Course selection system based on attribute passwords

A password and attribute technology, applied in the field of course selection system based on attribute password, can solve problems such as leakage, course data security, privacy, etc.

Pending Publication Date: 2019-12-20
FUDAN UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once it is in danger, course data will face serious security issues and privacy leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Course selection system based on attribute passwords
  • Course selection system based on attribute passwords
  • Course selection system based on attribute passwords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] The course selection system solution proposed by the present invention is based on attribute cryptography technology, that is, using attribute cryptography's characteristics of security, low time cost, and low storage cost and the principle of asymmetric cryptography. The specific steps are:

[0095] (1) The system generates the public key PK, master key MK, and course selection authority key s according to the security parameters c And map the attribute set S; for example: "Computer College" attribute is mapped to 28 through hash function H; "Physics College" attribute is mapped to 29; "Student" attribute is mapped to 17 through hash function; "Teacher" attribute is mapped to H The H-mapping of the Greek function is 50; "2017 class" is 10; "2018 class" is 69; "2016 class" is 53; "cryptography laboratory" is 18.

[0096] (2) When adding new course information, use the public key to encrypt the non-public information M into CT according to the input permission restricti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of teaching equipment, and particularly relates to a course selection system based on attribute passwords. The system comprises a login management unit, ateacher unit, a student unit and a teacher unit. The teacher unit comprises a course selection student viewing module and a course information modification module; the student unit comprises a courseinformation query module, a course selection module, a course quitting module and a personal repair and reading condition query module; the educator unit comprises a course management module, a student management module and a teacher management module; the login management unit is responsible for carrying out identity verification on students, teachers and administrators and carrying out corresponding function operations; according to the system, identity information of a user is described by using a group of attributes, an encryption party encrypts the information by using the same public keyand a specific access structure, and the information can be decrypted only when the user has an attribute combination meeting the requirements of the access structure; according to the system, the safety and privacy of course data can be guaranteed, and the time cost can be reduced.

Description

technical field [0001] The invention belongs to the technical field of teaching equipment, and in particular relates to a course selection system based on attribute codes. Background technique [0002] Public key cryptography, also known as asymmetric cryptography, is an important research direction of modern cryptography. In public key cryptography there exists a pair of keys, one of which is the encryption key and the other is the decryption key. This pair of keys cannot be deduced from each other, so if one of them is disclosed, it will not cause the other to be leaked. The public key is usually called the public key, and the private key is called the private key. If the encryption key is a public key, it is usually used by Party B to transmit the data encrypted by the public key to Party A who owns the private key, which is called public key encryption; if the decryption key is a public key, it is usually used by Party B to verify the data encrypted by the private key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q50/20G06F21/60G06F21/62G06F16/22G06F16/25
CPCG06Q50/205G06F21/602G06F21/6245G06F16/2246G06F16/25
Inventor 阚海斌莫伟琦张亮刘百祥吴小川
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products