Hierarchical classification access authorization management method based on roles

A technology of authorization management and roles, applied in the field of data communication, which can solve problems such as unauthorized access, sensitive information leakage, and easy leakage of data transmission.

Active Publication Date: 2015-07-15
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The purpose of the present invention is to provide a role-based authorization management method for hierarchical and classified access, which can effectively solve the problems in the prior art, especially the leakage of sensitive information caused by the plaintext storage of database data and terminal files, and the loss of power grid data. Clear text transmission causes data to be easily leaked during network transmission and weak identity authentication can easily lead to unauthorized access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical classification access authorization management method based on roles
  • Hierarchical classification access authorization management method based on roles
  • Hierarchical classification access authorization management method based on roles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Embodiment of the present invention: a method for authorization management of role-based hierarchical classification access, such as Figure 8 shown, including the following steps:

[0075] S1. Initialization: Assuming that there are n+1 data types and m users in the information system, an encryption key hierarchy tree is established, and the index master key K is calculated j and class key K x , where 1≤j≤t, t+1≤x≤n, t and j are the main index nodes, and t+1, x and n are the leaf nodes under the main index node;

[0076] Specifically, the index master key K is calculated by the following method j and class key K x :

[0077] (1) The encryptor randomly selects an integer IV, two HMACHs with keys k (·)and Run the polynomial-time group generation algorithm g(1 n′ ) to generate a group G, and choose a collision-resistant hash function H′: {0, 1}*→G, where K is the system access master key, and K x for safety class C x the class key;

[0078] (2) Calculate the in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hierarchical classification access authorization management method based on roles. The hierarchical classification access authorization management method includes the following steps: S1, initialization is carried out, wherein it is assumed that n+1 data classes and m users exist in an assumed information system, an encryption key hierarchical tree is built, and calculation indexing is carried out on a main encryption key Kj and a class encryption key Kx; S2, data encryption is carried out; S3, user registration is carried out; S4, access requesting is proposed; S5, decryption is carried out. According to the hierarchical classification access authorization management method, a hierarchical classification authorization module based on the roles is built, a hierarchical encryption key management scheme based on the roles is used in the model, and permissions of the users for accessing specific data are given according to the roles and the grades of the users, so that the aim of more-fine-grained access control is achieved, the problem of unauthorized accesses caused by weak identity authentication is effectively solved, and meanwhile, the privacy of information resource in the system is effectively protected; in addition, the invention further provides an intermediate node for hiding hierarchical data structures in the system through access paths invisible to the users, and the leakage of sensitive information in the system is further prevented.

Description

technical field [0001] The invention relates to an authorization management method for hierarchical and classified access based on roles, and belongs to the technical field of data communication. Background technique [0002] In recent years, with the development of informatization and electronicization, information from all walks of life has entered the computer system, and data has increasingly become the basis for the core decision-making and development of the daily operation of enterprises or institutions. Due to the development of the network and the rise of e-commerce, people pay more and more attention to network security. In the final analysis, the core of network security is data security. Computer systems have gradually become the infrastructure for the operation of various enterprises and institutions, and people are increasingly dependent on data, especially some financial data, customer data, production data, R&D data, etc. are important data related to the sur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/06H04L63/0892H04L63/10
Inventor 陈锐忠李伟清邹洪黄巨涛赵延帅李皓彭泽武冯歆尧林泽鑫唐亮亮
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products