Unlock instant, AI-driven research and patent intelligence for your innovation.

Personal authorization access control system based on national cryptographic algorithm

A national secret algorithm and authorized access technology, which is applied in the field of personal authorized access control system based on national secret algorithm, can solve the problems of not supporting the safe sharing of data between enterprises, open shared storage, high memory requirements, etc., and achieve flexible control capacity, low resource consumption, high performance effects

Pending Publication Date: 2020-08-14
成都云巢智联科技有限公司
View PDF17 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method solves the problem of authentication between services within the enterprise, but it is impossible for the enterprise to open such important shared storage to external enterprises, so it obviously does not support the safe sharing of data between enterprises.
[0005] ②Client token, the client requests to generate a token from the ID card authentication server, and the identity authentication server signs the token with the RSA algorithm, and then attaches the token when the client accesses other services. This method solves the identity problem Authentication issues, security is good, and it can also support safe data sharing between cross-enterprise services. However, with the development of cryptography and computer technology, the 1024-bit RSA algorithm has been proven to be at risk of being cracked. , memory and other requirements are high, performance is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal authorization access control system based on national cryptographic algorithm
  • Personal authorization access control system based on national cryptographic algorithm
  • Personal authorization access control system based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0023] In the following description, references to "one embodiment," "an embodiment," "an example," "example," etc. indicate that such described embodiment or example may include a particular feature, structure, characteristic, property, element, or limitations, but not every embodiment or example necessarily includes the specific feature, structure, characteristic, property, element or limitation. Additionally, repeated use of the phrase "according to one embodiment of the present application" does not necessarily refer to the same embodiment, although it may.

[0024] For simplicity, some technical features known to those skilled in the art are omitted from the following description.

[0025] According to an embodiment of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a personal authorization access control system based on a national cryptographic algorithm. The system comprises the following modules. The system comprises a user management module, an authorization strategy management module, a client management module, a user authentication module and an authority judgment module. According to the personal authorization access control system based on the national cryptographic algorithm, a policy-based access control (PBAC) mode is used for controlling user resource permission, and compared with traditional role (RBAC)-based access control, the personal authorization access control system based on the national cryptographic algorithm has more flexible control capability and realizes permission control of different granularities. Compared with the traditional international universal algorithms RSA, SHA and DES, the SM2, SM3 and SM4 algorithms used in the invention have the advantages of lower resource consumption, higher security and higher performance.

Description

technical field [0001] The invention specifically relates to a personal authorization access control system based on a national secret algorithm. Background technique [0002] With the continuous development of IT technology, the microservice architecture is more and more widely used, and has become a technical architecture commonly used in Internet and enterprise-level projects. By dividing different business fields, several relatively independent subsystems in a project are used as An independent service is provided, which makes it necessary to frequently call multiple microservices to complete some complex services. Authentication is indispensable in each service call process. How to ensure frequent authentication when a large number of users access concurrently? It is the primary problem faced by the microservice security architecture that the authority will not become the bottleneck of the whole system. Similarly, in today’s Internet of Everything, the demand for infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33
CPCG06F21/335
Inventor 莫翼丁建曾祥发
Owner 成都云巢智联科技有限公司