CN104636919A - Application program store mode based on data pay-per-use - Google Patents

Application program store mode based on data pay-per-use Download PDF

Info

Publication number
CN104636919A
CN104636919A CN201310579615.XA CN201310579615A CN104636919A CN 104636919 A CN104636919 A CN 104636919A CN 201310579615 A CN201310579615 A CN 201310579615A CN 104636919 A CN104636919 A CN 104636919A
Authority
CN
China
Prior art keywords
data
application program
user
access
collection platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310579615.XA
Other languages
Chinese (zh)
Inventor
吴超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU ERHAI TECHNOLOGY Co Ltd
Original Assignee
HANGZHOU ERHAI TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU ERHAI TECHNOLOGY Co Ltd filed Critical HANGZHOU ERHAI TECHNOLOGY Co Ltd
Priority to CN201310579615.XA priority Critical patent/CN104636919A/en
Publication of CN104636919A publication Critical patent/CN104636919A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention designs an application program store mode based on data pay-per-use. In the application program store mode, data required by applications is protocol-oriented, an independent data storage and verification system of the third part is realized, and data access of the applications is controlled within a manageable range of users. The method mainly includes that a data collection platform provides flexible user data storage and management services and high safety characteristics; data pay-per-use protocol defines content of access user data of the applications from finer granularity; data access verification is added with stronger granularity control and is connected with the applications and the data collection platform, the applications are connected with the data collection platform, and the function of giving information in the specific amount for the specific applications within the specific time can be achieved; in a mobile end data collection port, the system can separate acquiring and collecting of mobile equipment data, and description and control of data protocols can be provided for supporting of the application stores.

Description

A kind of application program shop mode of paying based on data
Technical field
The present invention relates to the data using forestland in application program shop, particularly relate to a kind of based on user data protection and control application program shop mode and system, belong to computer applied algorithm privacy and distribution model field.
Background technology
Universal along with computing machine and computer network, various computer applied algorithm emerges in an endless stream, its distribution channel becomes the emphasis of technical development, and along with the intellectuality of mobile device and generalization, the application program shop mode of mobile device, obtaining very large success in recent years, at iOS, the platforms such as Android, Window Mobile become the major way that user obtains mobile applications.So this successful application shop model is also generalized in desktop and enterprise market, there is the application program shop that similar Mac AppStore, Chrome Web Store is such.
But, in application program shops all at present, no matter be free or payment application, all do not have specification to define to the behavior of collecting user data, be mainly manifested in two aspects:
1. what pair data collect row was does not elaborate: in current application program shop, application program is divided into free application and toll collection applications according to price, when the description of application programs, except its price outstanding, also provide other information, such as sectional drawing, socialization evaluation etc.; But the collection behavior of user data is but left in the basket: which kind of user profile will be an application program will collect, and collect quantity and frequency be how many? these information are not indicated by clear in application program describes, sometimes just can mention in application program Terms of Use, but in a lot of application program describes, lack basic Data Collection situation and describe.And for current application program, it relies on collection user data very much, and these data are extremely valuable, and on the one hand concerning individuality, these data can produce very large effectiveness (such as personal health health); On the other hand, user group's Data Collection also, after polymerization, can create new value, such as, the polymerization of the trip data of personal user can be realized city real-time traffic monitoring.The profit model of a lot of application program is all based upon in these valuable data, so can say, even if these application programs are free, it has still collected " data " as expense from user, and the access of this part user data should be not out in the cold.Simultaneously for user; its secret protection is in mobile device application program; obtain unprecedented infringement risk; 12 enterprises comprising Apple, Path in 2012 are prosecuted because of the Mobile solution data of collecting user; in this case; user needs certain mechanism to carry out controlling application program to the collection of its data and access, and current application program shop mode cannot support this demand.
2. the access control of pair data lacks granularity support: in the application program shops such as iOS, lacks the access control mechanism of application programs data, and application program can various data of calling party without restriction, thus form great threat to privacy of user; Although more existing application program shops provide data access and control; such as in the application program shops such as Android; provide some mechanism and notified which kind of user data is certain application program of user will access; and in the authentication framework of similar OAuth; also application programs calling party data provide control; but these current mechanism have a very large problem, namely the access control granularity of data is thin not, and cannot adequately protect user data privacy.Show according to research, after acquisition 4 location data, just can determine the identity of a user, the influence degree of data volume for privacy of user can be seen thus, and current authentication framework is not to the control of data volume, such as limits application can access how many user data every day, altogether can access how many user data etc.
And user data becomes more and more valuable nowadays: for individual, data about individual subscriber can have an impact to the every aspect of user's life, such as in health medical treatment field, the health sensor of similar Fitbit creates in a large number about the data of user's habits and customs, help user better to monitor its condition, and a lot of data based on geographic position are also for user provide the service comprising commercial product recommending etc.For colony, the integrated analysis of personal data energy after gatheringization, obtain the information about colony, such as individual subscriber navigation data collects by Waze application program, realizes the intelligent traffic monitoring in whole city.These data values are by data producer, i.e. user, had.But under current programming mode, these data values are not controlled by the user completely, and usually by application program controlling, application program is acquired an advantage from user data, and this process is free often.
In order to address these problems, we propose data payment mode, this pattern proposes solution for above two problems, for first problem, data payment mode is by data consumes explicitization of application program, before user's purchase applications, understand the data that application program will collect its which aspect, and collect the quantity, frequency etc. of data; For Second Problem, data payment mode provides fine-grained data access and controls, and the application data access only in effective range could obtain permission.
In order to realize the pattern that data are paid, mainly based on following technical background in this programme:
1. sensor and data collection platform: there is large quantity sensor at present in individual subscriber life, such as medical treatment transducer, temperature sensor etc., and at mobile phone terminal, particularly smart mobile phone end, is also integrated with a large amount of sensors, such as, in iPhone, is integrated with GPS, optical sensor, acceleration transducer etc.; These sensors can collect the very many-sided data of user.Meanwhile, user also can spontaneous establishment data, such as social network data etc.; This programme will utilize independently user data collection, a store and management platform.At present based on the data storing platform of cloud computing, such as, based on the storage platform of Amazon S3, or the sensing data storage platform of CosM and so on, the basis of user data platform for this reason can be become.
2. apply shop to support: at present in the application platform of main flow, all establish application shop, no matter be desktop system, or cell phone system, or even browser platform, these application shops change the circulation way of application program, have also been changed original profit model by License charge, reduce the propagation costs of distribution of application program, simultaneously fuzzy desktop application and the boundary based on browser application, flourishing Develop Application System.Our data charges Model Establishment is supreme in this application shop technology, for which increasing a kind of new model.
3. the service for checking credentials: the service for checking credentials is divided into two classes: the first kind provides the certification to user identity, to realize information anonymization and the single-sign-on of user, its agreement such as OpenID, Google Account etc.; Equations of The Second Kind provides the certification to user data access, such as OAuth agreement etc., and when application program wants calling party data, agreement provides user to permit and access control mechanisms, realizes safety and limited data access.This two classes service all obtains applying very widely in current internet.
4. mobile terminal data collection interface: in mobile terminal, current data collection interface can collect the data of various sensor and application program generation.But these data generally control by mobile phone terminal operating system, or be employed program decentralised control, user is to the limited control of its data.
The present invention, with based on user data protection and control application program shop mode and system for application target, these gordian techniquies above are improved and are implemented.
Summary of the invention
The present invention devise a kind of based on user data protection and control application program shop mode and system; this system utilizes new data payment m odel; utilize the data access service strengthened; support types of applications; the particularly user data access control of mobile terminal application; system adopts neutral data collection platform and interface, and the platform services architecture of exploitation.As shown in Figure 1, in traditional mode, user is defrayment (or free) in application program shop, obtain the service of application program, but the data access of application program to user is uncontrolled; And in data payment mode of the present invention, in application program shop, user directly pays by data, obtain application program service.
In order to realize aims of systems, the present invention uses following technical scheme:
1. Digital pay agreement
Utilize Digital pay agreement, identify to explicitization the user data that an application program uses.Agreement is described the following aspect that user data uses:
1) application program (App-ID): specify the application program that this agreement contacts;
2) application program URL (App-URL): the further information about application program is provided;
3) total amount (TC) of usage data: the total number of given application program energy visit data, as TC=100, namely obtains 100 user data at most;
4) total term of validity (ET) of usage data: the calendar time of given application program energy visit data, as ET=10000, namely from purchase applications 10000 milliseconds be calendar time;
5) frequency (FT) of usage data: the maximum frequency of given application program energy visit data, as FT=100, namely maximum frequency be 100 milliseconds access once;
6) scope (RS) of usage data: the data area set of given application routine access, as RS={Location}, namely application program can only the locating information of calling party;
7) anonymity of usage data arranges (AS): whether the user data of given application routine access carries out anonymization process, such as works as AS=TRUE, illustrates that user identity does anonymization process;
8) priority assignation (PR) of usage data: the authority of given application routine access user data, such as RS={READ, WRITE} represent that application program has the authority of read and write to user data.
Application program is when issuing, and need according to these settings, creating Digital pay agreement, is exactly below the example (JSON form) of a digital fee agreements:
Above Digital pay agreement represents:
1) the application program id associated is " ios.1154431 ";
2) URL of this application program is: " http://wikisensing.org/cl ient/appexample ";
3) data area of application program access is geographical location information;
4) data access maximum frequency be 2160 milliseconds each;
5) maximum data visit capacity is 1000;
6) accessing the term of validity is 684000000 milliseconds;
7) data access is anonymous;
8) data access rights is limited to read-only.
2. data collection platform
This programme provides one independent of third party's data collection platform of application program and operating system, and it mainly realizes following functions:
1) data mass memory: for multi-user provides the data storage function of magnanimity, for depositing all types of user data.In order to support flexible massive storage space, this programme achieves a storage space based on MongoDB Cluster, and its storage organization as shown in drawings.These modules following are mainly achieved in this storage space:
A) MongoDB back end: house user data in MongoDB back end, MongoDB provides the countless storage organization according to schema, every bar user data stores with the form of JSON document, and the independent MongoDB set of each class data of each user stores.Same set is left in multiple MongoDB back end in a distributed manner.MongoDB back end is the basic comprising element of storage space.
B) MongoDB Cluster manager: MongoDB back end forms MongoDB Cluster in two ways.First, a group node composition ReplicaSet, the back end in ReplicaSet has identical data content, thus realizes data backup and more high performance read operation.Multiple ReplicaSet forms Sharding, and the data of a set can be dispersed in Sharding, thus the height realizing reading and writing data walks abreast and the elasticity of memory capacity expands.MongoDB Cluster manager is in charge of and is created and safeguard Repl icaSet and Sharding, is combined by the MongoDB back end in storage space.
C) monitoring resource and control: data space mainly contains the performance index of two aspects: data capacity and data access speed (or data access response time).Current performance index and pre-set threshold value, by the index of monitoring MongoDB Cluster these two aspects, compare by monitoring resource module, and are responsible for by control module the resource and the configuration that change MongoDB Cluster, meet default capabilities requirement.When data capacity is lower than pre-set threshold value time, control module request cloud resource module, create the new virtual machine comprising MongoDB back end, this virtual machine is opened MongoDB node, and node is formed new Repl icaSet, and joining in new Sharding, MongoDB Cluster automatically to available data again piecemeal, will expand data capacity.When data access speed is lower than threshold values, or when the data access response time is higher than threshold values, if read operation, control module will create new MongoDB node (process is identical with front), and joins in the ReplicaSet of requested date by this node; If write operation, control module will create new MongoDB, and creates new ReplicaSet, then joins in new Sharding.
D) data semantic and retrieval module: data space not only supports primary MongoDB data query, also supports semantic query manipulation.Owing to not having data Schema in MongoDB, we add one deck semantic description thereon, define the semanteme of JSON document with RDFS, and every bar user data is mapped to RDF form all thus.In data space, include a semantic query server, carry out RDFS checking by the inquiry of RDF, and be converted to the primary inquiry of MongoDB, obtain JSON document results, and the form they being packaged into RDF document returns.Except semantic query semanteme, data space also comprises a global search module to user data, and user data carries out global search according to type and time, the operation of merging in order to supported data.
E) Real-time data interface: data space support is to the real time high-speed read-write interface of data.This interface is issued with the form of WebServices, and each data source of user is submitted to when data and needed to specify its unique ID, and by this ID visit data.Data source is read and write in the form of streaming, writes the obstruction that data can not cause read data.How concurrent the interface support of reading data is.
F) data security module: the read-write interface of data is encrypted through HTTPS, only has the data access of access authentication to be passed through.
G) metadata data store: there is some metadata for user data source and describe, the model of such as client, data sampling rate etc., these data source metadata describe module in charge memory scan thus, and this module is based upon on MySQL database.
2) data management: the interactive interface providing its data of user management, the mass data storage module on this model calling backstage, for user provides one-stop data management function.User can check the data source of its all establishment, each data in each data source.And what is more important, user has the control to all these data, instead of as traditional approach, the control of data is dispersed in different application programs.User can set the access limit of each data source, and how setting application program accesses these data.
3. the data access service for checking credentials: when application program needs to obtain user data, need to carry out data access checking, its flow process basic process is as follows:
A) application program sends user data request of access to the data access service for checking credentials;
B) the data access service for checking credentials obtains the Digital pay agreement between this application program and user;
C) whether data access service for checking credentials checking current-user data request of access meets Digital pay agreement;
If d) ask protocol compliant, then return to application program token key, response token is sent to data storage service simultaneously;
E) request of access and token key are sent to data storage service by application program;
F) data storage service returns asked user data;
G) when data access request does not meet Digital pay agreement, the data access service for checking credentials returns an error to application program, stops data access.Can see, the data access service for checking credentials plays the function of access control, according to Digital pay agreement, it judges whether that authorized applications conducts interviews.This service realizes primarily of a data authentication server, and this server forms based on OAuth2.0 Server Extension.
4. insertable data shop service: this has served as application program shop and has provided data paying interface, serves and exists with the form of plug-in unit, provide a series of Web Services, for realizing following operation:
A) for application program submits Digital pay agreement to;
B) for user obtains the Digital pay agreement of application program;
C) interface of user's log-on data source, access data services is provided;
D) application program is provided to access the interface of authentication server;
5. the support of mobile terminal: provide interface for supporting digital payment mode in mobile terminal.Interface realization is in the operating system of mobile terminal, and the major function provided is by direct data being submitted to application program by operating system originally, then submits to storage of subscriber data service, thus cuts off the passage of the direct visit data of application program.Meanwhile, the service interface of data access and data access checking is exposed to application program.
Accompanying drawing explanation
Fig. 1 is that the data of the present invention and traditional approach flow comparison diagram;
Fig. 2 is general structure schematic diagram of the present invention;
Fig. 3 is data collection platform structural drawing of the present invention;
Fig. 4 is data verification service structure figure of the present invention;
Fig. 5 is data access service for checking credentials process flow diagram of the present invention;
Fig. 6 is mobile terminal of the present invention system assumption diagram.
Embodiment
Below in conjunction with accompanying drawing, by embodiment, core technology content of the present invention is described in further detail.
As shown in Figure 2, system is primarily of with the mutual formation between lower module:
1. user is the producer of data, is also the owner of data; User produces data in mobile terminal or other sensor devices, and the data-interface provided by data collection platform submits the data to data collection platform, and has the entitlement of submitted to data;
2. user is in the data of data collection platform as the data property of user, can be used for the service of purchase applications;
3. an application program is when being submitted to application program shop, different from traditional mode, except will submitting the cost of use of application program to, also needs to submit to data fee agreements as data price;
4. when user is in application program shop, attempt the right to use buying certain application program, when consuming its service, it checks the data fee agreements of application program, once this agreement be transferred to the data access service for checking credentials after agreeing to;
5., when application program needs to obtain user data, first send request to the data access service for checking credentials, data verification service, according to data fee agreements, determines whether this request is legal;
6., if it is legal to ask, application program obtains data from data collection platform.
This is also the major function flow process of system.
Fig. 3 is the structural representation of data collection platform.In mass data storage layer, nucleus module is MongoDB cluster, the main user data of this cluster-based storage.Cluster has double-layer structure, and ground floor forms ReplicaSet by one group of MongoDB node, and in a ReplicaSet, the data content of each node is identical, plays the function of backup and acceleration read operation; The second layer forms Sharding by one group of ReplicaSet, and data are piecemeal in different ReplicaSet, accelerates read-write operation and increases data capacity.In the cluster, a Mongos node server is had as access interface and load equalizer.
MongoDB cluster is controlled by a cluster manager dual system, and cluster manager dual system is by the configuration of responsible adjustment Repl icaSet and Sharding, and allotment MongoDB has the resource distribution of node.MongoDB is also connected to a monitoring resource module simultaneously, and the loading condition of the current MongoDB cluster of this module monitors, comprises remaining data capacity and response time, according to preset value, judges whether to need to carry out dilatation.When needs dilatation, it contacts resource management module, and request increases MongoDB node, and resource management module is connected to outside cloud resource system, creates required virtual machine, and generates MongoDB node.
Outside MongoDB cluster, data collection platform further comprises a semantic database, stores the semantic information in data of description source, and provides semantic retrieval and semantic verification module, realizes the mapping between semantic model and real data and inquiry.In addition, system additionally provides a metadata store module, stores about the data message such as data source, user.
Be data management layer on mass data storage layer, between, have a Real-time data interface, for data management layer provides the high-speed data read-write operation to mass data storage layer; Also have a security module, ensure that the operation of data management layer meets safety verification.
In data management layer, main module comprises:
1. data source management: register for user and manage its data source, the semantic format of definition data source, creates data according to data source and submits interface and access interface to;
2. data management: for user provides the work such as display, submission, editor, deletion of data, and provide preliminary data visualization and data statistics function;
3. rights management: user can the access rights in management data source, and the access rights of the application program of access data sources at present;
4. user management: the function providing the aspects such as user registers, logs in, inquiry;
5. data query: for application program provides the interface of valid data access.
These modules, by web interface and Web Services interface, are supplied to user and application program, the service of calling data collecting platform and function.
Fig. 4 illustrates the primary clustering in the data access service for checking credentials:
1. data fee agreements database: the data fee agreements reached between application program and user will be stored in these data.It should be noted that this data fee agreements is different from the agreement that application program is submitted to application program shop.Suppose that application program submits to Digital pay agreement C to application program shop, if user have purchased the right to use of application program according to this agreement C, then create purchaser record S, the structure of S is as follows:
S={C,U,T}
Wherein U is user ID, and T is the time buying.
After reaching Digital pay agreement between user and application program, the present situation (as how long experienced, accumulative access how many data etc.) of application program calling party data is labeled as H.
What then deposit in data fee agreements database is the tlv triple of (C, S, H), and each record represents the Digital pay agreement between a user and an application program, have recorded current application data access situation simultaneously.
2. access checking: when application program sends request, when needing calling party data, access authentication module completes following flow process:
A) check data fee agreements database, search this user whether therewith application program there is Digital pay agreement;
B) if there is no Digital pay agreement, refusal data access, and return error message;
If c) there is Digital pay agreement, then check current application data access situation H, and judge this data access operation, whether can violate Digital pay agreement C on the basis of H;
If d) this access will violate Digital pay agreement C, then refuse data access, and return error message;
If e) Digital pay agreement is not violated in this access, then by data access, produce data access token, and token is returned to application program;
F) simultaneously, data access token key is sent to data collection platform, make the access token of application program be able to be verified at data collection platform pass through, obtain data.
3. data collection platform interface: alternately, main two parts information that sends is to data collection platform for this interface and data collection platform:
A) data access token key: this key is used for verifying application programs data access token;
B) data access content: with access token key bindings, define the content of this data access, data collection platform gives application program corresponding data according to this information.
4. application programming interfaces: mutual between this interface process and application program, it mainly comprises following three kinds alternately:
A) application data access request is accepted;
B) refusal request, returns error message;
C) request is received, return data access token.
5. application program shop interface: this interface process and application program shop mutual, main function is that the accessing points of the data access service for checking credentials is submitted to application program shop, then gives application program by application program shop, thus starts data access flow process.
Three above interfaces, are all realized by the Web service of Restful mode.
Fig. 5 is data access service for checking credentials process flow diagram, and its main flow is:
1) user's access application;
2) application program sends data access request to the data access service for checking credentials;
3) the data access service for checking credentials verifies that whether this data access request is legal;
4) if data access is legal, then return data access token;
5) application program sends this data access token to data collection platform;
6) data collection platform is through checking, returns request msg to application program.
Fig. 6 illustrates the change in mobile terminal:
1) in framework originally, the data of the sensor collection of mobile terminal directly send the data to application program through mobile terminal operating system;
2) in data paying framework, the data of the sensor collection of mobile terminal, are intercepted and captured at operating system layer, and send to the data collection platform that user's full powers control, then by data payment m odel, data are sent to application program.

Claims (11)

1. based on the application program shop mode that data are paid, it is characterized in that, accompanying method comprises data collection platform, Digital pay agreement, the data access service for checking credentials and application program and application program shop interface.By access explicitization of application program to user data, and be subject to management and the control of user.
2. data collection platform as claimed in claim 1, is characterized in that, provide the flexible storage of subscriber data of magnanimity, management and query function, and secure access interface.And provide semantic support, realize semantic verification and the inquiry of data.
3. data collection platform as claimed in claim 2, is characterized in that, according to the demand of the capacity of user data and data access, flexibly can change mass data storage scale.
4. data collection platform as claimed in claim 2, it is characterized in that, provide the user data management function of many resident families, user has cura generalis to weigh to its data.
5. Digital pay agreement as claimed in claim 1, is characterized in that, provides more fine-grained data access and controls, describe the data access price of application program with JSON document.
6. Digital pay agreement as claimed in claim 5, it is characterized in that, the use cost of application program is contained data cost, and by its explicitization, only have after user's consenting digital fee agreements, application program could obtain user data access rights in specialized range.
7. the data access service for checking credentials as claimed in claim 1, it is characterized in that, according to Digital pay agreement, controlling application program is to the access of user data, and contact data collecting platform, authorize legal application data access.
8. the data access service for checking credentials as claimed in claim 8, is characterized in that, stores current application program data access situation, and judges whether new access meets Digital pay agreement specialized range, and make the response of whether authorizing.
9. application program as claimed in claim 1 and application program shop interface, it is characterized in that Digital pay agreement can embed in current application program, mobile terminal equipment and application program shop, to support the submission to digital fee agreements and displaying, the connection of data collection platform and the discovery of the data access service for checking credentials.
10. application program as claimed in claim 9 and application program shop interface, it is characterized in that, at mobile device end, data cube computation between script sensing data and application program is blocked, and submit the data in data collection platform, and provide data to application program by data collection platform.
11. application program as claimed in claim 9 and application program shop interfaces, it is characterized in that, Digital pay price is submitted in application program shop, and price is showed application program buyer, and after user confirms to buy Digital pay agreement, submit to information to the data access service for checking credentials.
CN201310579615.XA 2013-11-11 2013-11-11 Application program store mode based on data pay-per-use Pending CN104636919A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310579615.XA CN104636919A (en) 2013-11-11 2013-11-11 Application program store mode based on data pay-per-use

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310579615.XA CN104636919A (en) 2013-11-11 2013-11-11 Application program store mode based on data pay-per-use

Publications (1)

Publication Number Publication Date
CN104636919A true CN104636919A (en) 2015-05-20

Family

ID=53215636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310579615.XA Pending CN104636919A (en) 2013-11-11 2013-11-11 Application program store mode based on data pay-per-use

Country Status (1)

Country Link
CN (1) CN104636919A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472592A (en) * 2015-11-17 2016-04-06 上海迪静信息技术有限公司 Application software charging system and charging method
CN109564573A (en) * 2016-07-27 2019-04-02 微软技术许可有限责任公司 Platform from computer application metadata supports cluster
CN111506899A (en) * 2020-04-15 2020-08-07 北京谦川科技有限公司 Authority management method and authority management architecture of security system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472592A (en) * 2015-11-17 2016-04-06 上海迪静信息技术有限公司 Application software charging system and charging method
CN105472592B (en) * 2015-11-17 2018-09-11 上海迪静信息技术有限公司 The toll collection system and charging method of application software
CN109564573A (en) * 2016-07-27 2019-04-02 微软技术许可有限责任公司 Platform from computer application metadata supports cluster
CN109564573B (en) * 2016-07-27 2023-06-16 微软技术许可有限责任公司 Platform support clusters from computer application metadata
CN111506899A (en) * 2020-04-15 2020-08-07 北京谦川科技有限公司 Authority management method and authority management architecture of security system
CN111506899B (en) * 2020-04-15 2023-06-16 宁波谦川科技有限公司 Rights management method and rights management architecture of security system

Similar Documents

Publication Publication Date Title
US11625711B2 (en) Autonomous exchange via entrusted ledger key management
US11599875B2 (en) Autonomous exchange via entrusted ledger application specific wallet
US20220004538A1 (en) Autonomous exchange via entrusted ledger immutable distributed database
US11520922B2 (en) Method for personal data administration in a multi-actor environment
US10789629B2 (en) Content purchasing
US20150262151A1 (en) Access Control System for Online Content
JP7049480B2 (en) Location-based access to access-controlled resources
KR20190132938A (en) Method and apparatus for managing subject data based on blockchain
US9898621B2 (en) Automatic application dependent anonymization
US20130073460A1 (en) Enabling paid-for exchange of identity attributes with minimal disclosure credentials
US11120157B2 (en) System and method for safe usage and fair tracking of user profile data
US11605071B2 (en) Autonomous exchange via entrusted ledger key management
CN103281403A (en) Cloud protective system for improving personal information security in network marketing channel
US10339577B1 (en) Streaming data marketplace
US9886685B2 (en) Distributed digital rights-managed file transfer and access control
KR20070086381A (en) Method, system, and device for license-centric content consumption
CN106407832B (en) Method and equipment for data access control
Lee et al. SPChain: A smart and private blockchain-enabled framework for combining GDPR-compliant digital assets management with AI models
CN104636919A (en) Application program store mode based on data pay-per-use
US20210334787A1 (en) Key pair authentication in a label tracking system
US20230274019A1 (en) System for data access token management
US11861037B2 (en) Unified data fabric for managing data lifecycles and data flows
WO2018032955A1 (en) E-book management method and system
KR20130131142A (en) Digital library system and provision method thereof
KR20230104376A (en) System for interlocking open market and operating method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150520