Unlock instant, AI-driven research and patent intelligence for your innovation.

Authority control method and device based on sm1/sm2 algorithm

A technology of authority control and algorithm, which is applied in the field of authority control method and device based on SM1/SM2 algorithm, and can solve the problems of threat, low level, easy-to-crack security, etc.

Active Publication Date: 2016-02-24
AEROSPACE INFORMATION
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing rights management systems, or the M1 cards and other devices widely used now, all have the disadvantages of being easy to crack or other low security. In addition, how to effectively manage rights is not an easy problem to solve in each system.
[0006] In many rights management systems, the encryption-authentication algorithm often adopts the DES-RSA mode, and the core parts of encryption algorithms such as DES and RSA are mastered by foreign countries. The daily operation and decision-making of some countries' core secrecy departments pose a great threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority control method and device based on sm1/sm2 algorithm
  • Authority control method and device based on sm1/sm2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] Therefore, it is of extraordinary significance to invent a management system with good security and authority control functions. The security management system of SM1 and SM2 algorithms with independent intellectual property rights has just become the core of solving this problem.

[0027] figure 1 It is a flow chart of the permission control method based on the SM1 / SM2 algorithm according to an embodiment of the present invention. Such as figure 1 A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authority control method and an authority control device based on a signed message 1 (SM1) / SM2 algorithm. The method comprises the following steps of: consulting with a background management module through user identity equipment to obtain a session key; signing private information of the user by adopting an SM2 private key to obtain a signature character string, performing SM1 encryption, and sending an encryption result to a data acquisition module; sending the encryption result to the background management module through the data acquisition module, and decrypting the encryption result according to the session key to obtain a character string; inquiring a database according to the ID to obtain corresponding first user private information and a user public key, and decrypting the signature character string according to an SM2 public key to obtain the private information of the user; checking whether the private information of the user is consistent with second user private information, if not, refusing a user request, otherwise, judging whether the user has the authority in accessing a certain resource in the database according to the second user private information; and if the user has the authority in accessing a certain resource, allowing the user to access the resource, otherwise, refusing the request.

Description

technical field [0001] The present invention relates to the field of security control, in particular to an authority control method and device based on the SM1 / SM2 algorithm. Background technique [0002] The National Secret SM1 algorithm is a commercial cipher block standard symmetric algorithm compiled by the State Cryptography Administration. This algorithm is an SM1 block cipher algorithm approved by the State Cryptography Management Department. The block length and key length are both 128 bits. The security and confidentiality of the algorithm and the performance of related software and hardware are comparable to AES. The SM2 algorithm is a commercial cipher compiled by the State Cryptography Administration. The standard public key algorithm standard, the SM2 algorithm adopts the ECC elliptic curve principle, and the algorithm key has two types: 192 bits and 256 bits. The SM2 algorithm is superior to the RSA algorithm in terms of security strength and operation speed. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 徐树民王磊梁剑尹刚何丽
Owner AEROSPACE INFORMATION