CN109714169B - Data credible circulation platform based on strict authorization and circulation method thereof - Google Patents
Data credible circulation platform based on strict authorization and circulation method thereof Download PDFInfo
- Publication number
- CN109714169B CN109714169B CN201811563453.XA CN201811563453A CN109714169B CN 109714169 B CN109714169 B CN 109714169B CN 201811563453 A CN201811563453 A CN 201811563453A CN 109714169 B CN109714169 B CN 109714169B
- Authority
- CN
- China
- Prior art keywords
- data
- circulation
- interface
- platform
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a data credible circulation platform based on strict authorization and a circulation method thereof. The platform consists of an operation end management system, a client management system, a mobile end SDK, a data routing system, a data storage layer and a third party authentication and evidence storage platform. The participators of the data circulation model comprise a data demand main body, a data ownership main body, a data providing main body, a data credible circulation platform and a third party authentication and evidence storage platform. Data circulation is a new thing and a new state born under the economic background of the Internet, belongs to a new field, and therefore a standardized circulation system is not formed yet, and the circulation bodies lack consensus in all circulation links. The invention can help enterprises or individuals to implement perfect and ordered data circulation processes, unify circulation rules and eliminate data supply and demand contradictions among enterprises.
Description
Technical Field
The invention belongs to the field of data circulation, relates to a data circulation model and a data authorization technology, and particularly relates to a data credible circulation platform based on strict authorization and a circulation method thereof.
Background
Data generation, data circulation and data application are complete industrial chains in big data ecology, and the data circulation link is a key node for getting through the industrial chain. The policy indicates that ' guiding and cultivating a big data trading market, developing application-oriented data trading market trial points, exploring and developing big data derivative product trading, encouraging market main bodies of various links of an industrial chain to perform data exchange and trading, promoting data resource circulation, establishing a sound data resource trading mechanism and a pricing mechanism, standardizing trading behaviors and other sound market development mechanisms ' ideas and measures ', which undoubtedly affirms the important value of data circulation in the society and market economy from the policy level.
However, it cannot be denied that a gray "shared" zone exists in the current data circulation field, and the data security is threatened even the bottom line of law is reached without paying attention to privacy protection, data ownership, no normative data circulation mechanism and other problems. Therefore, a set of complete data circulation model is needed, and data authorization, data encryption and data tracing are realized in a multi-stage circulation scene, so that the whole data circulation behavior is standardized. In order to solve the above problem, a solution is now provided.
Disclosure of Invention
The invention aims to provide a data credible circulation platform based on strict authorization.
The purpose of the invention can be realized by the following technical scheme:
a data credible circulation platform based on strict authorization comprises an operation end management subsystem, a client management subsystem, a mobile end SDK, a data routing subsystem, a data storage layer and a third party service layer;
the operator management subsystem is used for determining the qualification of the data demand subject entering the platform, ensuring that the data demand subject entering the platform selected by the audit choose is legal and legal, and establishing a login account of the client management subsystem for the data demand subject;
the operation terminal management subsystem is also used for auditing the application of the data demand subject accessed to the platform, determining the content of the data needing to be circulated by the enterprise and detecting the data compliance; signing an application access protocol with a data demand main body, signing the application access protocol by using a digital signature technology, and carrying out escrow and storage in a third-party certificate storage service organization; generating a unique APP _ ID for each accessed application, wherein the unique APP _ ID is used as a unique identifier in the platform of the application;
the data logging requirement main body of the client management subsystem is certified, and the requirement main body creates own data application information on a platform and submits the data application information to the operation terminal management subsystem for examination;
the data application information must include a data inflow interface, the data inflow interface is used for receiving data sent by a data providing main body, and the data can provide the main body for application binding data after the audit is passed; selecting a partner as a data providing subject for the application passing the audit, generating a unique secret KEY S _ KEY for each data providing subject by the client management subsystem, and using the secret KEY S _ KEY as a certificate for the data providing subject to participate in data circulation; the data demand main body needs to provide the APP _ ID and S _ KEY to the data supply main body so as to embed the mobile terminal SDK in the application system of the data demand main body;
the mobile terminal SDK comprises an SDK of an android operating system and an SDK of an IOS operating system, and provides functions of testimony verification, EID verification, authorization protocol signature and authorization history query.
All data related to the rights and interests of specific individuals must be authorized by the data owner to be provided to the data demand body, and the data owner completes the authorization operation steps in the SDK as follows:
the method comprises the following steps: checking the ownership; providing two verification modes;
: the first is a people's card verification mode, mainly use the living technology of human face to extract the picture of human face and upload the picture of identity card, confirm the person's identity of right through OCR and human face comparison technology;
: the second mode is an eID carrier card sticking mode, an NFC technology of mobile equipment and a special EID chip reading device are used for reading eID codes in the carrier, and the eID codes are uploaded to an eID network identity operating mechanism IDSO authenticated by a third institute of public security to carry out identity confirmation;
step two: an authorization protocol signature; the authorization protocol is that PDF format is firstly displayed to the owner to check at the mobile terminal, if the authorization is agreed, a digital certificate issued by a CA organization with national certification qualification is used for electronic signature, and the signed certificate is uploaded to a third party certificate storing organization with related qualification for hosting;
step three: data signature and data encryption; the method comprises the steps that S _ KEY is used for carrying out digital signature on data to be circulated, a dynamic KEY is used for symmetrically encrypting the signed data, the data signature is used for preventing the data from being tampered in the transmission process and has non-repudiation performance, and the data encryption is used for preventing the data from being stolen in the transmission process and ensuring the safety of data safety;
the data routing subsystem is used for communicating the mobile terminal SDK, the operation terminal management subsystem, the client terminal management subsystem, the data storage layer, the third party service layer and the data inflow interface;
the data routing subsystem decrypts the data uploaded by the SDK by using a dynamic secret KEY to form a plaintext, and then performs digital signature verification on the plaintext by using S _ KEY as the secret KEY to ensure that the data is not tampered;
the data routing subsystem carries out compliance detection on the plain text by using a data compliance inspection engine, the data routing subsystem is used for inspecting the sensitive content condition and the consistent condition in the data, the sensitive content is the content which harms national security and social stability, and the consistent condition is that the data is consistent with the data requirement statement of a demand side; when any one of the conditions that the data contains sensitive content and is inconsistent with the requirement exists, the data is not pushed to a data inflow interface of a data demand side;
the log recording engine of the data routing subsystem records each authorization and transmission and stores the log recording engine to the data storage layer, so that the data can be well documented and data traceable;
the data storage layer comprises a relational database and a non-relational database; the relational database supports ACID database transaction to ensure data correctness in the circulation service, the non-relational database does not need to define a data mode in advance and predefine a table structure, a shared-free framework is adopted to divide data and store the data on each local server, and the non-relational database has the elastic extensible characteristic and is very suitable for the requirement of mass and irregular log data storage;
the third-party service layer is a third-party authentication and evidence-storing platform and is used for butting a CA (certification authority) with national authentication qualification, an eID (electronic identity) network identity operation authority authenticated by a third institute of public security department and a third-party evidence-storing authority with related qualification; and an authoritative identity verification and electronic signature service support is provided for the platform.
Furthermore, the operation end management subsystem is an operation end management platform of the trusted data circulation system;
the operation end management subsystem comprises basic information management, enterprise qualification auditing, enterprise information management, application registration auditing, application information inquiry, charging rule management, expense settlement management, authorization log analysis, transmission log analysis and enterprise service condition analysis.
Further, the client management subsystem is a client management platform of the trusted data circulation system, and comprises basic information management, enterprise application management, partner management, cost management, application authorization log query, data transmission log query, partner authorization frequency statistics and partner transmission log statistics.
Further, the data routing subsystem comprises a data pulling interface, a data pushing interface, a data query interface, an authorization protocol signature interface, a data compliance detection engine and a log recording engine.
Furthermore, the third-party service layer comprises a human identity card verification interface, an identity card OCR interface, an eID generation interface, an eID verification interface, a PDF digital signature interface, a verification storage interface, a face recognition interface, a face comparison interface and a face retrieval interface.
A trusted data circulation method based on strict authorization, comprising the following steps:
the method comprises the following steps: the data right subject is subjected to identity confirmation, and the identity confirmation mode adopts any one of certificate matching confirmation and EID confirmation;
step two: performing identity verification on the data ownership main body by using a data circulation platform, wherein the identity verification adopts any one of people identity matching verification and eID verification;
step three: the data right subject signs an authorization protocol, the data circulation platform uses an authoritative CA certificate to carry out digital signature on the authorization protocol, and the signed authorization protocol is stored in a third party certificate storage platform for certificate storage;
step four: the SDK at the mobile terminal encrypts and signs data and pushes the data to a data circulation platform;
step five: the data circulation platform decrypts and verifies the data, the data compliance inspection engine is used for carrying out compliance inspection on the plain text, and the compliance inspection is carried out through pushing the ciphertext to the data inflow interface of the data demand main body.
The invention has the beneficial effects that:
the invention can help enterprises or individuals to implement perfect and ordered data circulation processes, unify circulation rules and eliminate data supply and demand contradictions among enterprises. The data circulation is a new thing and new state born under the economic background of the Internet, belongs to the emerging field, and therefore a standardized circulation system is not formed, and circulation main bodies lack consensus in circulation links. The enterprise conveniently manages the data providing main body of the enterprise through the client management subsystem and monitors the data circulation situation in real time, so that the contradiction between supply and demand is eliminated. And the data channels of the supply and demand parties are easily opened through the data routing system and the mobile terminal SDK, and the data isolated island is eliminated.
And the data circulation safety compliance is realized, and the personal privacy is protected. The data circulation field has two problems which are concerned about, namely the data ownership problem and the privacy protection problem. All the identity data which can directly identify a specific individual, such as a citizen identity number, a social security number, a driver's license, a telephone number and the like, and sensitive data which can directly identify the specific individual, such as marital conditions, birth dates, health conditions and the like, belong to privacy data related to the rights and interests of the specific individual, the attribution right of the data is the individual, if the enterprise is privately circulated, the data belongs to illegal behaviors, and the circulation and the use can be realized only through the authorization of a data right owner. The invention confirms the identity of the right person through the verification of the person certificate and the verification of the eID identity, and the third party organization verifies and ensures the legality of the data authorization through the digital signature of the authorization protocol. Data signature and dynamic key encryption are used in data transmission to ensure that data are not leaked, stolen, tampered and copied, and personal privacy is protected.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of a platform system according to the present invention;
FIG. 2 is a diagram of a platform network topology of the present invention;
FIG. 3 is a flow chart illustrating a request subject check-in process according to the present invention;
FIG. 4 is a flowchart of the application publishing process of the present invention;
FIG. 5 is a flow chart of a data flow method according to the present invention.
Detailed Description
As shown in fig. 1 to 4, a data trusted circulation platform based on strict authorization includes an operation end management subsystem, a client end management subsystem, a mobile end SDK, a data routing subsystem, a data storage layer, and a third party service layer;
the operator management subsystem is used for determining the qualification of the data demand subject entering the platform, ensuring that the data demand subject entering the platform selected by the audit choose is legal and legal, and establishing a login account of the client management subsystem for the data demand subject;
the operation terminal management subsystem is also used for auditing the application of the data demand subject accessed to the platform, determining the content of the data needing to be circulated by the enterprise and detecting the data compliance; signing an application access protocol with a data demand main body, signing the application access protocol by using a digital signature technology, and carrying out escrow and storage in a third-party certificate storage service organization; generating a unique APP _ ID for each accessed application, wherein the unique APP _ ID is used as a unique identifier in the platform of the application;
the data logging requirement main body of the client management subsystem is certified, and the requirement main body creates own data application information on a platform and submits the data application information to the operation terminal management subsystem for examination;
the data application information must include a data inflow interface, the data inflow interface is used for receiving data sent by a data providing main body, and the data can provide the main body for application binding data after the audit is passed; selecting a partner as a data providing subject for the application passing the audit, generating a unique secret KEY S _ KEY for each data providing subject by the client management subsystem, and using the secret KEY S _ KEY as a certificate for the data providing subject to participate in data circulation; the data demand main body needs to provide the APP _ ID and S _ KEY to the data supply main body so as to embed the mobile terminal SDK in the application system of the data demand main body;
the mobile terminal SDK comprises an SDK of an android operating system and an SDK of an IOS operating system, and provides functions of testimony verification, eID verification, authorization protocol signature and authorization history query.
All data related to the rights and interests of specific individuals must be authorized by the data owner to be provided to the data demand body, and the data owner completes the authorization operation steps in the SDK as follows:
the method comprises the following steps: checking the ownership; providing two verification modes;
: the first is a people's card verification mode, mainly use the living technology of human face to extract the picture of human face and upload the picture of identity card, confirm the person's identity of right through OCR and human face comparison technology;
: the second type is an eID carrier card sticking mode, an NFC technology of mobile equipment and a special eID chip reading device are used for reading an eID code in a carrier, and an eID network identity operating mechanism IDSO authenticated by a third institute of public security is uploaded for identity confirmation;
step two: an authorization protocol signature; the authorization protocol is that PDF format is firstly displayed to the owner to check at the mobile terminal, if the authorization is agreed, a digital certificate issued by a CA organization with national certification qualification is used for electronic signature, and the signed certificate is uploaded to a third party certificate storing organization with related qualification for hosting;
step three: data signature and data encryption; the method comprises the steps that S _ KEY is used for carrying out digital signature on data to be circulated, a dynamic KEY is used for symmetrically encrypting the signed data, the data signature is used for preventing the data from being tampered in the transmission process and has non-repudiation performance, and the data encryption is used for preventing the data from being stolen in the transmission process and ensuring the safety of data safety;
the data routing subsystem is used for communicating the mobile terminal SDK, the operation terminal management subsystem, the client terminal management subsystem, the data storage layer, the third party service layer and the data inflow interface;
the data routing subsystem decrypts the data uploaded by the SDK by using a dynamic secret KEY to form a plaintext, and then performs digital signature verification on the plaintext by using S _ KEY as the secret KEY to ensure that the data is not tampered;
the data routing subsystem carries out compliance detection on the plain text by using a data compliance inspection engine, the data routing subsystem is used for inspecting the sensitive content condition and the consistent condition in the data, the sensitive content is the content which harms national security and social stability, and the consistent condition is that the data is consistent with the data requirement statement of a demand side; when any one of the conditions that the data contains sensitive content and is inconsistent with the requirement exists, the data is not pushed to a data inflow interface of a data demand side;
the log recording engine of the data routing subsystem records each authorization and transmission and stores the log recording engine to the data storage layer, so that the data can be well documented and data traceable;
the data storage layer comprises a relational database and a non-relational database; the relational database supports ACID database transaction to ensure data correctness in the circulation service, the non-relational database does not need to define a data mode in advance and predefine a table structure, a shared-free framework is adopted to divide data and store the data on each local server, and the non-relational database has the elastic extensible characteristic and is very suitable for the requirement of mass and irregular log data storage;
the third-party service layer is a third-party authentication and evidence-storing platform and is used for butting a CA (certification authority) with national authentication qualification, an eID (electronic identity) network identity operation authority authenticated by a third institute of public security department and a third-party evidence-storing authority with related qualification; and an authoritative identity verification and electronic signature service support is provided for the platform.
Furthermore, the operation end management subsystem is an operation end management platform of the trusted data circulation system;
the operation end management subsystem comprises basic information management, enterprise qualification auditing, enterprise information management, application registration auditing, application information inquiry, charging rule management, expense settlement management, authorization log analysis, transmission log analysis and enterprise service condition analysis.
Further, the client management subsystem is a client management platform of the trusted data circulation system, and comprises basic information management, enterprise application management, partner management, cost management, application authorization log query, data transmission log query, partner authorization frequency statistics and partner transmission log statistics.
Further, the data routing subsystem comprises a data pulling interface, a data pushing interface, a data query interface, an authorization protocol signature interface, a data compliance detection engine and a log recording engine.
Furthermore, the third-party service layer comprises a human identity card verification interface, an identity card OCR interface, an eID code generation interface, an eID verification interface, a PDF digital signature interface, a verification storage interface, a face recognition interface, a face comparison interface and a face retrieval interface.
As shown in fig. 5, a trusted data circulation method based on strict authorization includes the following steps:
the method comprises the following steps: carrying out identity confirmation on the data right main body, wherein the identity confirmation mode adopts any one of certificate matching confirmation and eID confirmation;
step two: performing identity verification on the data ownership main body by using a data circulation platform, wherein the identity verification adopts any one of people identity matching verification and eID verification;
step three: the data right subject signs an authorization protocol, the data circulation platform uses an authoritative CA certificate to carry out digital signature on the authorization protocol, and the signed authorization protocol is stored in a third party certificate storage platform for certificate storage;
step four: the SDK at the mobile terminal encrypts and signs data and pushes the data to a data circulation platform;
step five: the data circulation platform decrypts and verifies the data, the data compliance inspection engine is used for carrying out compliance inspection on the plain text, and the compliance inspection is carried out through pushing the ciphertext to the data inflow interface of the data demand main body.
The invention can help enterprises or individuals to implement perfect and ordered data circulation processes, unify circulation rules and eliminate data supply and demand contradictions among enterprises. The data circulation is a new thing and new state born under the economic background of the Internet, belongs to the emerging field, and therefore a standardized circulation system is not formed, and circulation main bodies lack consensus in circulation links. The enterprise conveniently manages the data providing main body of the enterprise through the client management subsystem and monitors the data circulation situation in real time, so that the contradiction between supply and demand is eliminated. And the data channels of the supply and demand parties are easily opened through the data routing system and the mobile terminal SDK, and the data isolated island is eliminated.
And the data circulation safety compliance is realized, and the individual privacy is protected. The data circulation field has two problems which are concerned about, namely the data attribution full problem and the privacy protection problem. All the identity data which can directly identify a specific individual, such as a citizen identity number, a social security number, a driver's license, a telephone number and the like, and sensitive data which can directly identify the specific individual, such as marital conditions, birth dates, health conditions and the like, belong to privacy data related to the rights and interests of the specific individual, the attribution right of the data is the individual, if the enterprise is privately circulated, the data belongs to illegal behaviors, and the circulation and the use can be realized only through the authorization of a data right owner. The invention confirms the identity of the right person through the personal identification verification and the EID identity verification, and guarantees the validity of data authorization through the digital signature of the authorization protocol and the verification of a third party organization. Data signature and dynamic key encryption are used in data transmission to ensure that data are not leaked, stolen, tampered and copied, and personal privacy is protected.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (5)
1. A data credible circulation platform based on strict authorization is characterized by comprising an operation end management subsystem, a client end management subsystem, a mobile end SDK, a data routing subsystem, a data storage layer and a third party service layer;
the operator management subsystem is used for determining the qualification of the data demand subject entering the platform, ensuring that the data demand subject entering the platform selected by the audit choose is legal and legal, and establishing a login account of the client management subsystem for the data demand subject;
the operation terminal management subsystem is also used for auditing the application of the data demand subject accessed to the platform, determining the content of the data needing to be circulated by the enterprise and detecting the data compliance; signing an application access protocol with a data demand main body, signing the application access protocol by using a digital signature technology, and carrying out escrow and storage in a third-party certificate storage service organization; generating a unique APP _ ID for each accessed application, wherein the unique APP _ ID is used as a unique identifier in the platform of the application;
the data logging requirement main body of the client management subsystem is certified, and the requirement main body creates own data application information on a platform and submits the data application information to the operation terminal management subsystem for examination;
the data application information must include a data inflow interface, the data inflow interface is used for receiving data sent by a data providing main body, and the data can provide the main body for application binding data after the audit is passed; selecting a partner as a data providing subject for the application passing the audit, generating a unique secret KEY S _ KEY for each data providing subject by the client management subsystem, and using the secret KEY S _ KEY as a certificate for the data providing subject to participate in data circulation; the data demand main body needs to provide the APP _ ID and S _ KEY to the data supply main body so as to embed the mobile terminal SDK in the application system of the data demand main body;
the mobile terminal SDK comprises an SDK of an android operating system and an SDK of an IOS operating system, and provides functions of testimony verification, eID verification, authorization protocol signature and authorization history query;
all data related to the rights and interests of specific individuals must be authorized by the data owner to be provided to the data demand body, and the data owner completes the authorization operation steps in the SDK as follows:
the method comprises the following steps: checking the ownership; providing two verification modes;
s1: the first is a people's card verification mode, mainly use the living technology of human face to extract the picture of human face and upload the picture of identity card, confirm the person's identity of right through OCR and human face comparison technology;
s2: the second type is an eID carrier card sticking mode, an NFC technology of mobile equipment and a special eID chip reading device are used for reading an eID code in a carrier, and an eID network identity operating mechanism IDSO authenticated by a third institute of public security is uploaded for identity confirmation;
step two: an authorization protocol signature; the authorization protocol is that PDF format is firstly displayed to the owner to check at the mobile terminal, if the authorization is agreed, a digital certificate issued by a CA organization with national certification qualification is used for electronic signature, and the signed certificate is uploaded to a third party certificate storing organization with related qualification for hosting;
step three: data signature and data encryption; the method comprises the steps that S _ KEY is used for carrying out digital signature on data to be circulated, a dynamic KEY is used for symmetrically encrypting the signed data, the data signature is used for preventing the data from being tampered in the transmission process and has non-repudiation performance, and the data encryption is used for preventing the data from being stolen in the transmission process and ensuring the safety of data safety;
the data routing subsystem is used for communicating the mobile terminal SDK, the operation terminal management subsystem, the client terminal management subsystem, the data storage layer, the third party service layer and the data inflow interface;
the data routing subsystem decrypts the data uploaded by the SDK by using a dynamic secret KEY to form a plaintext, and then performs digital signature verification on the plaintext by using S _ KEY as the secret KEY to ensure that the data is not tampered;
the data routing subsystem carries out compliance detection on the plain text by using a data compliance inspection engine, the data routing subsystem is used for inspecting the sensitive content condition and the consistent condition in the data, the sensitive content is the content which harms national security and social stability, and the consistent condition is that the data is consistent with the data requirement statement of a demand side; when any one of the conditions that the data contains sensitive content and is inconsistent with the requirement exists, the data is not pushed to a data inflow interface of a data demand side;
the log recording engine of the data routing subsystem records each authorization and transmission and stores the log recording engine to the data storage layer, so that the data can be well documented and data traceable;
the data storage layer comprises a relational database and a non-relational database; the relational database supports ACID database transaction to ensure data correctness in the circulation service, the non-relational database does not need to define a data mode in advance and predefine a table structure, a shared-free framework is adopted to divide data and store the data on each local server, and the non-relational database has the elastic extensible characteristic and is very suitable for the requirement of mass and irregular log data storage;
the third-party service layer is a third-party authentication and evidence-storing platform and is used for butting a CA (certification authority) with national authentication qualification, an eID (electronic identity) network identity operation authority authenticated by a third institute of public security department and a third-party evidence-storing authority with related qualification; and an authoritative identity verification and electronic signature service support is provided for the platform.
2. The trusted data circulation platform based on strict authorization as claimed in claim 1, wherein the operator management subsystem is an operator management platform of the trusted data circulation system;
the operation end management subsystem comprises basic information management, enterprise qualification auditing, enterprise information management, application registration auditing, application information inquiry, charging rule management, expense settlement management, authorization log analysis, transmission log analysis and enterprise service condition analysis.
3. The trusted data distribution platform based on strict authority as claimed in claim 1, wherein the client management subsystem is a trusted data distribution system client management platform, and the client management subsystem includes basic information management, enterprise application management, partner management, cost management, application authorization log query, data transmission log query, partner authorization frequency statistics, and partner transmission log statistics.
4. The trusted data circulation platform based on strict authority as claimed in claim 1, wherein the data routing subsystem includes a data pull interface, a data push interface, a data query interface, an authorization protocol signature interface, a data compliance detection engine, and a logging engine.
5. The trusted data circulation platform based on strict authority as claimed in claim 1, wherein the third party service layer includes a human identity card verification interface, an identity card OCR interface, an eID generation interface, an eID verification interface, a PDF digital signature interface, a verification storage interface, a face recognition interface, a face comparison interface and a face retrieval interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563453.XA CN109714169B (en) | 2018-12-20 | 2018-12-20 | Data credible circulation platform based on strict authorization and circulation method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563453.XA CN109714169B (en) | 2018-12-20 | 2018-12-20 | Data credible circulation platform based on strict authorization and circulation method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109714169A CN109714169A (en) | 2019-05-03 |
CN109714169B true CN109714169B (en) | 2021-08-03 |
Family
ID=66256907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811563453.XA Active CN109714169B (en) | 2018-12-20 | 2018-12-20 | Data credible circulation platform based on strict authorization and circulation method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109714169B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111754234A (en) * | 2020-07-07 | 2020-10-09 | 中国银行股份有限公司 | Air banking business processing method and device |
CN113609528A (en) * | 2021-07-14 | 2021-11-05 | 洛阳小行家科技有限公司 | Data authorization circulation method and system based on digital pass |
CN114785496A (en) * | 2022-04-19 | 2022-07-22 | 支付宝(杭州)信息技术有限公司 | Method, device and system for sharing private data and receiving private data |
CN116720160A (en) * | 2023-08-02 | 2023-09-08 | 北京国际大数据交易有限公司 | Data authorization method, device and system |
CN118277965B (en) * | 2024-03-28 | 2024-10-22 | 人民数据管理(北京)有限公司 | Data three-right split ownership proving method and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6898288B2 (en) * | 2001-10-22 | 2005-05-24 | Telesecura Corporation | Method and system for secure key exchange |
CN101388764B (en) * | 2007-09-12 | 2011-08-03 | 杨谊 | Data information protecting method, system and ciphering apparatus |
US8875235B1 (en) * | 2013-03-15 | 2014-10-28 | Rex Hakimian | Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems |
CN107196762B (en) * | 2017-06-13 | 2020-05-12 | 贵州大学 | Big data oriented power determining method |
-
2018
- 2018-12-20 CN CN201811563453.XA patent/CN109714169B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109714169A (en) | 2019-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109714169B (en) | Data credible circulation platform based on strict authorization and circulation method thereof | |
TWI764037B (en) | Interaction method and system across blockchain, computer equipment and storage medium | |
Campanile et al. | Designing a GDPR compliant blockchain-based IoV distributed information tracking system | |
CN111552955B (en) | Personal identity authentication method and device based on block chain and IPFS | |
US20180336554A1 (en) | Secure electronic transaction authentication | |
CN110120953B (en) | Railway passenger identity authentication system facing smart phone client | |
US20130061055A1 (en) | Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones | |
CN109327457A (en) | A kind of internet of things equipment identity identifying method and system based on block chain | |
CN108389059A (en) | Digital copyrighted work protection, transaction and distributing method based on ownership and system | |
CN109417549A (en) | The method and apparatus of information proof is provided using centralization or distributed ledger | |
CN111800252A (en) | Information auditing method and device based on block chain and computer equipment | |
CN114579943A (en) | Employee digital identity management system and method based on block chain | |
CN108022194A (en) | Law-enforcing recorder and its data safety processing method, server and system | |
CN113515756B (en) | High-credibility digital identity management method and system based on block chain | |
CN105554018A (en) | Network real name verification method | |
CN112699353A (en) | Financial information transmission method and financial information transmission system | |
CN113706261A (en) | Block chain-based power transaction method, device and system | |
CN113111386A (en) | Privacy protection method for block chain transaction data | |
CN109818965B (en) | Personal identity verification device and method | |
CN107196965B (en) | Secure network real name registration method | |
CN111931230A (en) | Data authorization method and device, storage medium and electronic device | |
CN117151736A (en) | Anti-electricity fraud management early warning method and system | |
CN116684160A (en) | Public service litigation data security sharing and privacy protecting method and system | |
CN109583977A (en) | A kind of certificate chain house pre-sale permit electronics license system and its application method | |
CN105743883B (en) | A kind of the identity attribute acquisition methods and device of network application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |