WO2022156694A1 - 数据共享方法、装置、系统、服务器和计算机存储介质 - Google Patents
数据共享方法、装置、系统、服务器和计算机存储介质 Download PDFInfo
- Publication number
- WO2022156694A1 WO2022156694A1 PCT/CN2022/072684 CN2022072684W WO2022156694A1 WO 2022156694 A1 WO2022156694 A1 WO 2022156694A1 CN 2022072684 W CN2022072684 W CN 2022072684W WO 2022156694 A1 WO2022156694 A1 WO 2022156694A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- entity
- data
- resource
- access control
- resources
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000004044 response Effects 0.000 claims abstract description 56
- 238000004519 manufacturing process Methods 0.000 claims description 102
- 238000006243 chemical reaction Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 5
- 230000002596 correlated effect Effects 0.000 claims description 3
- 101150119033 CSE2 gene Proteins 0.000 description 25
- 101100007792 Escherichia coli (strain K12) casB gene Proteins 0.000 description 25
- 102100029091 Exportin-2 Human genes 0.000 description 21
- 101000770958 Homo sapiens Exportin-2 Proteins 0.000 description 21
- 230000000875 corresponding effect Effects 0.000 description 15
- 238000011217 control strategy Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 238000007792 addition Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Definitions
- the present disclosure relates to the field of data processing, and more particularly, to a data sharing method, apparatus, system, server and computer storage medium.
- device A generates a large amount of data and sends it to platform A for use by application A
- device B generates a large amount of data and sends it to platform B
- device C generates a large amount of data to send to platform C for use by application B.
- This model is suitable for enterprises with the ability to build their own platforms. Such a scenario is shown in Figure 1A.
- the data sharing may be data sharing between application entities, data sharing between other entities (eg, public service entities), or data sharing between application entities and other entities.
- a data sharing method comprising: receiving a data acquisition request from a first entity, wherein the data acquisition request includes an identifier of a resource of a second entity storing target data, and sharing operation indication information and setting the respective resource access control policies of the first entity and the second entity based on the data acquisition request, so that the first entity and the second entity can access each other's resources to realize data sharing; and sending a data acquisition response to the first entity, wherein the data acquisition response includes the target data.
- the sharing operation indication information includes: the identifier of the resource of the first entity; or, the identifier of the sharing operation; or, the identifier of the sharing operation and the identifier of the resource of the first entity; wherein , setting the respective resource access control policies of the first entity and the second entity based on the data acquisition request, including: based on the identification of the resources of the first entity and/or the identification of the shared operation and the second entity identification of an entity's resource determining that the first entity desires data sharing with the second entity; and determining whether the first entity satisfies a resource access control policy of the second entity, and setting the the respective resource access control policies of the first entity and the second entity.
- the sharing operation indication information only includes: the identifier of the sharing operation; or, the identifier of the sharing operation and the identifier of the resource of the first entity, wherein the first entity is set based on the data acquisition request.
- the respective resource access control policies of an entity and the second entity include: determining, based on at least the identification of the sharing operation, that the first entity desires to share data with the second entity, and setting the first entity and the second entity to perform data sharing. the respective resource access control policies of the second entities.
- setting the respective resource access control policies of the first entity and the second entity includes: updating the resource access control policies of the first entity, updating the resource access control policies of the second entity control strategy; or create a temporary access control strategy of the first entity, create a temporary access control strategy of the second entity; or update the resource access control strategy of the first entity, create a temporary resource access control strategy of the second entity; or update The resource access control policy of the second entity creates a temporary access control policy of the first entity.
- updating the resource access control policy of the first entity includes: making the accessor identifiers in the resource access control policy include identifiers of the first entity and the second entity, and the accessor identifiers indicate permission the identifier of the entity accessing the resource of the first entity; and updating the resource access control policy of the second entity comprises: making the accessor identifier in the resource access control policy include identifiers of the first entity and the second entity, the The accessor identification indicates the identification of the entity that is allowed to access the resource of the second entity.
- the creating a temporary access control policy of the first entity includes: creating a temporary access party identifier, and including an identifier of the second entity therein, the temporary access party identifier indicating that temporary access is permitted the identity of the entity of the resource of the first entity; and the creating a temporary access control policy of the second entity comprises: creating a temporary accessor identity, and including the identity of the first entity therein, the temporary accessor identity indicating that the permission is allowed The identity of the entity temporarily accessing the resources of the second entity.
- updating the resource access control policy of the first entity or the second entity further includes: adding a data amount limit, indicating that the resources obtained from the resources of the first entity or the resources of the second entity are allowed to be acquired Data volume upper limit threshold; or wherein, creating the resource access control policy of the first entity or the second entity further includes: creating a data volume limit, indicating that the resources obtained from the resources of the first entity or the resources of the second entity through temporary access are allowed Data volume upper limit threshold; wherein, when the amount of data obtained from the resources of the first entity or the resources of the second entity through temporary access reaches the upper limit threshold of data volume, it is prohibited to continue to obtain data from the resources of the first entity or the second entity resource to obtain data.
- creating the temporary access control policy of the first entity or the second entity further comprises: creating a temporary access time limit, indicating that temporary access to the resources of the first entity or the first entity is permitted The time of the resources of the two entities.
- the method further includes: determining whether the data type of the resource of the first entity is the same as the data type of the resource of the second entity, wherein, in the case of determining that the types of the two are the same, Updating the resource access control policy or creating a temporary access control policy also includes: adding a data sharing rule to limit the upper limit threshold of the same type of data obtained by both parties from the other party to be equal; wherein, in the case where it is determined that the types of the two are different In the future, updating the resource access control policy or creating a temporary access control policy also includes: adding data sharing rules to limit the upper limit thresholds of the different types of data obtained by both parties from the other party to be equal; and adding data volume conversion rules. Convert the amount of data obtained from the resource.
- the data under the resource of each entity has a content value attribute
- the value of the content value attribute is positively correlated and predefined with the usefulness of the data under the resource of the entity
- the data volume The conversion rule includes: multiplying the data volume of the data obtained from the resource by the value of the content value attribute of the data to obtain the converted data volume, and wherein, when the converted data volume exceeds the upper limit threshold of the data volume, Prohibits further fetching of data from the resource.
- the first entity is associated with a first public service entity
- the second entity is associated with a second public service entity
- the first public service entity is associated with the second public service entity
- Public service entities register with each other
- receiving a data acquisition request from a first entity includes: receiving, by the first public service entity, the data acquisition request from the first entity; If the identifier of the resource of the second entity included in the data acquisition request determines that the second entity is not associated with it but is associated with the second public service entity, forwarding the data acquisition request to the second entity public service entity.
- setting the respective resource access control policies of the first entity and the second entity based on the data acquisition request includes: acquiring by the second public service entity based on the data Request to set the resource access control policy of the second entity, so that the first entity can access its resources; the second public service entity returns a data acquisition response to the first public service entity, and the data acquisition response includes all the data of the target resource; the resource access control policy of the first entity is set by the first public service entity based on the data acquisition response, so that the second entity can access its resources; and the first public service entity is set by the first public service entity The data acquisition response is returned to the first entity.
- a data sharing apparatus comprising: a receiving module configured to receive a data acquisition request from a first entity, wherein the data acquisition request includes resources of a second entity storing target data The identifier of the first entity and the shared operation indication information; the setting module is configured to set the respective resource access control policies of the first entity and the second entity based on the data acquisition request, so that the first entity and the The second entity can access resources of the counterparty to realize data sharing; and a sending module is configured to send a data acquisition response to the first entity, wherein the data acquisition response includes the target data.
- the apparatus further includes: a determination module configured to determine whether the data type of the resource of the first entity is the same as the data type of the resource of the second entity, and send the determination result to the setting module , so that the setting module sets the respective resource access control policies of the first entity and the second entity according to the determination result.
- a determination module configured to determine whether the data type of the resource of the first entity is the same as the data type of the resource of the second entity, and send the determination result to the setting module , so that the setting module sets the respective resource access control policies of the first entity and the second entity according to the determination result.
- a data sharing system comprising: a first manufacturing equipment and a second manufacturing equipment; a first manufacturing application and a second manufacturing application, wherein the first manufacturing application and the first manufacturing equipment In association, the second manufacturing application is associated with the second manufacturing equipment; and the IoT platform is configured to: store the data uploaded by the first manufacturing equipment under the resources of the first manufacturing application, and the application data of the first manufacturing application Work together as the product data of the first manufacturing application, and store the data uploaded by the second manufacturing equipment under the resources of the second manufacturing application, and use the application data of the second manufacturing application as the product data of the second manufacturing application; the data acquisition request sent by the first manufacturing application, the data acquisition request including the identifier of the resource of the second manufacturing application storing the target product data and the product data sharing operation instruction information; setting the first manufacturing application based on the data acquisition request applying respective resource access control policies of the second manufacturing application and the first manufacturing application, so that the first manufacturing application and the second manufacturing application can access the resources of the other party to obtain product data
- the first manufacturing application is configured to adjust the first manufacturing based on product data of the first manufacturing application and target product data obtained from resources of the second manufacturing application
- the product data of the application makes the product data of the first manufacturing application compatible with the product data of the second manufacturing application.
- a server comprising: a processor; and a memory having a program stored thereon, the program, when executed by the processor, causes the processor to be as described above Steps of the data sharing method.
- a computer storage medium including a computer program, the computer program implementing the above-described data sharing method when executed by the processor.
- FIG. 1A shows a schematic diagram of a scenario where different platforms serve different specific applications and devices
- FIG. 1B shows a schematic diagram of a scenario where the general service platform serves different applications and devices
- FIGS. 2A-2B show schematic flowcharts of a data sharing method according to an embodiment of the present disclosure
- 3A-3B illustrate schematic diagrams of resource structures according to embodiments of the present disclosure
- FIG. 4 shows a schematic diagram of an interaction flow of a data sharing method according to an embodiment of the present disclosure
- FIG. 5 illustrates further details of the method of FIG. 2A with different entities registered to different communication service entities, according to an embodiment of the present disclosure
- FIG. 6 shows a schematic diagram of an interaction flow of the data sharing method shown in FIG. 5 according to an embodiment of the present disclosure
- FIG. 7 shows a structural block diagram of a data sharing apparatus according to an embodiment of the present disclosure
- FIG. 8 shows a schematic diagram of a data sharing system according to an embodiment of the present disclosure.
- FIG. 9 shows a schematic structural diagram of a server according to an embodiment of the present disclosure.
- an IoT entity eg, a software module in an IoT terminal device or a node device
- the data or information can be stored as a separate resource.
- the Internet of Things entity may send a request to the public service entity, thereby updating the resource corresponding to the Internet of Things entity stored on the public service entity, so as to reflect the state of the device operated by the Internet of Things entity. This update can be real-time or periodic, or it can be triggered by a condition.
- the resources referred to here include resources of various entities (eg, can be embodied as software modules in IoT devices, such as AE, CSE, etc.).
- the entity may represent a software module of a communication device
- the public service entity may represent a software module of a service platform, which may be local or remote.
- attribute-based access control is usually used for access control of resources, and access to corresponding resources is achieved by setting each attribute in a resource access control policy (accessControlPolicy).
- accessControlPolicy resource access control policy
- a public service entity would create a resource for the entity and a resource access control policy for that entity would be created for that entity.
- the resource access control policy is the content of the access control policy, that is, the content of the evaluation basis (access rule) for evaluating whether the request for accessing the target resource is authorized.
- the request to access the target resource must pass the corresponding authorization verification in the access control policy before completing the request authorization operation.
- the current resource access control policy may include an access limit (accessControlLimit), which is used to limit the number of times the resource can be accessed; the location region or IP address limit (accessControlLocationRegion or accessControlIPAddress) of the access requester, which is used to limit the access control. Which IP addresses (blocks) the access requester must be in or must have.
- the resource access control policy may include a preset identifier of an entity that is allowed to initiate an access request to the resource.
- a preset identifier of an entity that is allowed to initiate an access request to the resource.
- the above-mentioned preset identification in the resource access control strategy for the resource of the entity only includes the identification of the entity, and only in the identification of the requesting party that initiates the access request and the preset identification The access request is authorized (access is allowed) only when the identifiers are the same.
- an entity (such as the aforementioned application entity) can only obtain data associated with it from a public service entity.
- an application entity can be understood to be mapped to a public service entity, the public service entity creates a resource for the application entity, and the application data of the application entity is stored under the resource; in addition, the terminal (device) associated with the application entity Also mapped to the public service entity, the public service entity creates a resource for the terminal, and the data uploaded by the terminal is stored under the resource; and through the coordination of the public service entity, the application entity can obtain storage under the public service entity. its own application data and the associated terminal data. Therefore, in the present disclosure, for ease of understanding, the data under the resources of the application entity may be understood as the data of the application entity itself and the data uploaded by the associated device (terminal).
- a resource can have a unique identifier, which includes attributes and sub-resources, wherein the attributes are used to store information related to the resource, the sub-resource is the next-level resource of the resource, and the resource includes an index pointing to the sub-resource.
- application B may wish to obtain application data of application A or device data uploaded by device A corresponding to application A, so as to adjust its own application data.
- application B may wish to obtain the application data of application A and/or the device data uploaded by the corresponding device A, so that application B can comprehensively consider its own application data, application data of application A and/or
- the device data uploaded by device A adjusts its own application data to be compatible with the product data of application A and/or the device data of device A, so that the products produced by device B can be unified in style with those produced by device A.
- the present disclosure proposes a data sharing method, system and computer storage medium for data sharing among different entities.
- the data sharing may be data sharing between application entities, data sharing between other entities (eg, public service entities), or data sharing between application entities and other entities.
- the smart manufacturing scenario is used as an example to describe various aspects of the data sharing method
- the data sharing method can be used in other application scenarios of the Internet of Things.
- comprehensive application A including bicycle sharing services and business recommendation services, etc.
- application A can use the data uploaded by type A bicycles (such as temperature, speed, location data, etc.)
- application B It is also associated with the B-type bicycle through the same service platform, that is, the application B can use the data uploaded by the B-type bicycle.
- the B-type bicycle can upload data to the service platform in real time for the B application to use.
- the comprehensive application A can perform commercial recommendation services, but because it does not use the corresponding bicycle of type A, it cannot obtain the current riding-related information in real time. Therefore, the comprehensive application A also hopes to obtain the data uploaded by the type B bicycle to carry out Related recommendation services, therefore, in this case, application A may also wish to share data with application B.
- FIGS. 2A-2B show schematic flowcharts of a data sharing method according to an embodiment of the present disclosure.
- the method may be performed by a common service entity (universal service platform).
- step S210 a data acquisition request is received from the first entity, wherein the data acquisition request includes an identifier of the resource of the second entity storing the target data, and sharing operation indication information.
- the first entity may be the first application entity, and the second entity may be the second application entity.
- the first entity may be the first public service entity, and the second entity may be the second public service entity, in which case the public service entity for coordinating and coordinating the various entities may be referred to as the hosting public service entity ( Hosting CSE). Both the first entity and the second entity are registered on the public service entity.
- Hosting CSE hosting public service entity
- the first entity may wish to acquire part of the data (target data) under the resources of the second entity, so the data acquisition request is sent to the public service entity by including the identification of the resources of the second entity storing the target data.
- the first entity may first determine whether it satisfies the resource access control policy of the second entity. For example, if the first entity has previously shared data with the second entity and the previous resource access control policies of the first and second entities are still in effect (eg, no invalidation notification has been received from the public service entity), the first entity The data acquisition request may be sent directly to the public service entity without including the sharing operation indication information; otherwise, the first entity needs to resend the data acquisition request including the sharing operation indication information.
- the data acquisition request may also include sharing operation indication information It is used to trigger a data sharing operation, so that the first entity can obtain the data under the resources of the second entity.
- the shared operation indication information may be implicit or explicit.
- the sharing operation indication information may include the identifier of the resource of the first entity, that is, the data acquisition request includes the identifier of the resource (target resource) of the second entity and the identifier of the resource (source resource) of the first entity, so as to Implicitly indicates the public service entity that the first entity desires data sharing with the second entity.
- the sharing operation indication information may include: an identifier of the sharing operation; or, an identifier of the sharing operation and an identifier of the resource of the first entity.
- the sharing operation indication information is the identifier of the sharing operation
- the first entity that explicitly instructs the public service entity to send the request including the identifier of the sharing operation expects to communicate with the second entity (the identifier of the second entity is included in the data acquisition request) data sharing.
- the public service entity can know who sent the request to it, and therefore can also know that the first entity sends the request to it.
- the public service entity indicates that data under its resources is available for sharing with the second entity.
- the first entity can receive a response that the data acquisition request fails when it does not have the access control authority to the resources of the second entity, and the first entity can finally obtain the data through a separate data acquisition request.
- Obtaining the access control authority of the resources of the second entity simplifies the operation process of the first entity and reduces the workload of the first entity.
- step S220 the respective resource access control policies of the first entity and the second entity are set based on the data acquisition request, so that the first entity and the second entity can access each other's resources to realize data sharing.
- step S220 may include: determining the first entity based on the identifier of the resource of the first entity and the identifier of the resource of the second entity. an entity desires data sharing with the second entity, and the first entity does not satisfy the resource access control policy of the second entity; and setting each of the first entity and the second entity based on the determination resource access control policy.
- the identity of application A (the first entity) must not be included in the preset identity of the access requestor who is allowed to access the resources of application B, so application A does not The resource access control policy of application B is satisfied, and the data acquisition request (access request) issued by the application B cannot be allowed according to the current resource access control policy. Therefore, the public service entity sets (modifies, updates, creates, etc.) the resource access control policies of application A and application B, so that application A and application B can access each other to realize data sharing.
- a data acquisition failure response may be returned to the first entity first.
- step S220 may include: determining, based on at least the identification of the sharing operation, that the first entity expects to communicate with the second entity.
- the entities share data and set respective resource access control policies of the first entity and the second entity.
- the public service entity may determine whether the first entity that initiates the data acquisition request and the second entity as the target are trusted parties before setting the respective resource access control policies of the first entity and the second entity, thereby improving security
- the trust level of the first entity and the second entity can be determined by the historical interaction records of the first entity and the second entity with the public service entity, and only when the trust level meets the preset level, the first entity and the second entity are set Entities' respective resource access control policies.
- the access policy of which security level (for example, full access, temporary access) to set may also be determined according to the trust levels of the first entity and the second entity.
- setting the respective resource access control policies of the first entity and the second entity may include updating (modifying) the existing resource access control policies of the first entity and the second entity (corresponding to full access). ), that is, the first entity and the second entity are given full access rights to each other's resources (for example, the two parties are in a relationship of full trust), which may also include additionally creating new resource access control policies (corresponding to temporary access), That is, at least one of the first entity and the second entity may only be allowed to temporarily access the other's resources.
- both application A and application B have high trust levels, so both application A and application B can access each other's resources at any time, or application A has a low trust level and application B has a high trust level, so in the application
- the public service entity will create application B's resource access control policy to allow application A to temporarily access application B's resources, but update application A's resource access control policy to App B is allowed to access App A's resources at any time.
- setting the respective resource access control policies of the first entity and the second entity may include the following situations: 1. Update the resource access control policies of the first entity and update the resource access control policies of the second entity Control strategy; 2. Create the temporary access control strategy of the first entity, and create the temporary access control strategy of the second entity; 3. Update the resource access control strategy of the first entity, and create the resource temporary access control strategy of the second entity; Or, 4. Update the resource access control policy of the second entity, and create a temporary access control policy of the first entity.
- updating the resource access control policy of the first entity may include: making the accessor identifiers in the access control policy include identifiers of the first entity and the second entity, and the accessor identifiers indicate that access to the first entity is permitted.
- the entity of the resource For example, for the application entity AE1, the preset identity included in the resource access control policy for its resources can be updated from only including the identity of the application entity AE1 to including the identity of the application entity AE1 and the identity of the application entity AE2, thereby allowing the application entity AE1 and the application entity AE2 access the resources of the application entity AE1.
- updating the resource access control policy of the second entity may include: making the accessor identifiers in the access control policy include identifiers of the first entity and the second entity, and the accessor identifiers indicate that access to the second entity is permitted entity.
- the preset identity included in the resource access control policy for its resources can be updated from the identity of only the application entity AE2 to the identity of the application entity AE1 and the application entity AE2, so that it can be The application entity AE1 and the application entity AE2 are allowed to access the resources of the application entity AE2.
- both parties after updating the respective resource access control policies of the first entity and the second entity, both parties have the authority to access each other's resources, so that data sharing can be achieved.
- the first entity may not want or be unable to share data with any other resources, for example, the data uploaded by the equipment associated with the first entity in these time periods is data with strong confidentiality, while at other times The segment (the confidential data has been acquired and no longer exists in the resource) can in turn allow other resources to access for data sharing with other resources.
- the trust level of the entity requesting to access the resources of the first entity is not high, the time period during which it is allowed to access the resources of the first entity may be restricted for the entity, such as allowing the entity to time period to visit.
- the embodiment of the present disclosure also proposes the concept of temporary access, that is, some resources may only be allowed to be accessed within a certain period of time, or some resources may only be accessed by certain entities within a certain period of time, so as to enhance the data of the resource security. This can be achieved by creating temporary access control policies for resources by public service entities.
- the temporary access control policy can be similar to the existing resource access control policy, except that the specific content included is different due to the different access types.
- the public service entity After creating, for example, a temporary access control policy of the second entity on the public service entity, the public service entity can make judgments about each access rule in the temporary access control policy.
- creating a temporary access control policy for the first entity includes creating a temporary accessor identification and including therein an identification of the second entity, the temporary accessor identification indicating an entity that is permitted to temporarily access the first entity.
- the temporary access party identifier in the created temporary access control policy for its resources may include the identifier of the application entity AE2, thereby allowing the application entity AE2 to temporarily access the resources of the application entity AE1.
- creating a temporary access control policy for the second entity includes creating a temporary accessor identification and including therein an identification of the first entity, the temporary accessor identification indicating an entity that is permitted to temporarily access the second entity.
- the temporary access party identifier in the created temporary access control policy for its resources may include the identifier of the application entity AE1, thereby allowing the application entity AE1 to temporarily access the resources of the application entity AE2.
- both parties have the authority to temporarily access the resources of the other party, thereby realizing data sharing.
- its access control policy may be updated for one of the first and second entities, and a temporary access policy may be created for the other of the first and second entities.
- a temporary access policy may be created for the other of the first and second entities.
- the temporary access party identifier in the temporary access control policy for its resources may include the identifier of the application entity AE1, thereby allowing the application entity AE1 to temporarily access the resources of the application entity AE2, and for the application entity AE1, for The preset identifier included in the resource access control policy of its resources can be updated to include the identifier of the application entity AE2 in addition to the identifier of the application entity AE1 itself, thereby allowing the application entity AE2 to fully access the resources of the application entity AE1.
- the above-mentioned updating of the resource access control policy of the first entity or the second entity further includes: adding a data volume limit, indicating that the acquisition from the resources of the first entity or the resources of the second entity is allowed. or creating a resource access control policy (for temporary access) of the first entity or the second entity further comprising: creating a data volume limit indicating that the resources from the first entity or the resources of the second entity are allowed to The upper threshold of the amount of data obtained through temporary access.
- the public service entity may perform statistics on the amount of data acquired by the first entity from the resources of the second entity (data acquired by having full access or temporary access). Obtain the statistical data volume, and compare it with the data volume limit (representing the data volume upper limit threshold) in the resource access control policy or the temporary access control policy of the second entity to determine whether the statistical data volume exceeds the data volume upper limit threshold, in the first After the amount of statistical data obtained by the entity from the resources of the second entity exceeds the upper limit threshold of the data amount, the access rule of limiting the amount of data is no longer satisfied. Therefore, the public service entity prohibits the first entity from continuing to obtain data from the resources of the second entity. Similarly, when the second entity shares data with the first entity, it can also obtain data from the resources of the first entity, and also needs to satisfy the access rule of the data volume limitation in the resource access control policy of the first entity.
- the unit of data volume can be KB, MB, TB.
- creating a temporary access control policy for the first entity or the second entity further includes creating a temporary access time limit indicating the time during which temporary access to the resources of the first entity or the second entity is permitted.
- the resource can be temporarily accessed after a certain time point, or it can be set that the resource can be temporarily accessed within a certain period of time.
- step S230 a data acquisition response is sent to the first entity, wherein the data acquisition response includes the target data.
- the first entity and the second entity have been able to access each other, so the public service entity can return to the first entity the required target stored under the second entity data.
- the first entity may adaptively adjust its own data based on the acquired target data. And, based on the data acquisition response, the first entity can determine that it has access to the resource of the second entity. After that, if the first entity again wants to acquire the relevant data stored at the same resource of the second entity on the public service entity, it can send a data acquisition request to the public service entity, and the data acquisition request can no longer include the sharing operation Indication information, but only needs to include the identifier of the same resource of the second entity (that is, the identifier of the target resource), so at the public service entity, since the resource access control policy of the second entity has been set, and the data acquisition request received at this time
- the shared operation indication information is no longer included, so the public service entity will judge whether the first entity satisfies the current resource access control policy of the second entity based on the set resource access control policy (for example, the time when the first entity initiates the data acquisition request Whether the temporary access is allowed in the resource temporary access control policy of the second entity is
- the general service entity may also send a notification to the second entity to inform the second entity that the data of the resources of the first entity can also be obtained.
- the data types under the resource may be the same or different.
- a data sharing rule can be added to the access control policy or a created temporary access control policy, wherein the data sharing rule defines the upper threshold of the data volume of the same type of data obtained by both parties from the other party. It needs to be equal, that is, at most the same amount of data of this type can be obtained from the other party. It should be noted that “equal” here can be understood in a relative sense, that is, a certain error range is allowed.
- the method 200 may further include step S210', namely determining whether the data type of the resource of the first entity is the same as the data type of the resource of the second entity.
- the determination process may be performed in Step S220 is before setting the respective resource access control policies of the first entity and the second entity.
- the determination result of whether the data types are the same can also be used to set these resource access control policies.
- a data sharing rule can be added to the access control policy or a data sharing rule can be added to the created temporary access control policy to limit the data of the same type of data obtained by both parties from the other party.
- the volume upper thresholds must be equal.
- a data sharing rule can be added to the resource access control policy to limit the converted upper limit thresholds of the different types of data obtained by both parties from the other party to be equal, and add data volume conversion Rules for scaling the amount of data obtained from the resource.
- the converted data volume obtained by each can be compared with the upper limit threshold of the data volume, so that after the conversion obtained by the first entity or the second entity from the resources of the other party, After the data volume exceeds the upper limit threshold of the data volume, the first entity or the second entity is prohibited from continuing to acquire data from the other party's resources. In this way, even if the data types are different, the data volume upper thresholds are still the same to facilitate resource management.
- each data under each resource has a content value attribute
- the value of the content value attribute is positively correlated with the usefulness of each data under the resource
- the data volume conversion rule includes: making the data of the data obtained from the resource. The amount of data is multiplied by the value of the content value attribute of the data to obtain the converted data amount.
- the resources corresponding to the application may include temperature data and location data, and the content value of temperature data may be 1, while the content value of location data may be 2, because for bicycles, location data is important to It may be more useful for bike-sharing companies, such as location data to know which road segments have more users, so that they can put more bikes on these road segments, or for other companies that want to share data with them (with bike-sharing services). and business recommendation service), obtaining location data is more conducive to the business recommendation of the enterprise.
- the content value corresponding to the data obtained by application A from the resources of application B is 1, while the content value corresponding to the data obtained by application B from the resources of application A is 1. If it is 2, it is assumed that both parties have obtained 2M of data, but in fact, it can be considered that the amount of converted data obtained by application A is 2M, and the amount of converted data obtained by application B is 4M. When the upper limit is 4M, App B will be prohibited from obtaining data from App A's resources, while App A can continue to obtain data from App B's resources.
- FIGS. 3A-3B show the resource structure on the public service entity after the original resource access control policy is updated or the temporary access control policy is created.
- the public service entity CSE is provided with the resources of the first entity (taking the resource as the application entity as an example, denoted as AE1) and the resources of the second entity (AE2), and the resources of the first entity (AE1) Sub-resources are set under the sub-resources, wherein the sub-resources include the resource access control policy of the first entity and a container.
- the container can encapsulate and store application data from applications.
- the resource of the first entity (AE1) is also provided with the associated device attribute of the device associated with the application entity, for example, the identifier of the device A associated with the application A, so as to link the application A and the device A, for example, in the device
- the data value at the specific sub-resource storing the temperature data under the resource corresponding to the device A under the public service entity (device AE3 in FIG. 3A ) will change, and due to the public service entity
- the service entity knows that the device A is associated with the application A, so the application A can also obtain the updated data of the device A from the public service entity.
- the resources of the second entity (AE2) may have a similar structure to the resources of the first entity (AE1), or may set sub-resources at a lower level or add other resources at the same level according to their own conditions.
- the first entity's resource access control policy is updated to include the identity of the second entity in addition to the identity of the original first entity in the preset identity of the access requester
- the resource access control policy of the second entity is updated to include the identity of the second entity in the preset identity of the access requester except
- the identifier of the first entity is also included.
- the access control policy may further include data volume restrictions and data sharing rules.
- the access control policy may also include other possible access rules, for example, data volume conversion rules (considering different data types of resources, etc.), Access restrictions (existing access rules), etc.
- Fig. 3B is similar to Fig. 3A except that Fig. 3B shows the resource access control policy of the first entity (AE1) and the resource temporary access control policy of the second entity (AE2).
- the temporary access control policy of the first entity may include: access requester restriction (the accessor who is allowed to temporarily access the first entity is identified as the identifier of the second entity (AE2)); access time restriction (allows access to the first entity) The time for temporary access to the first entity is the time period from 8:00 to 18:00 every day); data volume restrictions (the maximum amount of data that is allowed to be obtained from the first entity through temporary access is 10M); data volume conversion rules; and data sharing rules.
- access requester restriction the accessor who is allowed to temporarily access the first entity is identified as the identifier of the second entity (AE2)
- access time restriction (allows access to the first entity)
- the time for temporary access to the first entity is the time period from 8:00 to 18:00 every day
- data volume restrictions the maximum amount of data that is allowed to be obtained from the first entity through temporary access is 10M
- data volume conversion rules data volume conversion rules
- data sharing rules data sharing rules.
- FIG. 4 shows a schematic flowchart of data sharing between the first entity and the second entity according to an embodiment of the present disclosure.
- the first application entity (AE1) and the second application entity (AE2) register with the public service entity (CSE) respectively, so that the CSE can create resources for AE1 and AE2, for example, represented as ⁇ CSE/AE1> and ⁇ CSE, respectively /AE2>, the resource may include multiple sub-resources and may store various types of data of AE1 and AE2, such as respective application data and data uploaded by associated devices.
- CSE creates the above resources, it returns registration responses to AE1 and AE2 respectively.
- the AE1 sends a data acquisition request (for the first time) to the CSE, where the data acquisition request includes the identifier of the resource of the application entity (AE2) storing the target data and the sharing operation indication information.
- the sharing operation indication information may include: the identifier of the resource of AE1; or, the identifier of the sharing operation; or, the identifier of the sharing operation and the identifier of the resource of AE1.
- the data acquisition request may not include the sharing operation indication information, and the CSE receives the data acquisition request. After that, it is determined that AE1 satisfies the previous resource access control policy that is still valid in AE2, and the target data is directly returned to AE1.
- this pre-operation for AE1 and CSE is optional.
- the CSE determines (implicitly or explicitly indicated) that AE1 wishes to share data with AE2 (ie, access AE2's resources on the CSE, and can be accessed by AE2's own resources).
- the CSE determines that the AE1 does not conform to the resource access control policy of AE2 (for example, by judging whether the identifier of AE1 (the identifier of AE1 can be determined according to the identifier of the resource of AE1) includes whether In the preset identification of the access requester that is allowed to access AE2, and if there is no previous sharing process, in the current resource access control policy, AE1 cannot directly issue an access request for the resources of AE2, the judgment result is No), so
- the CSE sets the resource access control policies of AE1 and AE2 at the CSE, so that the two can mutually access each other's resources, and can optionally return a data acquisition failure
- the CSE needs to reset the resource access control policy; or, in the case that the shared operation indication information includes at least the shared operation identifier, the CSE sets the resource access control policies of AE1 and AE2 at the CSE based on the shared operation identifier, which may be unnecessary. It is judged whether AE1 satisfies the resource access control policy of AE2, so that the two can mutually access each other's resources. In this case, optionally, the CSE may determine whether AE1 and AE2 that initiate the data acquisition request are trusted parties before setting the respective resource access control policies of AE1 and AE2, thereby improving security.
- the access policy of which security level (for example, full access, temporary access) is set may also be determined according to the trust level of AE1 and AE2.
- CSE can also determine whether the data types of the resources of AE1 and AE2 are the same, and if they are not, it should also determine and create or update the data volume conversion in the resource access control policy rule.
- the CSE may acquire target data under the resources of AE2 registered with it and return a data acquisition response to AE1, the data acquisition response including the target data.
- the AE1 can adaptively adjust its own data based on the acquired target data.
- the CSE can also send a notification request to AE2 to notify AE2 that it can access the resources of AE1 for data sharing with AE1.
- the notification request may include the resource access control policy of AE1.
- AE2 may return a notification response to the CSE.
- AE1 can determine that it has access to AE2's resources. After that, if AE1 wants to obtain the relevant data stored in the resources of AE2 on the CSE again, it can send a data acquisition request to the CSE.
- the data acquisition request can no longer include the sharing operation indication information, but only needs to include the The identifier of the resource (that is, the identifier of the target resource), so at the CSE, since the resource access control policy of AE2 has been set, and the data acquisition request received at this time no longer includes the sharing operation indication information, the CSE will be based on the set resource.
- Access control policy to determine whether AE1 satisfies the resource access control policy of AE2 (for example, whether the time when AE1 initiates a data acquisition request is within the time period that allows temporary access in the temporary access control policy of AE2 resources), and after judging that it is satisfied, send the AE1 returns a data acquisition response.
- Figure 5 shows more details of the method 200 in the case where different entities are registered with different communication service entities.
- the first entity is associated with the first public service entity (eg, registered with the first public service entity where the first public service entity creates resources and the original resource access control policy for the first entity)
- the second entity is associated with the second public service entity (eg, registered with the second public service entity where the second public service entity creates resources and the original resource access control policy for the second entity)
- the first public service entity The service entity and the second public service entity register with each other, so that the first public service entity and the second public service entity can mutually acquire each other's data and forward messages.
- Step S210 may specifically include the following sub-steps.
- sub-step S2101 a data acquisition request is received by the first public service entity from the first entity.
- step S2102 if the first public service entity determines that the second entity is not associated with it but is associated with the second public service entity based on the identifier of the resource of the second entity included in the data acquisition request, the data The acquisition request is forwarded to the second public service entity.
- the first public service entity Since the first entity and the second entity are registered with the first public service entity and the second public service entity respectively, the first public service entity does not have any resources created for the second entity, so the first entity and the second entity cannot be coordinated Data sharing between entities, and since the first public service entity and the second public service entity are registered with each other, the first public service entity knows that the second entity is registered with the second public service entity, so that the data can be The acquisition request is forwarded to the second public service entity. In addition, if the first public service entity determines that the second entity is not registered with the first public service entity and not registered with the second public service entity, an acquisition failure response is directly returned to the first entity.
- step S220 may include the following sub-steps.
- step S2201 a resource access control policy of the second entity is set by the second public service entity based on the data acquisition request, so that the first entity can access the resources of the second entity.
- setting the resource access control policy of the second entity may include updating the resource access control policy or creating a new temporary resource access control policy.
- the specific update and creation methods are the same as those described in detail above, and thus will not be repeated here.
- step S2202 the second public service entity returns a data acquisition response to the first public service entity, where the data acquisition response includes target data.
- the target data is stored under the resources of the second entity at the second public service entity, and the second public service entity retrieves the target data stored there, but cannot directly communicate with the first entity, so the target data is included in the The data acquisition response is returned to the first public service entity to which the data acquisition request is forwarded.
- step S2203 the resource access control policy of the first entity is set by the first public service entity, so that the second entity can access the resources of the first entity.
- the first public service entity may understand that the above-mentioned data acquisition response received from the second public service entity is that the second public service entity has allowed the first entity to access the requested resources of the second entity, based on this understanding of the first public service entity
- the service entity may set the resource access control policy of the first entity so that the second entity can also access the resource of the first entity indicated by the identifier of the resource of the first entity included in the previous data acquisition request.
- step S230 the first public service entity returns a data acquisition response to the first entity.
- the first public service entity finally returns the requested target data to the first entity, so that the first entity can adapt its own data according to the target data.
- FIG. 6 shows a schematic flowchart of data sharing between the first entity and the second entity registered to different public service platforms according to an embodiment of the present disclosure.
- the first application entity (AE1) and the second application entity (AE2) register with the first public service entity (CSE1) and the second public service entity (CSE2), respectively, so that CSE1 and CSE2 can create AE1 and AE2 respectively
- Resources for example represented as ⁇ CSE1/AE1> and ⁇ CSE2/AE2> respectively, may include multiple sub-resources and may store various types of data of AE1 and AE2, such as respective application data and data uploaded by associated devices.
- CSE1 and CSE2 create the above resources, respectively, return registration responses to AE1 and AE2.
- AE1 sends a data acquisition request (for the first time) to CSE1, where the data acquisition request includes the identifier of the resource of the application entity (AE2) storing the target data and the sharing operation indication information.
- the sharing operation indication information may include: the identifier of the resource of AE1; or, the identifier of the sharing operation; or, the identifier of the sharing operation and the identifier of the resource of AE1.
- CSE1 determines (implicitly or explicitly indicated) that AE1 wishes to share data with AE2 (ie, access the resources of AE2 on the CSE, and can be accessed by AE2 to its own resources), and determines that AE2 is not registered to CSE1 but is registered to CSE2, so CSE1 forwards the data fetch request to CSE2.
- the data acquisition request may not include the sharing operation indication information, and CSE2 receives it.
- CSE2 receives it.
- the data acquisition request forwarded by CS1 it is determined that AE1 satisfies the previous resource access control policy that is still valid in AE2, and the target data is directly returned to AE1 via CSE1.
- this pre-operation of AE1 and CSE1-CSE2 is optional.
- CSE2 After CSE2 receives the data acquisition request (including the sharing operation indication information), in the case that the sharing operation indication information is the identifier of the resource of AE1, CSE2 judges that AE1 does not conform to the resource access control policy of AE2, so CSE2 sets AE2 at CSE2 The resource access control policy of AE2, so that AE1 can access the resources of AE2; or, in the case where the shared operation indication information includes at least the shared operation identifier, CSE2 sets the resource access control policy of AE2 at CSE2 based on the shared operation identifier, without the need for Determine whether AE1 satisfies the resource access control policy of AE2.
- CSE2 needs to determine whether AE1 that initiates the data acquisition request is a trusted party before setting the resource access control policy of AE2, so as to improve security.
- the access policy of which security level (for example, full access, temporary access) is set for the AE1 may also be determined according to the trust level of the AE1.
- CSE2 can acquire target data under the resources of AE2 registered with it and return a data acquisition response to CSE1.
- CSE1 can determine that CSE2 has allowed AE1 to access the requested resources of AE2, so CSE1 also sets the resource access control policy of AE1 (the specific setting process is the same as the previous one), so that AE2 can also access The resources of AE1 on CSE1 to realize data sharing.
- CSE1 may also issue a notification request to CSE2 to notify AE2 via CSE2 that AE1's resources may be accessed for data sharing with AE1.
- the notification request may include the resource access control policy of AE1.
- AE2 After successfully receiving the notification request, AE2 can return a notification response to CSE2, which is then forwarded back to CSE1 by CSE2.
- CSE1 After CSE1 receives the data acquisition response from CSE2, similarly, it can also first determine whether AE2 satisfies the current resource access control policy of AE1, and when it is determined that it is satisfied, directly returns data to AE1, and via The CSE sends a notification to the AE2 that the resources of the AE1 can be accessed, and does not carry out the subsequent process, and only continues to set the resource access control policy of the AE1 at the CSE1 when it is judged that it is not satisfied.
- CSE1 returns a data acquisition response to AE1, the data acquisition response including the target data.
- the AE1 can adaptively adjust its own data based on the acquired target data.
- AE1 can determine that it has access to the resources of AE2 that were previously requested. After that, if AE1 wants to acquire the relevant data stored at the resource of AE2 on CSE2 again, it can send a data acquisition request to CSE1 and forward it to CSE2 via CSE1.
- the data acquisition request can no longer include sharing Operation instruction information, but only needs to include the identifier of the resource of AE2 (that is, the identifier of the target resource), so at CSE2, since the resource access control policy of AE2 has been set, and the data acquisition request received at this time no longer includes the sharing operation instruction Therefore, CSE2 will judge whether AE1 satisfies AE2's resource access control policy based on the set resource access control policy (for example, whether the time when AE1 initiates the data acquisition request is within the time period that allows temporary access in AE2's resource temporary access control policy within), and after judging that it is satisfied, returns a data acquisition response to AE1 via CSE1.
- FIG. 7 shows a structural block diagram of a data sharing apparatus 700 according to an embodiment of the present disclosure.
- the data sharing apparatus 700 includes a receiving module 701 , a setting module 702 and a sending module 703 .
- the receiving module 701 is configured to receive a data acquisition request from the first entity, wherein the data acquisition request includes an identifier of the resource of the second entity storing the target data, and sharing operation indication information.
- the setting module 702 is configured to set the respective resource access control policies of the first entity and the second entity based on the data acquisition request, so that the first entity and the second entity can access each other's resources to Enable data sharing.
- the sending module 703 is configured to send a data acquisition response to the first entity, wherein the data acquisition response includes the target data.
- the data sharing apparatus 700 may further include a determination module 704, configured to determine whether the data type of the resource of the first entity is the same as the data type of the resource of the second entity, and send the determination result to the setting module. , so that the setting module sets the respective resource access control policies of the first entity and the second entity according to the determination result.
- a determination module 704 configured to determine whether the data type of the resource of the first entity is the same as the data type of the resource of the second entity, and send the determination result to the setting module. , so that the setting module sets the respective resource access control policies of the first entity and the second entity according to the determination result.
- the data sharing apparatus may further include more or less modules, which is not limited in the present disclosure.
- a data sharing system includes: a first entity and a second entity; a public service entity; and a first device and a second device, wherein the first entity and the second entity and the first device and the second device are all registered with the public service entity , and the first entity and the second entity are associated with the first device and the second device.
- the data sharing system may be a data sharing system for manufacturing.
- FIG. 8 shows a schematic diagram of a data sharing system 800 according to an embodiment of the present disclosure.
- the data sharing system includes: a first manufacturing equipment (D1) and a second manufacturing equipment (D2); a first manufacturing application (MAE1) and a second manufacturing application (MAE2), wherein the first manufacturing application (MAE1) is associated with a first manufacturing facility (D1), a second manufacturing application (MAE2) is associated with the second manufacturing facility (D2); and an IoT platform (P).
- D1 first manufacturing equipment
- D2 second manufacturing equipment
- MAE1 first manufacturing application
- MAE2 second manufacturing application
- P IoT platform
- the Internet of Things platform is configured to: store the data uploaded by the first manufacturing device under the resource of the first manufacturing application, use the application data of the first manufacturing application as the product data of the first manufacturing application, and store the data of the second manufacturing application.
- the data uploaded by the manufacturing equipment is stored under the resources of the second manufacturing application, and is used together with the application data of the second manufacturing application as the product data of the second manufacturing application; a data acquisition request is received from the first manufacturing application, and the data acquisition request includes storing the target product
- the identifier of the resource of the second manufacturing application of the data and the product data sharing operation instruction information; the respective resource access control policies of the first manufacturing application and the second manufacturing application are set based on the data acquisition request, so that the first manufacturing application and the second manufacturing application
- the resources of the counterparty can be accessed to acquire the product data of the counterparty; and a data acquisition response is sent to the first manufacturing application, and the data acquisition response includes the data of the target resource.
- the first manufacturing application (MAE1) may send the above data acquisition request to the IoT platform (P).
- the first manufacturing application (MAE1) determines that the product data of the second manufacturing application (MAE2) cannot be acquired by other means. For example, if the first manufacturing application and the second manufacturing application have previously shared data, and the corresponding resource access control policy is still valid, the sharing operation indication information may not be included in the data acquisition request. On the contrary, if data sharing has not been performed, Or if the previous resource access control policy is invalid, you need to include the change sharing operation instruction information.
- the first manufacturing application may adjust the product data of the first manufacturing application according to the product data of the first manufacturing application and the target product data obtained from the resources of the second manufacturing application such that the first manufacturing application
- the product data is compatible with the product data of the second manufacturing application.
- a manufacturer application for making wallpaper performs style matching based on product data obtained from a manufacturer application that makes sofas.
- a server is also provided.
- FIG. 9 shows a server 900 according to an embodiment of the present disclosure.
- Server 900 may include processor 901 and memory 902 .
- the processor 901 and the memory 902 may be connected by a bus 903 .
- the processor 901 can perform various actions and processes according to programs stored in the memory 902 .
- the processor can be caused to execute each step of the data sharing method according to the embodiment of the present disclosure.
- the processor 901 may be an integrated circuit chip, which has signal processing capability.
- the aforementioned processors may be general purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), off-the-shelf programmable gate arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
- the general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc., and may be of an X99 architecture or an ARM architecture.
- Memory 902 may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory.
- the nonvolatile memory may be read only memory (ROM), programmable read only memory (PROM), erasable programmable read only memory (EPROM), electrically erasable programmable read only memory (EEPROM), or flash memory.
- Volatile memory may be random access memory (RAM), which acts as an external cache.
- RAM Random Access Memory
- SRAM static random access memory
- DRAM dynamic random access memory
- SDRAM synchronous dynamic random access memory
- DDR SDRAM double data rate synchronous dynamic random access memory
- ESDRAM Enhanced Synchronous Dynamic Random Access Memory
- SLDRAM Synchronous Linked Dynamic Random Access Memory
- DR RAM Direct Memory Bus Random Access Memory
- a computer storage medium on which a computer program is stored, and when executed by a processor, the computer program is used to implement the data sharing method according to the embodiment of the present disclosure.
- aspects of this application may be illustrated and described in terms of several patentable classes or situations, including any new and useful process, machine, product, or combination of matter, or any combination thereof New and useful improvements. Accordingly, various aspects of the present application may be performed entirely by hardware, entirely by software (including firmware, resident software, microcode, etc.), or by a combination of hardware and software.
- the above hardware or software may be referred to as a "data block”, “module”, “engine”, “unit”, “component” or “system”.
- aspects of the present application may be embodied as a computer product comprising computer readable program code on one or more computer readable media.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (19)
- 一种数据共享方法,包括:从第一实体接收数据获取请求,其中所述数据获取请求包括存储目标数据的第二实体的资源的标识、以及共享操作指示信息;以及基于所述数据获取请求设置所述第一实体和所述第二实体各自的资源访问控制策略,以使得所述第一实体和所述第二实体能够访问对方的资源以实现数据共享;以及向第一实体发送数据获取响应,其中所述数据获取响应中包括所述目标数据。
- 根据权利要求1所述的数据共享方法,其中,共享操作指示信息包括:所述第一实体的资源的标识,其中,基于所述数据获取请求设置所述第一实体和所述第二实体各自的资源访问控制策略,包括:基于所述第一实体的资源的标识和/或共享操作的标识以及所述第二实体的资源的标识确定所述第一实体期望与所述第二实体进行数据共享;以及确定所述第一实体是否满足所述第二实体的资源访问控制策略,并且基于所述确定设置所述第一实体和所述第二实体各自的资源访问控制策略。
- 根据权利要求1所述的数据共享方法,其中,共享操作指示信息包括:共享操作的标识;或者,共享操作的标识和所述第一实体的资源的标识,其中,基于所述数据获取请求设置所述第一实体和所述第二实体各自的资源访问控制策略,包括:基于至少所述共享操作的标识确定所述第一实体期望与所述第二实体进行数据共享,并设置所述第一实体和所述第二实体各自的资源访问控制策略。
- 根据权利要求2或3所述的数据共享方法,其中,设置所述第一实体和所述第二实体各自的资源访问控制策略包括:更新所述第一实体的资源访问控制策略,更新所述第二实体的资源访问控制策略;或者创建所述第一实体的临时访问控制策略,创建第二实体的临时访问控制策略;或者更新第一实体的资源访问控制策略,创建第二实体的资源临时访问控制策略;或者更新第二实体的资源访问控制策略,创建第一实体的临时访问控制策略。
- 根据权利要求4所述的数据共享方法,其中,更新第一实体的资源访问控制策略包括:使资源访问控制策略中的访问方标识包括所述第一实体和所述第二实体的标识,所述访问方标识指示允许访问第一实体的资源的实体的标识;以及更新第二实体的资源访问控制策略包括:使资源访问控制策略中的访问方标识包括所述第一实体和所述第二实体的标识,所述访问方标识指示允许访问第二实体的资源的实体的标识。
- 权利要求4所述的数据共享方法,其中,所述创建第一实体的临时访问控制策略包括:创建临时访问方标识,并在其中包括所述第二实体的标识,所述临时访问方标识指示允许临时访问第一实体的资源的实体的标识;以及所述创建第二实体的临时访问控制策略包括:创建临时访问方标识,并在其中包括所述第一实体的标识,所述临时访问方标识指示允许临时访问第二实体的资源的实体的标识。
- 根据权利要求5或6所述的数据共享方法,其中,更新第一实体或第二实体的资源访问控制策略还包括:添加数据量限制,指示允许从所述第一实体的资源或所述第二实体的资源获取的数据量上限阈值;或者其中,创建第一实体或第二实体的资源访问控制策略还包括:创建数据量限制,指示允许从所述第一实体的资源或第二实体的资源通过临时访问获取的数据量上限阈值,其中,在从所述第一实体的资源或第二实体的资源通过临时访问获取的 数据量达到数据量上限阈值时,禁止继续从所述第一实体的资源或第二实体的资源获取数据。
- 根据权利要求7所述的数据共享方法,其中,创建所述第一实体或所述第二实体的临时访问控制策略还包括:创建临时访问时间限制,指示允许临时访问所述第一实体的资源或所述第二实体的资源的时间。
- 根据权利要求7所述的数据共享方法,还包括:确定所述第一实体的资源的数据类型与所述第二实体的资源的数据类型是否相同,其中,在确定两者的类型相同的情况下,更新资源访问控制策略或者创建临时访问控制策略还包括:添加数据共享规则,以限定双方各自从对方获取的该相同类型数据的数据量上限阈值需相等。
- 根据权利要求7-9任一项所述的数据共享方法,还包括:确定所述第一实体的资源的数据类型与所述第二实体的资源的数据类型是否相同,其中,在确定两者的类型不同的情况下,更新资源访问控制策略或者创建临时访问控制策略还包括:添加数据共享规则,以限定双方各自从对方获取的不同类型数据的数据量上限阈值需相等;以及添加数据量换算规则,用于对从资源获取的数据量进行换算。
- 根据权利要求10所述的数据共享方法,其中,每个实体的资源下的数据具有内容价值属性,内容价值属性的值与该实体的资源下的数据对于该实体的有用性正相关且预先定义,其中,所述数据量换算规则包括:使从资源获取的数据的数据量分别与该数据的内容价值属性的值相乘得到换算后的数据量,并且其中,在换算后的数据量超过数据量上限阈值的情况下,禁止继续从资源获取数据。
- 根据权利要求1所述的数据共享方法,其中,所述第一实体与第一公共服务实体相关联,所述第二实体与第二公共服务实体相关联,并且所述第一公共服务实体与所述第二公共服务实体相互注册,其中,从第一实体接收数据获取请求,包括:由所述第一公共服务实体从第一实体接收所述数据获取请求;以及在所述第一公共服务实体基于所述数据获取请求中包括的第二实体的资源的标识确定所述第二实体未与其相关联但与所述第二公共服务实体相关联的情况下,将所述数据获取请求转发到所述第二公共服务实体。
- 根据权利要求12所述的数据共享方法,其中,基于所述数据获取请求设置所述第一实体和所述第二实体各自的资源访问控制策略,包括:由所述第二公共服务实体基于所述数据获取请求设置所述第二实体的资源访问控制策略,使得第一实体能够访问其资源;由所述第二公共服务实体向所述第一公共服务实体返回数据获取响应,所述数据获取响应包括所述目标资源的数据;由所述第一公共服务实体基于所述数据获取响应设置所述第一实体的资源访问控制策略,使得第二实体能够访问其资源;以及由所述第一公共服务实体向第一实体返回所述数据获取响应。
- 一种数据共享装置,包括:接收模块,被配置为从第一实体接收数据获取请求,其中所述数据获取请求包括存储目标数据的第二实体的资源的标识、以及共享操作指示信息;设置模块,被配置为基于所述数据获取请求设置所述第一实体和所述第二实体各自的资源访问控制策略,以使得所述第一实体和所述第二实体能够访问对方的资源以实现数据共享;以及发送模块,被配置为向第一实体发送数据获取响应,其中所述数据获取响应中包括所述目标数据。
- 根据权利要求14所述的数据共享装置,还包括:确定模块,被配置为确定所述第一实体的资源的数据类型与所述第二实体的资源的数据类型是否相同,并且向设置模块发送确定结果,使得所述设 置模块还根据所述确定结果来设置所述第一实体和所述第二实体各自的资源访问控制策略。
- 一种数据共享系统,包括:第一制造设备和第二制造设备;第一制造应用和第二制造应用,其中,第一制造应用与第一制造设备相关联,第二制造应用与第二制造设备相关联;以及物联网平台,被配置为:将第一制造设备上传的数据存储在第一制造应用的资源下,和第一制造应用的应用数据共同作为第一制造应用的产品数据,并将第二制造设备上传的数据存储在第二制造应用的资源下,和第二制造应用的应用数据共同作为第二制造应用的产品数据;接收由所述第一制造应用发送的数据获取请求,所述数据获取请求包括存储目标产品数据的第二制造应用的资源的标识以及产品数据共享操作指示信息;基于所述数据获取请求设置所述第一制造应用和所述第二制造应用各自的资源访问控制策略,以使得所述第一制造应用和所述第二制造应用能够访问对方的资源从而获取对方的产品数据;以及向第一制造应用发送数据获取响应,所述数据获取响应中包括所述目标产品数据。
- 根据权利要求16所述的数据共享系统,其中,所述第一制造应用被配置为:根据所述第一制造应用的产品数据和从所述第二制造应用的资源获取的目标产品数据调整所述第一制造应用的产品数据,使得所述第一制造应用的产品数据和所述第二制造应用的产品数据兼容。
- 一种服务器,包括:处理器;以及存储器,其上存储有程序,所述程序在被所述处理器执行时使得所述处理器如权利要求1-13任一项所述的数据共享方法的各步骤。
- 一种计算机存储介质,包括计算机程序,所述计算机程序在被所述处理器执行时实现如权利要求1-13任一项所述的数据共享方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/272,876 US20240305641A1 (en) | 2021-01-22 | 2022-01-19 | Data sharing method, apparatus and system, and server and computer storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110088792.2 | 2021-01-22 | ||
CN202110088792.2A CN114826629A (zh) | 2021-01-22 | 2021-01-22 | 数据共享方法、装置、系统、服务器和计算机存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022156694A1 true WO2022156694A1 (zh) | 2022-07-28 |
Family
ID=82525323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/072684 WO2022156694A1 (zh) | 2021-01-22 | 2022-01-19 | 数据共享方法、装置、系统、服务器和计算机存储介质 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20240305641A1 (zh) |
CN (1) | CN114826629A (zh) |
WO (1) | WO2022156694A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024080406A1 (ko) * | 2022-10-13 | 2024-04-18 | 한국전자기술연구원 | 데이터 플랫폼 미가동시에도 손실 없이 데이터를 저장하고 제공하는 방법 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102959922A (zh) * | 2010-06-25 | 2013-03-06 | 瑞典爱立信有限公司 | 用于授权临时访问电子内容的方法、服务器和系统 |
CN108141446A (zh) * | 2015-08-28 | 2018-06-08 | 康维达无线有限责任公司 | 服务层动态授权 |
WO2019067817A1 (en) * | 2017-09-29 | 2019-04-04 | Convida Wireless, Llc | ENHANCED RESOURCE SHARING USING A RESERVATION |
CN110691061A (zh) * | 2018-07-06 | 2020-01-14 | 电信科学技术研究院有限公司 | 一种资源访问控制方法及装置 |
CN111490966A (zh) * | 2019-01-28 | 2020-08-04 | 电信科学技术研究院有限公司 | 一种访问控制策略的处理方法、装置及计算机可读存储介质 |
-
2021
- 2021-01-22 CN CN202110088792.2A patent/CN114826629A/zh active Pending
-
2022
- 2022-01-19 WO PCT/CN2022/072684 patent/WO2022156694A1/zh active Application Filing
- 2022-01-19 US US18/272,876 patent/US20240305641A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102959922A (zh) * | 2010-06-25 | 2013-03-06 | 瑞典爱立信有限公司 | 用于授权临时访问电子内容的方法、服务器和系统 |
CN108141446A (zh) * | 2015-08-28 | 2018-06-08 | 康维达无线有限责任公司 | 服务层动态授权 |
WO2019067817A1 (en) * | 2017-09-29 | 2019-04-04 | Convida Wireless, Llc | ENHANCED RESOURCE SHARING USING A RESERVATION |
CN110691061A (zh) * | 2018-07-06 | 2020-01-14 | 电信科学技术研究院有限公司 | 一种资源访问控制方法及装置 |
CN111490966A (zh) * | 2019-01-28 | 2020-08-04 | 电信科学技术研究院有限公司 | 一种访问控制策略的处理方法、装置及计算机可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
US20240305641A1 (en) | 2024-09-12 |
CN114826629A (zh) | 2022-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111914269B (zh) | 一种区块链和云存储环境下的数据安全共享方法和系统 | |
US10735428B2 (en) | Data access and ownership management | |
WO2020140679A1 (zh) | 接口对接方法、装置、计算机设备和存储介质 | |
US9319412B2 (en) | Method for establishing resource access authorization in M2M communication | |
WO2020168692A1 (zh) | 海量数据共享方法、开放共享平台及电子设备 | |
TWI223949B (en) | Resource authorization | |
US9319413B2 (en) | Method for establishing resource access authorization in M2M communication | |
US10554406B1 (en) | Authorized data sharing using smart contracts | |
EP3843353B1 (en) | Access control policy configuration method, device and storage medium | |
US11240031B2 (en) | System and method for delegating authority through coupled devices | |
US11829502B2 (en) | Data sharing via distributed ledgers | |
JP2015501021A (ja) | OAuthフレームワーク | |
WO2017076165A1 (zh) | 一种访问控制方法和访问令牌颁发方法、设备 | |
CN110222518A (zh) | 基于区块链的可信权能访问控制方法 | |
CN112738100B (zh) | 数据访问的鉴权方法、装置、鉴权设备和鉴权系统 | |
WO2016141783A1 (zh) | 访问控制、策略获取、属性获取方法及相关装置 | |
WO2022156694A1 (zh) | 数据共享方法、装置、系统、服务器和计算机存储介质 | |
WO2020007132A1 (zh) | 一种资源访问控制方法及装置 | |
WO2017157176A1 (zh) | 一种资源分发方法及装置 | |
WO2022116575A1 (zh) | 业务平台的访问权限获取方法和业务平台的访问控制方法 | |
US9537893B2 (en) | Abstract evaluation of access control policies for efficient evaluation of constraints | |
CN116566704A (zh) | 安全访问控制方法、系统、车控设备、车辆及介质 | |
US11991171B2 (en) | Communication method for device, device and storage medium | |
CN106656936A (zh) | 一种访问控制方法和设备 | |
WO2017076129A1 (zh) | 角色颁发方法、访问控制方法及相关设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22742173 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18272876 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 02.11.2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22742173 Country of ref document: EP Kind code of ref document: A1 |