A multi-level access control method and system based on multi-secret visual password
An access control, multi-secret technology, applied in the field of network security, can solve the problems of complex operation process, high professional quality requirements of users, complex encryption and decryption process, etc., and achieve the effect of strong randomness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0083] Referring to the accompanying drawings, the detailed process is given below.
[0084] The first step is to assign permissions
[0085] First, initialize the parameters; second, construct the sharing matrix; then set the rotation rules of the circular share, as shown in Table 1; then mark the share area, and complete the share allocation, as shown in Table 1 Figure 6 .
[0086] (1) Initialization parameters
[0087] It is used to initialize related data such as the number of participants n (the server belongs to one of the participants), the number of authority levels h, the secret threshold value k, access policies and secret images.
[0088] a) Initialize the parameters k and n, assign permission levels to users according to the pre-defined policy group, combined with actual application scenarios, each user is only assigned one permission level, and the sum of the number of different permission levels of users is required to be h, where l 1 The lowest permission le...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


