CN117763633A - Information sharing device and platform - Google Patents

Information sharing device and platform Download PDF

Info

Publication number
CN117763633A
CN117763633A CN202311776284.9A CN202311776284A CN117763633A CN 117763633 A CN117763633 A CN 117763633A CN 202311776284 A CN202311776284 A CN 202311776284A CN 117763633 A CN117763633 A CN 117763633A
Authority
CN
China
Prior art keywords
information
data
user
service layer
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311776284.9A
Other languages
Chinese (zh)
Inventor
申玉周
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Digital City Technology Co ltd
Original Assignee
China Telecom Digital City Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Digital City Technology Co ltd filed Critical China Telecom Digital City Technology Co ltd
Priority to CN202311776284.9A priority Critical patent/CN117763633A/en
Publication of CN117763633A publication Critical patent/CN117763633A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides an information sharing device and a platform, comprising: the interface layer is used for establishing a standardized information model, processing user requests and calling returned data of the service layer; the service layer is used for encrypting the return data in the whole course and monitoring the data flow direction in real time; and the data layer is used for providing rich data sets for users and third-party enterprises through authorization management so as to relieve the technical problems of complicated information sharing steps and lower security.

Description

Information sharing device and platform
Technical Field
The present invention relates to the field of information sharing technologies, and in particular, to an information sharing device and platform.
Background
With the development of the internet and big data technology, the data volume is increased in an explosive manner, but the data volume is limited by the lack of interconnection and intercommunication among a plurality of information systems, so that the problem of information island is prominent. The user needs to repeatedly fill in registration information in different systems, resulting in a lot of unnecessary time and economic loss. Meanwhile, because the information systems are isolated, information cannot be effectively shared, and the management efficiency and business service quality of related organizations are reduced. On the other hand, the information security problem is also increasingly serious, the information is exposed to leakage risk when flowing among multiple systems, and the privacy rights and interests are difficult to guarantee.
Disclosure of Invention
The invention aims to provide an information sharing device and platform so as to relieve the technical problems of complicated information sharing steps and lower safety.
In a first aspect, an embodiment of the present invention provides an information sharing apparatus, including:
the interface layer is used for establishing a standardized information model, processing user requests and calling returned data of the service layer;
the service layer is used for encrypting the return data in the whole process and monitoring the data flow direction in real time;
and the data layer is used for providing rich data sets for users and third-party enterprises through authorization management.
With reference to the first aspect, an embodiment of the present invention provides a first possible implementation manner of the first aspect, where the interface layer invokes return data of the service layer according to a request parameter sent by a front-end device.
With reference to the first aspect, the embodiment of the present invention provides a second possible implementation manner of the first aspect, where the service layer determines a user right according to the user request, and returns data matching the user right.
With reference to the first aspect, the embodiment of the present invention provides a third possible implementation manner of the first aspect, where the data layer is configured to provide data storage and file storage for authorized users and/or third party enterprises.
With reference to the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, where the service layer further includes a system management module; the system management module is also used for managing the user account, the role corresponding to the user account, the authority menu associated with the role, the department organization corresponding to the user and the file resource used by the user.
With reference to the first aspect, an embodiment of the present invention provides a fifth possible implementation manner of the first aspect, where the service layer further includes an authorization management module; the authorization management module is also used for managing data authorized to the third party enterprise by the user through the third party enterprise authority information.
With reference to the first aspect, an embodiment of the present invention provides a sixth possible implementation manner of the first aspect, where the service layer further includes an information source recording module; the information source recording module is also used for verifying and updating the acquired data in real time and recording information source types, information source time, information source modes and information failure records.
With reference to the first aspect, an embodiment of the present invention provides a seventh possible implementation manner of the first aspect, where the service layer further includes an information monitoring management module; the information monitoring management module is also used for encrypting and tracking the flow of the data information of the user in the storage process and the transmission process.
With reference to the first aspect, an embodiment of the present invention provides an eighth possible implementation manner of the first aspect, where the service layer is further configured to collect user data according to a user request, and aggregate the user data; verifying the authority of a user or a third party enterprise based on the target information category of the user or the third party enterprise; and if the verification is passed, encrypting and transmitting the user data corresponding to the target information category to the user or the third party enterprise.
In a second aspect, an embodiment of the present invention further provides an information sharing platform, including the information sharing apparatus as described above, and further including a front-end device.
The embodiment of the invention brings an information sharing device and platform, has a large-scale social basic information data set, integrates massive user information, including information on population, education, traffic and the like, has wide coverage, and constructs a structured and standardized large-scale social information database; by establishing a standardized personal information model and interfacing with other systems, the method realizes that a personal user can be directly multiplexed by a plurality of institution systems only by registering information once on the platform without repeated filling, and realizes information interconnection and intercommunication and multiparty multiplexing; meanwhile, various security protection technologies such as encryption, blockchain, watermarking, behavior audit and the like are applied, the data flow direction is monitored in real time, and the source can be positioned and responded at the first time when information is leaked, so that the data security is effectively protected; the system not only has rich data sets, but also can safely share the information in the modes of authorization management, interface opening and the like, and provides personalized information access service for enterprises and related organization.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a block diagram of an information sharing device according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an information sharing device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
At present, users wandering on the network often fill in various basic information of the users on various platforms, especially unregistered platforms for registration, such as names, identification numbers, home residences, academic information and the like, but the information is very cumbersome to fill up, and the users cannot be guaranteed to be not revealed.
Based on the above, the information sharing device and the platform provided by the embodiment of the invention are used for relieving the technical problems of complicated information sharing steps and lower safety.
For the convenience of understanding the present embodiment, first, a detailed description will be given of an information sharing device disclosed in the present embodiment, where the information sharing platform adopts a client/server mode, and a user accesses the platform through a browser of the client.
Fig. 1 is a block diagram of an information sharing device according to an embodiment of the present invention.
Referring to fig. 1, the information sharing apparatus includes:
and the interface layer is used for establishing a standardized information model, processing a user request and calling the returned data of the service layer.
The system mainly comprises a controller component, a service layer return data is called by processing a user request, and a @ RestController annotation mark interface class of Spring MVC is used; the interface method receives the front-end request parameters and calls the service layer method; marking the URL mapping by using @ RequestMapping; returning JSON format data to the front end; the interface performs preliminary parameter verification; interface documents are generated using swagger.
And the service layer is used for encrypting the return data in the whole process and monitoring the data flow direction in real time.
Here, the service layer includes various service components, and implements platform core business logic, such as services of authentication, authorization management, information sharing, and the like. The component annotates the tag with @ Service; realizing core business logic such as user management, access control, information sharing and the like; isolating service internal implementation details using an interface; a Spring Bean is used to manage the service layer components.
And the data layer is used for providing rich data sets for users and third-party enterprises through authorization management.
Here, the database table is mapped to the java object using JPA; the method comprises the steps that a repositisource interface is expanded to obtain a complex query method; using an @ Entity tag Entity, @ Table specifies a Table name; the object relationship mapping configuration uses an application. Yml file; database initialization uses schema.sql and data.sql files.
In the practical application preferred embodiment, the system has a large-scale social basic information data set, integrates massive user information, including information on population, education, traffic and the like, has wide coverage, and constructs a structured and standardized large-scale social information database; by establishing a standardized personal information model and interfacing with other systems, the method realizes that a personal user can be directly multiplexed by a plurality of institution systems only by registering information once on the platform without repeated filling, and realizes information interconnection and intercommunication and multiparty multiplexing; meanwhile, various security protection technologies such as encryption, blockchain, watermarking, behavior audit and the like are applied, the data flow direction is monitored in real time, and the source can be positioned and responded at the first time when information is leaked, so that the data security is effectively protected; the system not only has rich data sets, but also can safely share the information in the modes of authorization management, interface opening and the like, and provides personalized information access service for enterprises and related organization.
In some embodiments, the information sharing apparatus further comprises:
and storing user information, platform data and the like by adopting a MySQL and other relational databases. Non-structured data may also be processed by adding to the NoSQL database. And a cache database such as Redis is used, so that the access speed is improved. And Nginx/Apache and the like are adopted as reverse proxy servers, so that the platform access performance is improved. And (3) containerizing the platform, and rapidly deploying by adopting technologies such as Docker and the like. And the CI/CD pipeline is used for realizing automatic test and deployment, so that the code quality is ensured. The cloud platform compatible interface is designed, so that the platform can be deployed on public cloud, and the expandability is improved. And a monitoring and logging system is added, so that problems can be tracked conveniently and performance optimization can be performed. User registration and authentication: all users using the platform must register, provide true identity information, and undergo identity verification. At registration, the user needs to provide a valid identification document and contact. The platform will verify the authenticity of this information and protect the user's privacy strictly. Rights management: authentication is achieved using oauth2.0 or JWT (JSON Web Token) and security is improved in conjunction with multi-factor authentication (MFA). And fine-granularity authority control is realized by utilizing Security frameworks such as Spring Security and the like, so that users can only access authorized data. Legal use states that: the user must provide detailed usage instructions at the time of applying for the data, explaining what legal usage the required data will be for. This use needs to be checked by the platform to ensure its legitimacy and rationality. Data acquisition and verification: the platform will obtain data from trusted source organizations and use data verification algorithms to ensure accuracy of the data. Meanwhile, a real-time data updating mechanism is established to maintain timeliness of the data. Data flow and storage: the data stream from the data provider to the data consumer should be transmitted encrypted and stored on a secure server. The platform establishes perfect data backup and security mechanism to ensure that data is not lost due to unexpected events. Access control and rights management: the platform will set up a strict access control and rights management hierarchy ensuring that only authorized users can access certain data. Rights will be assigned on demand, severely limiting the range of data that a user can access. Monitoring and auditing: the platform will build a monitoring system that tracks the user's data access and operation. All data operations will be logged for auditing. If abnormal operation is found, the platform immediately takes measures to investigate. Third party collaboration and data tracking: all third party partners must sign strict security protocols and accept supervision of the platform before using the data. The platform establishes a data tracking system to track the condition of using the data by a third party, so as to ensure that the data cannot be abused or leaked.
In some embodiments, the service layer determines the user rights based on the user request and returns data matching the user rights. The data layer is used for providing data storage and file storage for authorized users and/or third party enterprises.
Wherein, as shown in fig. 2, the service layer further comprises a system management module; the system management module is also used for managing the user account, the role corresponding to the user account, the authority menu associated with the role, the department organization corresponding to the user and the file resource used by the user.
Illustratively, the system management manages users, platform roles, platform presentation menus and platform files, the roles including administrators and salesmen, and the administrators can make paid authorizations to the third party enterprises or related organizations on existing data; the administrator also needs to ensure timeliness of the data, such as age in personnel information or academic information updates, as follows:
user management: the user account of the platform is managed, and the functions of adding users, modifying user information, deleting users, freezing users, setting user permissions and the like are included. The user information includes a user name, password, name, contact, affiliated department, etc.
Role management: the roles of the platform represent a set of permissions, and may be managed on the roles, including adding roles, modifying role permissions, deleting roles, etc. Roles and users realize a many-to-many relationship, and one user can allocate a plurality of roles.
Menu management: the menu of the platform is managed, the menu representing a functional module. Menus may be added, menu names modified, ordering, corresponding routing paths, etc. Menus are associated with the permissions of the character for controlling which menu functions the character may access.
Department management: the organization departments of the platform are managed, and department information comprises department names, superior departments, responsible persons and the like. The users and departments form a many-to-many relationship for organizing the organization structure of the users.
File management: and carrying out centralized management on various file resources used in the platform, wherein the centralized management comprises the functions of uploading files, deleting files, managing recycle bins, controlling file authority and the like. Data files, pictures, multimedia files, etc. within the storage system.
In some embodiments, the service layer further comprises an authorization management module; the authorization management module is also used for managing the data authorized to the third party enterprise by the user through the third party enterprise authority information.
Illustratively, the authorization management is mainly used for managing information about third party enterprises authorized for information, such as types, qualification, obtained information types and ranges, authorized time ranges, information ranges and the like of the third party enterprises, and the specific contents are as follows:
enterprise/department information management: registering enterprises and related organization institutions needing to acquire user information sharing, and recording the information such as enterprise names, types, contact ways, qualification files and the like of the enterprises and the organizations, wherein the information is used for authorization management.
Qualification audit: and performing qualification audit on the acquired user information provided by the application enterprise/department, wherein only a unit passing the qualification audit can acquire partial authorization.
Authorization scope management: and (3) performing authorization scope management on the authorized enterprises/departments, and refining the authorization scope such as user information category, service life and the like which can be acquired by the authorized enterprises/departments.
Usage record audit: a detailed log of the enterprise/department usage user shared information is recorded, including the acquired information category, number, purpose of use, etc. Periodically, the usage record is checked and the discovery problem may revoke authorization.
And (3) authorized fee management: and charging a certain authorized use fee for the enterprises/departments for acquiring the user information sharing, and charging according to the authorized range and magnitude.
And (3) authorization protocol management: an authorization protocol for user information acquisition and use is signed with enterprises/departments, and rights and obligations of both parties are clearly standardized.
In some embodiments, the service layer further comprises an information source recording module; the information source recording module is also used for verifying and updating the acquired data in real time and recording information source types, information source time, information source modes and information failure records.
Information source management is to manage businesses or individuals providing information to a platform, in which there are entries for individuals to provide information or to modify information due to timeliness of information, and there are records of business or division provided information, and include information of the business division itself providing information, i.e., business name, qualification, type of information provided, etc. The specific content is as follows:
personal information providing management:
personal basic information registration: the personal user can register own basic personal information in the platform, including names, identification numbers, contact information, home addresses, marital status, academic information and the like.
Personal information modification: the user may modify a portion of his registered personal information, such as a change in contact, a change in marital status, etc. The modification will leave a log record.
Personal information preview: the user may preview the complete personal information registered on the platform itself.
Personal registration audit: the platform needs to carry out necessary auditing on information submitted by individual users, and the information is recorded and stored after being confirmed to be true and effective.
Enterprise/department information submission:
enterprise department registration: enterprises and related organizations performing information sharing need to register first and submit enterprise information and qualification certificates.
Classification of shared information: different categories of business/department information, such as demographic information, educational information, traffic information, etc., are registered in categories.
Submitting information for auditing: the information of various users submitted by enterprises and departments also needs to be strictly checked, so that the information is ensured to be real and legal.
Use authorization management: and carrying out authorized management on the information sharing of enterprises/departments, and granting access rights of different levels.
Information modification update: enterprises and departments can update and perfect user information regularly and submit information change applications.
In some embodiments, the service layer further comprises an information monitoring management module; the information monitoring management module is also used for encrypting and tracking the flow of the data information of the user in the storage process and the transmission process.
The information monitoring management mainly monitors and protects information through the following seven technical points:
encryption technology: the user information provided externally is encrypted in the whole course in the storage and transmission process, and the algorithm technologies of asymmetric encryption, hierarchical encryption and the like are adopted, and the information authority is used for controlling and protecting the decryption key, so that the data can be decrypted and accessed only by an authorized party.
Blockchain techniques: user information is packed and written into a blockchain for distributed storage, and the decentralised certificate can prevent information from being stolen or revealed at a single point. The non-tamper-resistance of the blockchain also ensures that the information is truly valid.
Data controllability techniques: the self-destruction program is set in the user information, and once the information is monitored to be accessed in an unauthorized mode or the data copy is detected, the information can be deleted remotely or disabled. The enterprise is guaranteed to be unable to fully hold the information.
Intelligent watermarking technology: the digital watermark of each enterprise is implanted in the shared information, once the information flows out in the public channel, the information source can be rapidly identified through the watermark, and the responsible party is tracked.
Behavior audit technology: and (5) recording the user information access behavior log of each enterprise to be uplink, and auditing all operations on the blockchain. Once unauthorized access or leakage occurs, the responsible business may be located at a first time.
Information traffic tracking: by intelligently analyzing the information flow, the abnormal data access mode is found, and the information leakage behavior is found in time. Bait information may also be provided for monitoring.
Early warning and response mechanism: when the user information security event occurs, early warning notification can be immediately sent to related enterprises, and the information sharing is interrupted by adopting technical means. The authorization of the enterprise or the suspension of collaboration is adjusted according to the situation.
The method is based on the technical means that the information flow direction is monitored in real time by the platform, and the information flow direction can be responded and treated quickly when the risk is found, so that the information safety of the user is protected to the greatest extent.
In practical application, the service layer is also used for collecting user data according to the user request and summarizing and arranging the user data; verifying the authority of the user or the third party enterprise based on the target information category of the user or the third party enterprise; and if the verification is passed, encrypting and transmitting the user data corresponding to the target information category to the user or a third party enterprise.
If the user data is leaked, detecting and repairing, backing up and deleting the leaked data; and if the data is out of date or is out of timeliness, correspondingly modifying or supplementing the data.
The embodiment of the invention integrates user information with wide sources, builds a centralized information base, realizes a standardized information model, supports the access of different systems to the information base, and further realizes the interconnection and intercommunication of information. Meanwhile, advanced block chain, encryption, access control and other technical means are needed to carry out safety monitoring and risk prevention on the full life cycle of the information. In addition, the platform also needs to establish a flexible authorization mechanism to realize the information sharing service customized according to the needs, thereby improving the information utilization efficiency and having important social value and economic value.
In some embodiments, the embodiment of the present invention further provides an information sharing platform, which includes the information sharing apparatus as described above, and further includes a front-end device.
The information sharing platform is designed into a front-end and back-end separated architecture, and the front-end equipment is compatible with the mobile terminal by using a responsive layout; using Vue/act as a main framework to modularize the development page; using a weback and other construction tools to realize modularized development and resource optimization; the interface uses an axios library to interact with the back end; implementing component logic using ES 6/TypeScript; the back-end device, i.e. the information sharing device, adopts a SpringBoot framework, and is divided into an interface layer, a service layer and a data access layer.
The embodiment of the invention aims to create a safe, efficient and transparent environment and provide a reliable personal basic information sharing service for users. The platform aims to promote convenient sharing of social information, ensure user privacy and data safety at the same time, and aim at the following targets:
1. the information sharing efficiency is improved: by integrating personal basic information, the information platform stores data from different sources in a centralized manner, and the information acquisition and sharing efficiency is improved. Whether it is individual user, enterprise organization or relevant organization, can obtain the required information more conveniently, raise the decision-making efficiency.
2. Guaranteeing data privacy and safety: advanced encryption technology and privacy protection measures are adopted to ensure that all personal basic information stored on the platform is protected safely. The privacy of the user will always be the highest priority consideration.
3. Promoting social service innovation: enterprises, developers and research institutions are encouraged to develop innovative social service programs by providing a trusted data sharing platform. This will promote innovations in the fields of medical treatment, education, finance, etc., and improve the level of social services.
4. Support organizational decisions and governance: organizations can use our platform to obtain more accurate, real-time demographic and socioeconomic data. Such data support helps better formulate policies, plan, and improve public services.
5. Trust and transparency are established: ensure the transparency of the platform operation and establish an open and fair sharing mechanism. Users can clearly understand how their data is used, creating a sense of trust in the platform.
Through the above objective, the basic information data sharing platform aims at promoting social development, improving public service level, ensuring the security of user data privacy and meeting the demands of users and society.
The information sharing platform provided by the embodiment of the invention has the same technical characteristics as the information sharing device provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
In the description of embodiments of the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
In the description of the present invention, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
Finally, it should be noted that: the above examples are only specific embodiments of the present invention, and are not intended to limit the scope of the present invention, but it should be understood by those skilled in the art that the present invention is not limited thereto, and that the present invention is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention.

Claims (10)

1. An information sharing apparatus, comprising:
the interface layer is used for establishing a standardized information model, processing user requests and calling returned data of the service layer;
the service layer is used for encrypting the return data in the whole process and monitoring the data flow direction in real time;
and the data layer is used for providing rich data sets for users and third-party enterprises through authorization management.
2. The apparatus of claim 1, wherein the interface layer invokes the return data of the service layer based on a request parameter sent by a front-end device.
3. The apparatus of claim 1, wherein the service layer determines user rights based on the user request and returns data matching the user rights.
4. The apparatus of claim 1, wherein the data layer is configured to provide data storage and file storage for authorized users and/or third party enterprises.
5. The apparatus of claim 1, wherein the service layer further comprises a system management module; the system management module is also used for managing the user account, the role corresponding to the user account, the authority menu associated with the role, the department organization corresponding to the user and the file resource used by the user.
6. The apparatus of claim 5, wherein the service layer further comprises an authorization management module; the authorization management module is also used for managing data authorized to the third party enterprise by the user through the third party enterprise authority information.
7. The apparatus of claim 6, wherein the service layer further comprises an information source recording module; the information source recording module is also used for verifying and updating the acquired data in real time and recording information source types, information source time, information source modes and information failure records.
8. The apparatus of claim 7, wherein the service layer further comprises an information monitoring management module; the information monitoring management module is also used for encrypting and tracking the flow of the data information of the user in the storage process and the transmission process.
9. The apparatus of any of claims 1-8, wherein the service layer is further configured to collect user data according to a user request and aggregate the user data; verifying the authority of a user or a third party enterprise based on the target information category of the user or the third party enterprise; and if the verification is passed, encrypting and transmitting the user data corresponding to the target information category to the user or the third party enterprise.
10. An information sharing platform, comprising the information sharing apparatus of any one of claims 1-9, and further comprising a front-end device.
CN202311776284.9A 2023-12-21 2023-12-21 Information sharing device and platform Pending CN117763633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311776284.9A CN117763633A (en) 2023-12-21 2023-12-21 Information sharing device and platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311776284.9A CN117763633A (en) 2023-12-21 2023-12-21 Information sharing device and platform

Publications (1)

Publication Number Publication Date
CN117763633A true CN117763633A (en) 2024-03-26

Family

ID=90313948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311776284.9A Pending CN117763633A (en) 2023-12-21 2023-12-21 Information sharing device and platform

Country Status (1)

Country Link
CN (1) CN117763633A (en)

Similar Documents

Publication Publication Date Title
Daraghmi et al. MedChain: A design of blockchain-based system for medical records access and permissions management
CN114513533B (en) Classified and graded body-building health big data sharing system and method
Zissis et al. Addressing cloud computing security issues
US10275603B2 (en) Containerless data for trustworthy computing and data services
Fan et al. DACAR platform for eHealth services cloud
CN110957025A (en) Medical health information safety management system
US10348693B2 (en) Trustworthy extensible markup language for trustworthy computing and data services
CN106534199B (en) Distributed system certification and rights management platform under big data environment based on XACML and SAML
CN110222518B (en) Trusted authority access control method based on block chain
WO2018213519A1 (en) Secure electronic transaction authentication
Ghani et al. Issues and challenges in cloud storage architecture: a survey
JP2012518330A (en) Reliable cloud computing and cloud service framework
Miorandi et al. Sticky policies: A survey
CN112837194A (en) Intelligent system
Badii et al. Privacy and security aspects on a Smart City IoT Platform
Chandersekaran et al. Claims-based enterprise-wide access control
De Oliveira et al. Monitoring personal data transfers in the cloud
Bhardwaj et al. Case Study of Azure and Azure Security Practices
CN117763633A (en) Information sharing device and platform
Ghani et al. Cloud storage architecture: research challenges and opportunities
Furst et al. Managing access in extended enterprise networks
Zeidler et al. Towards a framework for privacy-preserving data sharing in portable clouds
Malathi Cloud Computing Issues-A Survey
Huawei Technologies Co., Ltd. Database Security Fundamentals
Dhamgaye et al. Block Chain Based Fine Grained Data Sharing For Multiple Group

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination