Access control method based on identity and encryption in naming data network
A named data network, access control technology, applied in the usage of multiple keys/algorithms, electrical components, transmission systems, etc., can solve the problem of inability to obtain decryption keys, inability to decrypt, etc., to reduce network communication burden and enhance security. the effect of reducing encryption cost and system delay
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0028] Hereinafter, the preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[0029] figure 1 To name the schematic diagram of data network access control, figure 2 For the flowchart of the access control method based on identity and encryption, in this embodiment, there are five entities: content publisher A, user B, user C, private key generator PKG, and NDN router. The content publisher A of a video website publishes popular movies to the network and forwards them to users through the router of the NDN core network. User B is a movie lover, and becomes a member of the video site through registration, and user C is a non-member. Due to copyright issues, newly released movies can only be accessed by registered members of the video website. Non-member users cannot watch them even if they download the movies locally. In order to achieve such access control, the access control method based on identity and encryp...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap