Dynamic authority access control method based on privacy protection
A dynamic permission and privacy protection technology, applied in the field of information security, can solve the problems of exposing personal identity information, reducing computing and communication overhead, and inability to flexibly protect sensitive data, so as to avoid collusion attacks, reduce computing and communication overhead, and protect The effect of personal privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0097] In the case of complex data sharing, the certification center CA in the domain needs to authenticate the terminal members of the data information sharing, but when providing the identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only members who meet the access policy can share information. In view of this application background, the present invention provides a privacy protection-based dynamic authority access control method, such as figure 1 As shown, the steps are as follows: ① The terminal members participating in the sharing of information resources first perform parameter initialization, and generate their own public / private key pairs respectively; The terminal members in th...
Embodiment 2
[0145] A method of dynamic permission access control based on privacy protection, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of terminal members participating in information resource sharing is 10, and the entity set of terminal members is expressed as The set of corresponding entity terminal memberships is expressed as The certification center CA defines the set of attributes of all terminal members as Attr set ={A 1 ,A 2 ,A 3}, terminal member u i The attribute set of (1≤i≤10) is terminal member u l The attribute set of (1≤l≤10,l≠i) is The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help understand the specific implementation method of the present invention. It should be understood by those skilled in the art that various m...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com