An intelligent terminal access control method based on attribute-based encryption

A technology based on attribute-based encryption and smart terminals, which is applied in transmission systems, electrical components, etc., and can solve problems such as smart terminal data violations

Inactive Publication Date: 2019-06-11
EAST CHINA NORMAL UNIVERSITY +2
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A smart terminal may try to access data beyond its own access rights, resulting in infringement of other smart terminal data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An intelligent terminal access control method based on attribute-based encryption
  • An intelligent terminal access control method based on attribute-based encryption
  • An intelligent terminal access control method based on attribute-based encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In conjunction with the following specific embodiments and accompanying drawings, the invention will be further described in detail. The process, conditions, experimental methods, etc. for implementing the present invention, except for the content specifically mentioned below, are common knowledge and common knowledge in this field, and the present invention has no special limitation content.

[0042] 1. System initialization

[0043] When the system is initialized, the system includes the access device D and the smart terminal U; different smart terminals have relatively independent access rights to the data in the access device D; that is, the smart terminal U can only access the access device D Specific data domains cannot exceed their own access rights to obtain other unauthorized data domains; this method mainly solves the problem of data access control between the access device D and the smart terminal U;

[0044] Suppose B G=(q,g,h,G,G′,e,H) is a pairing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent terminal access control method based on attribute-based encryption, and the method achieves the fine-grained access control of default authorization data throughthe ciphertext strategy attribute-based encryption based on a monotonous Boolean matrix and a bilinear pair algorithm. A dual session period identifier and a pseudo-random number are introduced to serve as dynamic variable parameters in a session period, and the dynamic variable parameters are used for achieving freshness of communication and interaction. An attacker cannot obtain any informationof the pseudo-random function generator, and it is ensured that only a legal intelligent terminal can decrypt the ciphertext to obtain the data field authorized to be accessed by the access device.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things intelligent terminal equipment security, and in particular relates to an intelligent terminal access control method based on attribute-based encryption. Background technique [0002] In the Internet of Things, after accessing the network with the smart terminal, the access device can further access the data information obtained by the access device. A single smart terminal may have violations such as unauthorized data access, and faces severe privacy threats in terms of data access control. The smart terminal may conduct unauthorized access to the data of the access device. In the process of accessing the access device, the smart terminal is given predetermined access rights and can only access authorized data that conforms to the data access control policy. A certain smart terminal may try to access data beyond its own access authority, resulting in infringement of other smart termina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘虹程乾阳蒲戈光陈长松
Owner EAST CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products