Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Social privacy protection method of multi-level attribute management center based on characteristic encryption

A technology of management center and attribute characteristics, which is applied in digital data protection, electronic digital data processing, instruments, etc.

Inactive Publication Date: 2016-10-12
HUNAN UNIV OF SCI & ENG
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a social privacy protection method based on feature encryption by a multi-level attribute management center. The problem of performance bottleneck and key management risk in the letter center, and at the same time, it can solve the fine-grained access control of the matching users in the process of making friends in the mobile social network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social privacy protection method of multi-level attribute management center based on characteristic encryption
  • Social privacy protection method of multi-level attribute management center based on characteristic encryption
  • Social privacy protection method of multi-level attribute management center based on characteristic encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0046] The overall structure of the friendship process is as follows figure 1 As shown, the friendship process is as follows:

[0047] Step 1: System initialization, generating system public key and system master key.

[0048] The trusted central authorization center TA assigns a unique global GID as a user identity identifier to all dating users, and assigns a unique identifier AID to all attribute management servers AA. GID is usually the user's identity digital signature string, all AAs can verify the authenticity of GID and the user's GID cannot be illegally obtained by other users.

[0049] See Table 1 for the meaning of the relevant character variables in this scheme;

[0050] Table 1 Symbol description table

[0051]

[0052]

[0053] In the system initialization phase, TA specifies the recursion depth dep defined in the key structure, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a social privacy protection method of a multi-level attribute management center based on characteristic encryption. A friend making sponsor uploads encrypted personal information files to a remote friend finder, and a certain kind of user-defined attribute characteristics and a friend making access control strategy are uploaded to the multi-level attribute management center; the multi-level attribute management center generates ciphertext according to the attribute characteristics and is associated with an access strategy tree corresponding to attributes; a friend making requester requests for checking friend making information of other users in the friend finder, when an attribute set of the friend making requester is matched with the access strategy tree of the friend making sponsor, the multi-level attribute management center sends a secrete key corresponding to the attribute of the friend making sponsor to the friend making requester, and the friend making requester decrypts data ciphertext of an information owner of the friend finder. The method solves the single-point fault and performance bottleneck problems of a single-authorization center, and also solves the problems that an intelligent terminal does not depend on an authorization center and accordingly monitoring difficulty is high and application scenes are limited.

Description

technical field [0001] The invention relates to the field of computer science and technology, in particular to a feature encryption-based social privacy protection method for a multi-level attribute management center. Background technique [0002] With the rapid development of mobile social networks (MSN, Mobile Social Networks) and smart terminal devices, users can constantly find new friends by sharing moods, photos, activities, hobbies, etc. in MSN at any time, thereby further expanding their network. Social scope (such as Zhiquan, Weiju, etc.). Friend discovery based on user attribute matching is a typical application in mobile social networks. Users can find friends with common interests or users with certain characteristics by matching each other's personal attribute files. With the continuous deepening of the experience level and the continuous expansion of the experience range, the real information of the user on the mobile social network will be massively aggregate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6245H04L63/062H04L63/102
Inventor 罗恩韬黄文李文赵全友廖文芳
Owner HUNAN UNIV OF SCI & ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products