Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-level access control method and system based on multi-secret visual password

An access control, multi-secret technology, applied in the field of network security, can solve the problems of complex operation process, complex encryption and decryption process, high professional quality requirements of users, and achieve the effect of strong randomness

Active Publication Date: 2018-06-22
中国网络安全审查技术与认证中心 +1
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption and decryption process of this kind of cryptographic technology is very complicated, generally requires a lot of calculations, and can only be carried out with the help of auxiliary equipment such as computers.
At the same time, the existing access control method has a complicated operation process, which is difficult for people who do not have cryptography knowledge to understand, and requires high professional quality for users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level access control method and system based on multi-secret visual password
  • Multi-level access control method and system based on multi-secret visual password
  • Multi-level access control method and system based on multi-secret visual password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] Referring to the accompanying drawings, the detailed process is given below.

[0084] The first step is to assign permissions

[0085] First, initialize the parameters; second, construct the sharing matrix; then set the rotation rules of the circular share, as shown in Table 1; then mark the share area, and complete the share allocation, as shown in Table 1 Figure 6 .

[0086] (1) Initialization parameters

[0087] It is used to initialize related data such as the number of participants n (the server belongs to one of the participants), the number of authority levels h, the secret threshold value k, access policies and secret images.

[0088] a) Initialize the parameters k and n, assign permission levels to users according to the pre-defined policy group, combined with actual application scenarios, each user is only assigned one permission level, and the sum of the number of different permission levels of users is required to be h, where l 1 The lowest permission le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-level access control method and system based on a multi-secret visual password. The method comprises the following steps: 1) a server sets a corresponding secret imagefor each permission level in a control policy, and assigns a permission level to each user; 2) the server constructs a corresponding sharing matrix for each secret image, and then fills pixels in thesecret image into a plurality of shared shares of different levels according to the sharing matrix; 3) the server distributes the shared shares to users of corresponding permission levels according toa permission allocation policy, and the server keeps a minimum level shared share and the secret images; and 4) the server receives authorization requests and the shared shares issued by at least k-1users, and then performs secret recovery according to the received shared shares and the reserved shared shares, and identifies the authenticity of the shared shares to decide whether to authorize. By adoption of the multi-level access control method and system, the authentication operation is achieved by using a human eye vision system, so that the implementation process of the access control system is simper and easier.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a multi-level access control method and system based on multi-secret visible passwords. Background technique [0002] Access control technology refers to the means by which the system restricts the user's identity and the predefined policy group to which it belongs to the ability to use data resources. It is an important technology to ensure the security of information systems. It explicitly permits or restricts access capabilities and scope through some means, thereby restricting access to key resources and preventing illegal users from intruding into information systems or legitimate users from causing damage without authorization. Access control generally includes three elements: subject, object and security access rules. The subject refers to the active party that issues the access operation, usually a user or a computer process; the object is an informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/104
Inventor 刘思蓉胡浩严妍兰丹妮刘玉岭吴迪沈刚张颖君
Owner 中国网络安全审查技术与认证中心