Fine-grained access control method based on dense point labeling

An access control and fine-grained technology, which is applied in the field of electronic information security, can solve the problems of failure to realize effective management of electronic files, low accuracy and flexibility of access control, and difficulty in ensuring the security of electronic files, so as to improve accuracy and Flexibility, guaranteed rationality and rigor, enhanced security effects

Active Publication Date: 2020-07-03
HANGZHOU DIANZI UNIV
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the current access control technologies for electronic files are based on the file rather than the secret content in the file. Due to the full consideration of characteristics such as timeliness and timeliness, the access control mechanism is not rigorous enough to achieve effective management of electronic files
Moreover, most of the current electronic files are stored and transmitted in plain text, and the security of electronic files is difficult to guarantee, which may lead to the leakage of information resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] A fine-grained access control method based on dense point annotation, which performs hierarchical access control on electronic files with dense point as the unit.

[0053] Set the user set of N users in the network system as U={U 1 ,U 2 ,...,U N}, each user is registered with a unique ID number ID n , n=1,2,...,N.

[0054] The set of roles assigned to users is R={R 1 , R 2 ,...,R I}, R i Indicates one of the roles, i=1,2,...,I; the set of operation permissions is P={P 1 ,P 2 ,...,P J}, P j Indicates one of the operation permissions, j=1,2,...,J; the secret level set is L={L 1 , L 2 ,...,L A}, L a Indicates one of the specific security levels, a=1,2,...,A; the effective time domain set is T={T 1 , T 2 ,...,T B},T b Indicates one of the specific effective time domains, b=1,2,...,B; the set of effective spatial domains is S={S 1 ,S 2 ,...,S C}, S c Indicates one of the specific effective space domains, c=1,2,...,C.

[0055] The specific steps are:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fine-grained access control method based on dense point labeling. According to the method, firstly, secret point information including secret levels, effective time domains and effective space domains of secret points is marked, then grading secret keys are generated to carry out grading encryption on the secret points in a file, and the encrypted file is transmitted to aserver to be stored; allocating roles to the users, allocating operation authorities to the roles, and further expanding the role authorities; and finally, implementing access control in multiple dimensions according to the security level, the time domain, the space domain and the operation authority by taking the secret point as a unit. According to the method disclosed by the invention, the complexity of authority management is reduced, the files are stored and transmitted in a ciphertext form, and the storage and transmission security of the files is enhanced. The role permission set is expanded by multi-dimensionally labeling the secret point information, the access control strategy is refined, and the rationality and the leakproofness of access control are ensured. According to the method, fine-grained real-time access control is carried out by taking the secret point as a unit, so that the flexibility of access control is enhanced, and the security level of the electronic file is improved.

Description

technical field [0001] The invention belongs to the technical field of electronic information security, and in particular relates to a fine-grained access control method based on dense point marking. Background technique [0002] The vigorous development of the Internet and the increasing popularity and depth of office automation provide a more complete means for information resource sharing. In party and government departments at all levels, national defense and military industries, and enterprises and institutions, more and more information exists in the form of electronic files, which not only relates to the sound operation and rapid development of various industries in our country, but also directly relates to the provinces, confidentiality of information at the municipal and national level. Therefore, while realizing the sharing of information resources conveniently and quickly, preventing unauthorized users from illegally accessing sensitive information in the organiz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45G06F21/60G06F21/62H04L9/06
CPCG06F21/31G06F21/45G06F21/602G06F21/6218H04L9/0643
Inventor 王震曲单妮王秋华任一支吴国华姚晔张祯陈临强袁理锋
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products