential corresponding to the first equipment identifier and the target project information according to a pre-stored corresponding relation between the privacy computing equipment identifier, the project information and the authorization credential; and if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing equipment, enabling the first privacy computing equipment to receive the verification passing notification, and accessing resources to be accessed, which belong to the target item information, in the second privacy computing equipment.
In one possible implementation, the determining that the target authorization credential matches the target license credential includes:
and if the security access policy information carried in the target license credential is consistent with the security access policy information carried in the target authorization credential, determining that the target authorization credential is matched with the target license credential.
In one possible embodiment, the method further comprises:
If the security access policy information carried in the target license credential does not accord with the security access policy information carried in the target authorization credential, determining that the target authorization credential is not matched with the target license credential, and sending verification failing prompt information to the first privacy computing device.
In one possible implementation, the security access policy information includes: at least one of authority classification of the type of the resource which can be accessed, access mode limit information, access frequency limit information and access time limit information.
In one possible implementation, after determining that the target authorization credential matches the target license credential, the method further comprises, prior to sending a verification pass notification to the first privacy computing device:
establishing an access session, and storing the corresponding relation between the session identifier of the access session and the target token identifier in the target license credential;
transmitting the session identification to the first privacy computing device;
and if the session identifier and the target token identifier sent by the first privacy computing device are received, and when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally, the step of sending a verification passing notification to the first privacy computing device is performed.
In one possible implementation, the process of pre-preserving the correspondence between the private computing device identification, the item information, and the authorization credential includes:
receiving an authorized access resource application which is sent by the first privacy computing device and carries the first device identifier and target item information;
when the first equipment identifier is judged to be positioned in a pre-stored safety equipment identifier which is subjected to identity authentication, determining target safety access strategy information corresponding to the first equipment identifier and the target item information according to the corresponding relation between the pre-stored equipment identifier, the item information and the safety access strategy information, and generating a target license credential and a target authorization credential, wherein the target license credential and the target authorization credential both carry the target safety access strategy information; transmitting the target license credential to the first privacy computing device;
and storing the corresponding relation among the first equipment identification, the target item information and the target authorization credential.
Based on the same technical concept, the present application further provides a privacy calculation method, which is applied to the first privacy calculation device, and fig. 7 shows a fourth privacy calculation process schematic diagram provided by some embodiments, and the process includes the following steps:
S701: if the privacy computing equipment to which the resource to be accessed belongs is determined to be second privacy computing equipment which is not the first privacy computing equipment, acquiring a second equipment identifier of the second privacy computing equipment and target item information to which the resource to be accessed belongs; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; and sending a resource access request carrying the target license credential, the target item information and the first equipment identifier of the first privacy computing equipment to a second privacy computing equipment corresponding to the second equipment identifier.
S702: and if the verification passing notification sent by the second privacy computing equipment is received, accessing the resources to be accessed in the second privacy computing equipment.
In a possible implementation manner, after the sending, to the second privacy computing device corresponding to the second device identifier, a resource access request carrying the target license credential, the target item information, and the first device identifier of the first privacy computing device, before receiving the verification passing notification sent by the second privacy computing device, the method further includes:
And if the session identifier sent by the second privacy computing device is received, when the resource to be accessed needs to be accessed, the session identifier and the target token identifier in the target license credential are sent to the second privacy computing device.
In one possible implementation, the pre-maintaining the correspondence between the private computing device identification, the item information, and the license credential for the resource access includes:
sending an authorized access resource application carrying the first device identifier and target item information to the second privacy computing device;
and if the target license credential sent by the second privacy computing device is received, storing the corresponding relation among the second device identifier, the target item information and the target license credential.
Example 3:
based on the same technical concept, the present application further provides a privacy computing apparatus, which is applied to a second privacy computing device, and referring to fig. 8, fig. 8 shows a schematic view of the privacy computing apparatus provided in some embodiments, where the apparatus includes:
the receiving module 81 is configured to receive a resource access request sent by a first privacy computing device, where the resource access request carries a target license, target item information, and a first device identifier of the first privacy computing device.
The authentication module 82 is configured to determine a target authorization credential corresponding to the first device identifier and the target item information according to a pre-stored privacy computing device identifier and a correspondence between item information and an authorization credential; and if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing equipment, enabling the first privacy computing equipment to receive the verification passing notification, and accessing resources to be accessed, which belong to the target item information, in the second privacy computing equipment.
In a possible implementation manner, the authentication module 82 is specifically configured to determine that the target authorization credential matches the target license credential if the security access policy information carried in the target license credential matches the security access policy information carried in the target authorization credential.
In a possible implementation manner, the authentication module 82 is further configured to determine that the target authorization credential does not match the target license credential if the security access policy information carried in the target license credential does not match the security access policy information carried in the target authorization credential, and send a verification failed prompt message to the first privacy computing device.
In a possible implementation manner, the authentication module 82 is further configured to establish an access session, and save a correspondence between a session identifier of the access session and a target token identifier in the target license credential; transmitting the session identification to the first privacy computing device;
and if the session identifier and the target token identifier sent by the first privacy computing device are received, and when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally, sending a verification passing notification to the first privacy computing device.
In a possible implementation manner, the authentication module 82 is specifically configured to receive an authorized access resource application sent by the first privacy computing device and carrying the first device identifier and the target item information;
when the first equipment identifier is judged to be positioned in a pre-stored safety equipment identifier which is subjected to identity authentication, determining target safety access strategy information corresponding to the first equipment identifier and the target item information according to the corresponding relation between the pre-stored equipment identifier, the item information and the safety access strategy information, and generating a target license credential and a target authorization credential, wherein the target license credential and the target authorization credential both carry the target safety access strategy information; transmitting the target license credential to the first privacy computing device;
And storing the corresponding relation among the first equipment identification, the target item information and the target authorization credential.
Based on the same technical concept, the present application further provides a privacy computing apparatus, where the apparatus is applied to a first privacy computing device, and referring to fig. 9, fig. 9 shows another schematic view of the privacy computing apparatus provided in some embodiments, where the apparatus includes:
a sending module 91, configured to, if it is determined that a privacy computing device to which a resource to be accessed belongs is a second privacy computing device that is not the first privacy computing device, obtain a second device identifier of the second privacy computing device and target item information to which the resource to be accessed belongs; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; and sending a resource access request carrying the target license credential, the target item information and the first equipment identifier of the first privacy computing equipment to a second privacy computing equipment corresponding to the second equipment identifier.
And the access module 92 is configured to access a resource to be accessed in the second privacy computing device if a verification passing notification sent by the second privacy computing device is received.
In a possible implementation manner, the sending module 91 is further configured to, if receiving the session identifier sent by the second privacy computing device, send the session identifier and the target token identifier in the target license credential to the second privacy computing device when the resource to be accessed needs to be accessed.
In a possible implementation manner, the sending module 91 is specifically configured to send, to the second privacy computing device, an authorized access resource application carrying the first device identifier and the target item information;
and if the target license credential sent by the second privacy computing device is received, storing the corresponding relation among the second device identifier, the target item information and the target license credential.
Example 4:
based on the same technical concept, the present application further provides an electronic device, and fig. 10 shows a schematic structural diagram of an electronic device provided by some embodiments, as shown in fig. 10, including: the processor 101, the communication interface 102, the memory 103 and the communication bus 104, wherein the processor 101, the communication interface 102 and the memory 103 complete communication with each other through the communication bus 104;
the memory 103 has stored therein a computer program which, when executed by the processor 101, causes the processor 101 to perform the steps of any of the privacy calculation methods described above.
Since the principle of solving the problem of the electronic device is similar to that of the privacy calculation method, the implementation of the electronic device can refer to the implementation of the method, and the repetition is omitted.
The communication bus mentioned above for the electronic devices may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface 102 is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit, a network processor (Network Processor, NP), etc.; but also digital instruction processors (Digital Signal Processing, DSP), application specific integrated circuits, field programmable gate arrays or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
Based on the same technical idea, the embodiments of the present application provide a computer readable storage medium, in which a computer program executable by an electronic device is stored, which when executed on the electronic device, causes the electronic device to implement the steps of any one of the above privacy calculation methods.
Since the principle of solving the problem by the computer readable storage medium is similar to that of the privacy calculation method, the implementation of the computer readable storage medium can refer to the implementation of the method, and the repetition is omitted.
The computer readable storage medium may be any available medium or data storage device that can be accessed by a processor in an electronic device, including but not limited to magnetic memories such as floppy disks, hard disks, magnetic tapes, magneto-optical disks (MO), etc., optical memories such as CD, DVD, BD, HVD, etc., and semiconductor memories such as ROM, EPROM, EEPROM, nonvolatile memories (NAND FLASH), solid State Disks (SSD), etc.
Based on the same technical idea, on the basis of the above embodiments, the present application provides a computer program product, the computer program product comprising: computer program code which, when run on a computer, causes the computer to perform the steps of the privacy calculation method as described in any of the above.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (19)

1. A privacy computing system, the system comprising:
the first privacy computing device is used for acquiring a second device identifier of the second privacy computing device and target item information of the resource to be accessed if the privacy computing device of the resource to be accessed is determined to be a second privacy computing device which is not the first privacy computing device; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; transmitting a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier;
the second privacy computing device is configured to receive the resource access request, and determine a target authorization credential corresponding to the first device identifier and the target item information according to a pre-stored privacy computing device identifier, a corresponding relation between the item information and the authorization credential; if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing device;
The first privacy computing device is further configured to receive the verification pass notification and access a resource to be accessed in the second privacy computing device.
2. The system according to claim 1, wherein the second privacy computing device is specifically configured to:
and if the security access policy information carried in the target license credential is consistent with the security access policy information carried in the target authorization credential, determining that the target authorization credential is matched with the target license credential.
3. The system of claim 1, wherein the second privacy computing device is further to:
if the security access policy information carried in the target license credential does not accord with the security access policy information carried in the target authorization credential, determining that the target authorization credential is not matched with the target license credential, and sending verification failing prompt information to the first privacy computing device.
4. A system according to claim 2 or 3, wherein the security access policy information comprises: at least one of authority classification of the type of the resource which can be accessed, access mode limit information, access frequency limit information and access time limit information.
5. A system according to any of claims 1-3, wherein the second privacy computing device is further to:
establishing an access session, and storing the corresponding relation between the session identifier of the access session and the target token identifier in the target license credential;
transmitting the session identification to the first privacy computing device;
the first privacy computing device is further to:
receiving the session identifier, and when the resource to be accessed needs to be accessed, transmitting the session identifier and a target token identifier in the target license credential to the second privacy computing device;
the second privacy computing device is further to:
and receiving the session identifier and the target token identifier, and sending a verification passing notification to the first privacy computing device when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally.
6. A system according to claim 2 or 3, wherein the first privacy computing device is specifically configured to:
sending an authorized access resource application carrying the first device identifier and target item information to the second privacy computing device;
the second privacy computing device is specifically configured to determine, when it is determined that the first device identifier is located in a pre-stored security device identifier that has been subjected to identity authentication, target security access policy information corresponding to the first device identifier and the target item information according to a correspondence between the pre-stored device identifier, the item information, and the security access policy information, and generate the target license credential and the target authorization credential, where the target license credential and the target authorization credential both carry the target security access policy information; storing the corresponding relation among the first equipment identifier, the target item information and the target authorization credential, and sending the target permission credential to the first privacy computing equipment;
The first privacy computing device is further configured to receive the target license credential and store a correspondence between the second device identifier, the target item information, and the target license credential.
7. A method of privacy calculation, the method being applied to a second privacy computing device, the method comprising:
receiving a resource access request sent by first privacy computing equipment, wherein the resource access request carries a target license credential, target item information and a first equipment identifier of the first privacy computing equipment;
determining a target authorization credential corresponding to the first equipment identifier and the target project information according to a pre-stored corresponding relation between the privacy computing equipment identifier, the project information and the authorization credential; and if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing equipment, enabling the first privacy computing equipment to receive the verification passing notification, and accessing resources to be accessed, which belong to the target item information, in the second privacy computing equipment.
8. The method of claim 7, wherein said determining that the target authorization credential matches the target license credential comprises:
And if the security access policy information carried in the target license credential is consistent with the security access policy information carried in the target authorization credential, determining that the target authorization credential is matched with the target license credential.
9. The method of claim 8, wherein the method further comprises:
if the security access policy information carried in the target license credential does not accord with the security access policy information carried in the target authorization credential, determining that the target authorization credential is not matched with the target license credential, and sending verification failing prompt information to the first privacy computing device.
10. The method according to claim 8 or 9, wherein the security access policy information comprises: at least one of authority classification of the type of the resource which can be accessed, access mode limit information, access frequency limit information and access time limit information.
11. The method of any of claims 7-9, wherein after determining that the target authorization credential matches the target license credential, prior to sending a verification pass notification to the first privacy computing device, the method further comprises:
Establishing an access session, and storing the corresponding relation between the session identifier of the access session and the target token identifier in the target license credential;
transmitting the session identification to the first privacy computing device;
and if the session identifier and the target token identifier sent by the first privacy computing device are received, and when the corresponding relation between the session identifier and the target token identifier is determined to be stored locally, the step of sending a verification passing notification to the first privacy computing device is performed.
12. The method according to claim 8 or 9, wherein the pre-maintaining the correspondence between the private computing device identification, the item information and the authorization credential comprises:
receiving an authorized access resource application which is sent by the first privacy computing device and carries the first device identifier and target item information;
when the first equipment identifier is judged to be positioned in a pre-stored safety equipment identifier which is subjected to identity authentication, determining target safety access strategy information corresponding to the first equipment identifier and the target item information according to the corresponding relation between the pre-stored equipment identifier, the item information and the safety access strategy information, and generating a target license credential and a target authorization credential, wherein the target license credential and the target authorization credential both carry the target safety access strategy information; transmitting the target license credential to the first privacy computing device;
And storing the corresponding relation among the first equipment identification, the target item information and the target authorization credential.
13. A method of privacy calculation, the method being applied to a first privacy computing device, the method comprising:
if the privacy computing equipment to which the resource to be accessed belongs is determined to be second privacy computing equipment which is not the first privacy computing equipment, acquiring a second equipment identifier of the second privacy computing equipment and target item information to which the resource to be accessed belongs; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; transmitting a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier;
and if the verification passing notification sent by the second privacy computing equipment is received, accessing the resources to be accessed in the second privacy computing equipment.
14. The method of claim 13, wherein after the sending the resource access request carrying the target license credential, the target item information, and the first device identification of the first privacy computing device to the second privacy computing device corresponding to the second device identification, the method further comprises, prior to receiving the verification pass notification sent by the second privacy computing device:
And if the session identifier sent by the second privacy computing device is received, when the resource to be accessed needs to be accessed, the session identifier and the target token identifier in the target license credential are sent to the second privacy computing device.
15. The method according to claim 13 or 14, wherein pre-maintaining the correspondence of the private computing device identification, item information and license credentials for resource access comprises:
sending an authorized access resource application carrying the first device identifier and target item information to the second privacy computing device;
and if the target license credential sent by the second privacy computing device is received, storing the corresponding relation among the second device identifier, the target item information and the target license credential.
16. A privacy computing apparatus, the apparatus being applied to a second privacy computing device, the apparatus comprising:
the device comprises a receiving module, a first privacy computing device and a second privacy computing device, wherein the receiving module is used for receiving a resource access request sent by the first privacy computing device, and the resource access request carries a target license credential, target item information and a first device identifier of the first privacy computing device;
The authentication module is used for determining a target authorization credential corresponding to the first equipment identifier and the target item information according to the pre-stored privacy computing equipment identifier and the corresponding relation between the item information and the authorization credential; and if the target authorization credential is judged to be matched with the target license credential, sending a verification passing notification to the first privacy computing equipment, enabling the first privacy computing equipment to receive the verification passing notification, and accessing resources to be accessed, which belong to the target item information, in the second privacy computing equipment.
17. A privacy computing apparatus, the apparatus being applied to a first privacy computing device, the apparatus comprising:
a sending module, configured to, if it is determined that a privacy computing device to which a resource to be accessed belongs is a second privacy computing device that is not the first privacy computing device, obtain a second device identifier of the second privacy computing device and target item information to which the resource to be accessed belongs; determining a target license credential corresponding to the second equipment identifier and the target item information according to the corresponding relation between the pre-stored privacy computing equipment identifier, the item information and the resource access license credential; transmitting a resource access request carrying the target license credential, the target item information and a first device identifier of the first privacy computing device to a second privacy computing device corresponding to the second device identifier;
And the access module is used for accessing the resources to be accessed in the second privacy computing equipment if the verification passing notification sent by the second privacy computing equipment is received.
18. An electronic device comprising a processor and a memory, wherein the memory stores program code that, when executed by the processor, causes the processor to perform the steps of the privacy calculation method of any of claims 7-15.
19. A computer readable storage medium, characterized in that it comprises a program code for causing an electronic device to perform the steps of the privacy calculation method of any of claims 7-15 when said storage medium is run on said electronic device.
CN202310089158.XA 2023-01-29 2023-01-29 Privacy computing system, method, device, equipment and medium Pending CN116011019A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310089158.XA CN116011019A (en) 2023-01-29 2023-01-29 Privacy computing system, method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310089158.XA CN116011019A (en) 2023-01-29 2023-01-29 Privacy computing system, method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN116011019A true CN116011019A (en) 2023-04-25

Family

ID=86037295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310089158.XA Pending CN116011019A (en) 2023-01-29 2023-01-29 Privacy computing system, method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN116011019A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117113416A (en) * 2023-10-17 2023-11-24 北京数牍科技有限公司 Task execution method, device, equipment and storage medium based on privacy calculation

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117113416A (en) * 2023-10-17 2023-11-24 北京数牍科技有限公司 Task execution method, device, equipment and storage medium based on privacy calculation
CN117113416B (en) * 2023-10-17 2024-01-23 北京数牍科技有限公司 Task execution method, device, equipment and storage medium based on privacy calculation

Similar Documents

Publication Publication Date Title
CN111090876B (en) Contract calling method and device
CN113438289B (en) Block chain data processing method and device based on cloud computing
EP3140774B1 (en) Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
US8271536B2 (en) Multi-tenancy using suite of authorization manager components
CN109379369A (en) Single-point logging method, device, server and storage medium
Ouaddah et al. Harnessing the power of blockchain technology to solve IoT security & privacy issues.
US8145917B2 (en) Security bootstrapping for distributed architecture devices
Guija et al. Identity and access control for micro-services based 5G NFV platforms
US8793773B2 (en) System and method for providing reputation reciprocity with anonymous identities
US20180212954A1 (en) Information registration and authentication method and device
CN115310145A (en) Privacy computing system, method, device, equipment and medium
CN111880919A (en) Data scheduling method, system and computer equipment
CN113141340A (en) Multi-node authentication method and device based on block chain
CN116011019A (en) Privacy computing system, method, device, equipment and medium
CN109286620A (en) Method for managing user right, system, equipment and computer readable storage medium
CN106358246B (en) Access token issuing method and related equipment
CN114679274A (en) Cross-subnet interactive permission control method and device, electronic equipment and storage medium
Durán et al. An architecture for easy onboarding and key life-cycle management in blockchain applications
JP2023120287A (en) Scalable certificate management system architecture
CN116707849A (en) Cloud service access authority setting method and cloud management platform for enclave instance
CN102647273B (en) Generation methods and devices of user root key and user key for trusted computing platform
TWI673621B (en) Information registration, authentication method and device
CN115102717B (en) Interconnection and intercommunication data transmission method and system based on user system
CN116032494B (en) Data interaction method, blockchain predictor, device and medium
CN114448694B (en) Service calling method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40092180

Country of ref document: HK