CN105718817B - A kind of data safety exchange system and method based on permissions mapping - Google Patents

A kind of data safety exchange system and method based on permissions mapping Download PDF

Info

Publication number
CN105718817B
CN105718817B CN201610048421.0A CN201610048421A CN105718817B CN 105718817 B CN105718817 B CN 105718817B CN 201610048421 A CN201610048421 A CN 201610048421A CN 105718817 B CN105718817 B CN 105718817B
Authority
CN
China
Prior art keywords
data
service request
permission
request business
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610048421.0A
Other languages
Chinese (zh)
Other versions
CN105718817A (en
Inventor
丁帅
杨善林
金行
潘禹辰
王泽源
李叶青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei University of Technology
Original Assignee
Hefei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei University of Technology filed Critical Hefei University of Technology
Priority to CN201610048421.0A priority Critical patent/CN105718817B/en
Publication of CN105718817A publication Critical patent/CN105718817A/en
Application granted granted Critical
Publication of CN105718817B publication Critical patent/CN105718817B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data safety exchange systems and method based on permissions mapping, are applied in the network being made of several service requests business, it is characterized in that, the security exchange system includes:Network interface management module, data management module and central database.The present invention can improve the operability, security and expansibility of data safety exchange system, so as to provide diversified service operation and good user experience for provider.

Description

A kind of data safety exchange system and method based on permissions mapping
Technical field
The present invention relates to a kind of data safety exchange systems and method based on permissions mapping.
Background technology
With the development and application of information technology, the information age is just changing people’s lives habit at an unprecedented rate It is used, meet the growing material and cultural needs of people.Make administrative dividing unit --- the society of the minimum lived for people's lives Area, administration way and the cell that service system is social management, are that embodiment state treatment system and Governance Ability modernize Importance.
During informatization, information system or business application system that all departments establish according to own situation use Different technologies and architecture, so as to form numerous information islands.Community development needs to realize these a large amount of different positions It puts, the shared and mutually access of different-format information, effectively integrates community resource, and then integrate relevant business information, be Enterprise, the public and internal government system provide unification and consistent service.
Nowadays, application of the exploitation of data safety exchange system in is still in budding stage, existing existing platform coupling It is right it is low, security is poor, function is more single, it is impossible to effectively provide service request business interface and provide effectively management connects Mouthful, it is unfavorable for effectively interacting for community resource, it is also difficult to convenience service, the convenience-for-people community data of commerce services third party be supported to have Effect ground interaction process.
The content of the invention
The present invention is to avoid the deficiencies in the prior art part, proposes that a kind of data safety based on permissions mapping exchanges system System and method pay close attention to the security and convenience of data exchange, to improve the operable of data safety exchange system Property, security and expansibility, operated and good user experience so as to provide diversified service for provider.
The present invention adopts the following technical scheme that solve technical problem:
A kind of data safety exchange system based on permissions mapping of the present invention is applied to by several service requests business institute In the network of composition, its main feature is that, the security exchange system includes:Network interface management module, data management module and in Heart database;
The network interface management module is used to implement the response of service request business, and asking according to the service request business The network interface that traffic assignments are different is sought, reprocesses the requested service of the service request business;
The data management module is used to implement the interaction of data, and the service request business and central database are carried out Permission controls, to ensure the safety of data exchange;
For storing the data, the data include the central database:Essential information, the permission of service request business Information, the permission for exchanging data essential information, exchanging data.
The characteristics of data safety exchange system of the present invention, lies also in:
Network interface management module includes:Service provider's authorization interface, business datum input interface and business datum output connect Mouthful;
The central database includes:Exchange tables of data ExData, service provider information table UserInfo and service provider's power Limit -- data permission table UsExData;
It is described to exchange tables of data ExData for storing the permission for exchanging data essential information and exchanging data;
Service provider's information table UserInfo asks the essential information of quotient data for storage service;
Service provider's permission -- data permission table UsExData is used to store data permission and service request business's permission Mapping relations.
The data permission and the mapping relations of service provider's permission represent:Service with service request business's permission flag1 It is flag to ask the treatable maximum data permission of business.
A kind of the characteristics of data safety exchange method based on permissions mapping of the present invention is to be applied to data safety to exchange system In system, and carry out as follows:
Step 1:The data template definition of different type interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmission process;
It is step 1.2, different according to the requested business of service request business, different style interfaces is distributed, according to different Style interface builds different XML data templates, so that service request business can utilize different XML data templates to transfer number According to;
Step 2:The authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to the authentication services, and distribution service provider authorization interface is asked The service request business asked;
Step 2.3, XML data template of the service request business in service provider's authorization interface are to data management Module sends corresponding XML document;
Step 2.4, data management module receive XML document and are parsed, corresponding so as to distribute to service request business Permission, and the authority information deposit service provider information table that the essential information of service request business and service request business are distributed In UserInfo;
Step 3:The data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the permission of service request business, if the service request business possesses permission, net Network interface administration module distributes Data Input Interface to service request business;If the service request business does not have permission, network connects Mouth management module is refused to distribute Data Input Interface to service request business;
Step 3.2, XML data template of the service request business in the Data Input Interface are to data management mould Block sends corresponding XML document;
The XML document received is stored in buffer and parsed by step 3.3, data management module, is checked simultaneously Service provider's permission -- data permission table UsExData, so as to the service request business exchange data essential information to be inputted Add permission;And it by the permission added and its exchanges in the data essential information deposit exchange tables of data ExData;
Step 3.4, the network interface management module return to " inputting successfully " information to the service request business;
Step 4, the data outgoing traffic request of service request business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's permission, if the service request business possesses permission, network Interface administration module distributes data output interface to service request business;If the service request business does not have permission, network interface Management module is refused to distribute data output interface to service request business;
Step 4.3, XML data template of the service request business in the data output interface are to data management mould Block sends corresponding XML document;
The XML document received is stored in buffer and parsed by step 4.4, data management module, is checked simultaneously Service provider's permission -- data permission table UsExData;So that it is determined that whether the service request business possesses the exchange number to be exported According to the permission of essential information;If possessing, step 4.5 is performed;Otherwise, the network interface management module is to the service request Business returns to " not having permission " information;
Step 4.5, the network interface management module utilize the data output interface according to tables of data ExData is exchanged In another XML data template generation XML document and be stored in the buffer;Using the buffer to service request Business sends XML document, so as to complete the data outgoing traffic of service request business.
Compared with the prior art, the present invention has the beneficial effect that:
1st, the present invention is by network interface management module, data management module and central database composition data secure exchange system System, the service request of service request business should be handled for network interface management module and response, centre data library storage clothes Business request quotient data data and exchange data, data management module is in related network interface administration module and central database Between articulamentum, provide answer service request for network interface and consult and request data needed for the business asked, centered on database into line number According to input-output operation;The system platform level is clear in structure, functional independence and has preferable data transmission between system Mechanism.
2nd, network interface management module of the invention is used to implement the response of service request business, and according to the service request The requested service of business distributes different network interfaces;The number sent back for service request business according to the XML data template of interface According to being parsed, and using the permissions data of data management module middle calling from the central database, service provider's permission is carried out, is exchanged The judgement of data permission, the input of final process data, outgoing traffic;So as to improve data safety exchange system it is intelligent, Availability, expansion and operability meet the various demands of user.
3rd, data management management module of the present invention is for accessing and handling to the data of central database, including reply The request of data of network interface management module;For security requirement, by service request business and data progress partition of the level is exchanged With define, and by service request business permission and exchange data permission link;So as to having ensured Information Security, eliminate by In service request business to the leaking data hidden danger involved by unconfined input, output data.
4th, central database of the present invention by exchange data, service request quotient data and exchanges data-service quotient data mapping Composition;Data management module is allowed to carry out increase, deletion, modification and the inquiry of data in the database;Exchange data, service is asked It seeks quotient data and exchanges data-service quotient data mapping and be stored separately, make database redundancy degree as small as possible, ensure that data can With it is efficient increase, delete, modification and inquiry and committed memory it is as small as possible.
5th, the present invention establishes deciding grade and level encryption mechanism and data permission and service request business's permission is divided, service request The service request business that business's permission is flag1 corresponding to service request business's permission flag1 can be less than or equal to data permission flag Data carry out data inputs, outgoing traffic operation;For enhancing the security in data storage, transmission and access process, and The security of service data is ensured.
Description of the drawings
Fig. 1 is overall structure figure of the present invention;
The network interface that Fig. 2 is the present invention includes different type interface displaying figure;
The network interface that Fig. 3 is the present invention distributes authorization interface flow chart;
Fig. 4 is consulted and request for the service request of the present invention and is sought data input request flow chart;
Fig. 5 is the service request business request data output request flow chart of the present invention.
Specific embodiment
During this example is implemented, a kind of data safety exchange system based on permissions mapping, applied to by several service requests In the network that business is formed, third party's data are integrated with, which includes:Network interface management module, data pipe Manage module and central database;
Network interface management module is used to implement the response of service request business, and according to the requested service of service request business point With different network interfaces, the requested service of reprocessing service request business;
As shown in Figure 1:Network interface management module includes:Service provider's authorization interface, business datum input interface and business Data output interface;
Data management module is used to implement the interaction of data, and carries out permission control to service request business and central database System, to ensure the safety of data exchange;
For storing data, data include central database:The essential information of service request business, authority information, exchange number According to essential information, the permission of exchange data.
Central database includes:Exchange tables of data ExData, service provider information table UserInfo and service provider's permission -- number According to authority list UsExData;Tables of data ExData is exchanged for storing the service data exchanged, including:Exchange data essential information With the permission for exchanging data;For example, data major key, data essential information, data source, data permission flag;
Service provider information table UserInfo is used to store the service request quotient data of application business, for example, service request business The essential information of data;Include service request business's major key, service request business's essential information, service request business's permission flag1;
Service provider's permission -- data permission table UsExData is used to store data permission and the mapping of service request business's permission Relation comprising data permission flag and service request business permission flag1, represents:Service with service request business's permission flag1 It is flag to ask the treatable maximum data permission of business.
A kind of data safety exchange method based on permissions mapping is applied in the security exchange system of data, and by such as Lower step carries out:
Step 1:The data template definition of different type interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmission process;
It is step 1.2, different according to the requested business of service request business, different style interfaces is distributed, according to different Style interface builds different XML data templates, so that service request business can utilize different XML data templates to transfer number According to;
Step 2:As shown in Figure 2 and Figure 3, the authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to authentication services, and distribution service provider's authorization interface is to requested Service request business;
The XML data template of step 2.3, service request business in service provider's authorization interface is sent to data management module Corresponding XML document;
Step 2.4, data management module receive XML document and are parsed, corresponding so as to distribute to service request business Permission, and the authority information deposit service provider information table that the essential information of service request business and service request business are distributed In UserInfo;
Step 3:As shown in figure 4, the data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check that if the permission service request business of service request business possesses permission, network interface Management module distributes Data Input Interface to service request business;If service request business does not have permission, network interface management module Refuse to distribute Data Input Interface to service request business;
During permission is checked, service request business's permission flag1 is transmitted to network interface management module by central database, Network interface management module judges;If flag1=00** or 01**, then it is assumed that possess data input permission.If flag1 =11**, then it is assumed that do not possess data input permission.
The XML data template completion data of step 3.2, service request business in Data Input Interface, and to data pipe It manages module and sends corresponding XML document;
The XML document received is stored in buffer and parsed by step 3.3, data management module, is checked simultaneously Service provider's permission -- data permission table UsExData, so as to which the exchange data essential information to be inputted is added to service request business Permission;And it by the permission added and its exchanges in data essential information deposit exchange tables of data ExData;
Network interface management module sends data management module to by data are exchanged, and when adding permission, central database will Service request business's permission flag1 is transmitted to data management module, check service request business's permission flag1 latter two, is taken according to looking into Business business's permission -- the mapping relations of data permission table UsExData, find the corresponding data permission flag of service request business, by number It is flag according to addition permission.Data are stored in central database by data management module.
Step 3.4, network interface management module return to " inputting successfully " information to service request business;
Step 4, such as Fig. 5 show that the data outgoing traffic of service request business is asked;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's permission, if service request business possesses permission, network interface Management module distributes data output interface to service request business;If service request business does not have permission, network interface management module Refuse to distribute data output interface to service request business;
During permission is checked, service request business's permission flag1 is transmitted to network interface management module by central database, Network interface management module judges;If flag1=11** or 01**, then it is assumed that possess data input permission.If flag =00**, then it is assumed that do not possess data input permission.
The XML data template of step 4.3, service request business in data output interface sends phase to data management module The XML document answered;
The XML document received is stored in buffer and parsed by step 4.4, data management module, is checked simultaneously Service provider's permission -- data permission table UsExData;So that it is determined that whether service request business possesses the exchange data base to be exported The permission of this information;If possessing, step 4.5 is performed;Otherwise, network interface management module is returned to service request business and " not had Permission " information;
Network interface management module sends data management module to by data are exchanged, and when adding permission, central database will Service request business's permission flag1 is transmitted to data management module, check service request business's permission flag1 latter two, is taken according to looking into Business business's permission -- the mapping relations of data permission table UsExData, find the corresponding data permission flag of service request business.Then Judge that service request business is requested and exchange whether data permission is somebody's turn to do under the corresponding data permission flag of service request business, If so, think to have permission, otherwise it is assumed that lack of competence.
Step 4.5, network interface management module are according to tables of data ExData is exchanged, using another in data output interface A XML data template generation XML document is simultaneously stored in buffer;XML document is sent to service request business using buffer, from And complete the data outgoing traffic of service request business.
Wherein, service request business permission and exchange data permission memory mechanism are in central database:
1st, service request business's permission is stored as four figures in service request business table UserInfo:****.Front two is stored as 00,01,11.00, which represents service request business, has data to input permission, and 11, which represent service request business, possesses data output permission, 01 represent service request business possess data input permission possess again data output permission;Two are stored as decimal number afterwards, The data manipulation permission that service request business is possessed is represented, number is bigger, and it is higher to possess permission.
2nd, exchange exchange data permission in data ExData and be stored as * *, be decimal number, number is bigger, possesses permission and gets over It is high.
3rd, service provider's permission -- it is stored in data permission table UsExData:Latter two of service request business's permission exchange Data permission.The exchange data permission of one level of correspondence of each service request business authority levels, the exchange data permission table Show that it corresponds to the manageable highest authority data of the service request business of level.

Claims (3)

1. a kind of data safety exchange system based on permissions mapping is to be applied to the net being made of several service requests business In network, it is characterized in that, the security exchange system includes:Network interface management module, data management module and central database;
The network interface management module is used to implement the response of service request business, and according to the request industry of the service request business Business distributes different network interfaces, reprocesses the requested service of the service request business;
The data management module is used to implement the interaction of data, and carries out permission to the service request business and central database Control, to ensure the safety of data exchange;
For storing the data, the data include the central database:The essential information of service request business, permission letter Breath, the permission for exchanging data essential information, exchanging data;
Network interface management module includes:Service provider's authorization interface, business datum input interface and business datum output interface;
The central database includes:Exchange tables of data ExData, service provider information table UserInfo and service provider's permission -- number According to authority list UsExData;
It is described to exchange tables of data ExData for storing the permission for exchanging data essential information and exchanging data;
Service provider's information table UserInfo asks the essential information of quotient data for storage service;
Service provider's permission -- data permission table UsExData is used to store data permission and the mapping of service request business's permission Relation.
2. data safety exchange system according to claim 1, it is characterized in that, the data permission and service provider's permission Mapping relations include data permission flag and service request business permission flag1, represent:With service request business's permission flag1's The treatable maximum data permission of service request business is flag.
3. a kind of data safety exchange method based on permissions mapping, it is characterized in that be applied in data safety exchange system, and It carries out as follows:
Step 1:The data template definition of different type interface
Step 1.1, structure are for storing the buffer of ephemeral data, for storing the data in transmission process;
It is step 1.2, different according to the requested business of service request business, different style interfaces is distributed, according to different types Interface builds different XML data templates, so that service request business can utilize different XML data templates to transfer data;
Step 2:The authority distribution of service request business;
Step 2.1, service request business send authentication services request to network interface management module;
Step 2.2, network interface management module are asked according to the authentication services, and distribution service provider's authorization interface is to requested Service request business;
Step 2.3, XML data template of the service request business in service provider's authorization interface are to data management module Send corresponding XML document;
Step 2.4, data management module receive XML document and are parsed, so as to distribute to the corresponding permission of service request business, And the authority information for being distributed the essential information of service request business and service request business is stored in service provider information table UserInfo In;
Step 3:The data incoming traffic request of service request business;
Step 3.1, service request business send the request of data incoming traffic to network interface management module;
Step 3.2, central database check the permission of service request business, if the service request business possesses permission, network connects Mouth management module distributes Data Input Interface to service request business;If the service request business does not have permission, network interface pipe Reason module is refused to distribute Data Input Interface to service request business;
Step 3.3, XML data template of the service request business in the Data Input Interface are sent out to data management module Send corresponding XML document;
The XML document received is stored in buffer and parsed, while checks service by step 3.4, data management module Business's permission -- data permission table UsExData, so as to the exchange data essential information the to be inputted addition to the service request business Permission;And it by the permission added and exchanges in data essential information deposit exchange tables of data ExData;
Step 3.5, the network interface management module return to " inputting successfully " information to the service request business;
Step 4, the data outgoing traffic request of service request business;
Step 4.1, service request business send data output interface application to network interface management module;
Step 4.2, central database check service request business's permission, if the service request business possesses permission, network interface Management module distributes data output interface to service request business;If the service request business does not have permission, network interface management Module is refused to distribute data output interface to service request business;
Step 4.3, XML data template of the service request business in the data output interface are sent out to data management module Send corresponding XML document;
The XML document received is stored in buffer and parsed, while checks service by step 4.4, data management module Business's permission -- data permission table UsExData;So that it is determined that whether the service request business possesses the exchange data base to be exported The permission of this information;If possessing, step 4.5 is performed;Otherwise, the network interface management module is returned to the service request business Return " not having permission " information;
Step 4.5, the network interface management module are according to tables of data ExData is exchanged, using in the data output interface Another XML data template generation XML document is simultaneously stored in the buffer;It is sent out using the buffer to service request business XML document is sent, so as to complete the data outgoing traffic of service request business.
CN201610048421.0A 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping Active CN105718817B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610048421.0A CN105718817B (en) 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610048421.0A CN105718817B (en) 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping

Publications (2)

Publication Number Publication Date
CN105718817A CN105718817A (en) 2016-06-29
CN105718817B true CN105718817B (en) 2018-05-18

Family

ID=56154888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610048421.0A Active CN105718817B (en) 2016-01-22 2016-01-22 A kind of data safety exchange system and method based on permissions mapping

Country Status (1)

Country Link
CN (1) CN105718817B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494647A (en) * 2008-01-21 2009-07-29 日本电气株式会社 Content asset management system, method and control program
CN101639882A (en) * 2009-08-28 2010-02-03 华中科技大学 Database security system based on storage encryption
CN102063431A (en) * 2009-11-13 2011-05-18 郭承运 Information database system and access control method thereof
CN102968599A (en) * 2012-10-25 2013-03-13 北京邮电大学 User-defined access control system and method based on resource publisher
CN103366129A (en) * 2012-03-26 2013-10-23 英顺源(重庆)科技有限公司 Data file control and management system and method base on network
CN104348854A (en) * 2013-07-30 2015-02-11 李娜 Networked multi-access media data transmission system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101639879B (en) * 2008-07-28 2012-06-20 成都市华为赛门铁克科技有限公司 Database security monitoring method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494647A (en) * 2008-01-21 2009-07-29 日本电气株式会社 Content asset management system, method and control program
CN101639882A (en) * 2009-08-28 2010-02-03 华中科技大学 Database security system based on storage encryption
CN102063431A (en) * 2009-11-13 2011-05-18 郭承运 Information database system and access control method thereof
CN103366129A (en) * 2012-03-26 2013-10-23 英顺源(重庆)科技有限公司 Data file control and management system and method base on network
CN102968599A (en) * 2012-10-25 2013-03-13 北京邮电大学 User-defined access control system and method based on resource publisher
CN104348854A (en) * 2013-07-30 2015-02-11 李娜 Networked multi-access media data transmission system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于物联网的信息共享平台设计;胥斌;《中国优秀硕士学位论文全文数据库》;20120215(第2期);全文 *
基于角色的信息网格访问控制的研究;邵桂伟;《中国优秀硕士学位论文全文数据库》;20060915(第9期);全文 *

Also Published As

Publication number Publication date
CN105718817A (en) 2016-06-29

Similar Documents

Publication Publication Date Title
CN109522735B (en) Data permission verification method and device based on intelligent contract
CN102307185B (en) Data isolation method used in storage cloud
US9047462B2 (en) Computer account management system and realizing method thereof
CN109858258A (en) Government data based on block chain exchanges method and device
CN102053969A (en) Web ERP (enterprise resource planning) user right management system
CN104766024A (en) Cloud platform based medical system case information storage and calling method
CN101197023A (en) Method for establishing visible document file management system facing to minor enterprises
CN102916954A (en) Attribute-based encryption cloud computing safety access control method
CN112835977B (en) Database management method and system based on block chain
CN102724221A (en) Enterprise information system using cloud computing and method for setting user authority thereof
CN102073817B (en) Dynamic access control improvement method on basis of RBAC (Role-Based policies Access Control) model
CN109962805A (en) A kind of multi-platform cut-in method and equipment based on Authority and Domain Based Management
CN101478398A (en) Authorization management system oriented to resource management and establishing method
CN102043931A (en) Private data access control method based on role permission dynamic conversion
CN105871914A (en) Customer-relationship-management-system access control method
CN109559213A (en) The processing method and processing device of taxation informatization
CN111988173A (en) Tenant management platform and tenant management method based on multi-layer parent-child structure tenant
Liu et al. A consortium medical blockchain data storage and sharing model based on ipfs
US7890394B2 (en) Secure access to transaction based information
CN113407626B (en) Planning management and control method based on blockchain, storage medium and terminal equipment
CN113127927B (en) Attribute reconstruction encryption method and system for license chain data sharing and supervision
CN109784084B (en) Data transaction method, device and system
CN100570635C (en) Distribution type knowledge management integrating system and integrated approach thereof
CN112261109B (en) Multi-airport time slot exchange system and method based on block chain
CN105653962B (en) A kind of user role access authorization for resource model management method of object-oriented

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant