Unlock instant, AI-driven research and patent intelligence for your innovation.

Blockchain-based resource access token distribution and resource usage monitoring method

An access token and resource access technology, which is applied in the field of resource access token distribution and resource usage monitoring, and can solve problems such as fraudulent use, lack of consideration for revocation, and leakage of user identity privacy.

Active Publication Date: 2021-03-30
HANGZHOU DIANZI UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current access control scheme, the access token is either directly transmitted or encrypted, which will bring about security and privacy issues for the access token. If it is transmitted directly, the token is easy to be forged, fraudulently used, etc. Although it is impossible to know the specific content of the token, it is easy to leak the identity and privacy of the user through packet capture
[0004] (2) There is a problem of difficult access token revocation
In traditional solutions, the revocation of access tokens is often not considered enough, either completely revoked, which will bring huge computing and communication overhead, or partially revoked, which allows the previous access tokens to still perform normal content access
[0005] (3) Resource usage monitoring is not considered
The characteristics of the blockchain such as tamper-proof modification, anonymity, and decentralization can well solve the above problems, but in the blockchain, every time a query is made for a certain content recorded on the blockchain, The entire blockchain must be traversed, and as the number of blockchains grows, it will bring a lot of computational overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based resource access token distribution and resource usage monitoring method
  • Blockchain-based resource access token distribution and resource usage monitoring method
  • Blockchain-based resource access token distribution and resource usage monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be further described below in conjunction with drawings and embodiments.

[0070] The invention includes access transaction formats, secure distribution of access tokens, revocation of access tokens, monitoring of content access, and fast retrieval using Cuckoo filters. The present invention realizes safe distribution of access tokens and effective monitoring of resource usage based on block chain transactions, and can be applied to any access control system that uses access tokens (or access credentials). Its structure is as follows: figure 1 As shown, the specific implementation process is as follows:

[0071] Step 1. Set the access transaction format

[0072] In the blockchain, each transaction consists of three parts: the transaction identifier (Tid), the input array Tin[] of the transaction, and the output array Tout[] of the transaction. In the present invention, we have added a new field: transaction type (Ttype), so as to quickly fin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain-based resource access token distribution and resource use monitoring method. According to the invention, the secure distribution of the access tokens and the effective monitoring of resource utilization are realized in a block chain transaction form. A content provider grants an access token to a content requester in the form of an access token granting transaction, and indicates that the access token can be shared by the content requester to other users or entrusted to a third party if the content requester has a sharing authority or entrusted authority of the access token. The content requester accesses the content using the obtained access token, and the corresponding content access operation is recorded on the block chain in the form of a content access transaction. In addition, the revocation of the access token is realized through token revocation transaction, so that the security of access control is enhanced. According to the invention, theverification efficiency of the access token is improved, so that the access efficiency of the whole system is improved.

Description

technical field [0001] The present invention relates to the technical field of block chain, access control and access token, in particular to a block chain-based resource access token distribution and resource usage monitoring method. Background technique [0002] Access tokens were originally a concept in Windows operating system security. When a user logs in, the system creates an access token that contains the SID returned during the user's login process and the list of privileges distributed to the user and the user's security groups by local security policy. The system uses tokens to control which securable objects a user can access, but it only applies to local login access. In the current access control schemes using access tokens, the access token is used as a credential for remote access to content, but the following problems generally exist in these access control schemes with tokens: [0003] (1) Security and privacy issues of access token transmission. In the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/36G06Q20/38H04L29/08
Inventor 吕秋云祁伊祯郑宁
Owner HANGZHOU DIANZI UNIV