Multi-level role permission control method and device based on cryptography

A role authority control, multi-level technology, applied in the computer field, can solve problems such as high construction cost and maintenance cost, inability to solve the verification authority requirement, security and stability hidden dangers of traditional solutions, etc., to achieve strong security and stability, The effect of reducing development and maintenance costs

Active Publication Date: 2021-02-26
杭州城市大数据运营有限公司 +2
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The traditional permission control scheme is divided into functional access control and data access control, which can only solve the requirement of access permission control, but cannot solve the requirement of verification permission
[0005] 2. There are major hidden dangers in the security and stability of traditional solutions, such as using simulated login, brute force cracking, decompilation and other technical means to attack the authority sy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level role permission control method and device based on cryptography
  • Multi-level role permission control method and device based on cryptography
  • Multi-level role permission control method and device based on cryptography

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042]In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0043]The terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. The singular forms of "a" and "the" used in the embodiments of the present invention and the appended claims are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and / or" used herein refers to and includes any or all possible combinations of one or more associated listed items.

[0044]It should be understood that, although the terms first, s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-level role permission control method and device based on cryptography, electronic equipment and a storable medium. The method comprises the following steps: dividing a role superior-subordinate relationship according to a service permission demand; controlling the access permission in the spatial dimension through the key encryption and decryption permission; whereina part of roles have verification permission, single original text information needing to be verified is sent to a verification party by a verified party (data input party) or a management party (highest permission party), the verification party performs hash operation on the original text information to obtain a hash head, the hash head is compared with the hash head of the encrypted informationobtained by the verification party, and if the two hash heads are consistent, the verification content is not tampered. The method is suitable for various access permission and verification permission requirements in the space dimension and the time dimension, extremely complex service requirements in real life can also be flexibly realized through simple configuration, and the development cost and the maintenance cost of a permission system are greatly reduced. Based on the cryptography technology, the permission is determined through the secret key, and high safety and stability are achieved.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a cryptographic-based multi-level role authority control method, device, electronic equipment and a storage medium. Background technique [0002] Asymmetric cryptographic algorithm (asymmetric cryptographic algorithm): This algorithm requires two keys, a public key (public key) and a private key (private key). The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used to decrypt it; if the data is encrypted with the private key, only the corresponding public key can be used to decrypt the data. decrypt. [0003] Hierarchical Deterministic (HD for short): Hierarchical refers to the hierarchical relationship between keys, and child keys can be generated from parent keys; Deterministic refers to, According to the number of the key in the hierarchy, the specific content of the key can be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06G06F21/64
CPCG06F21/64H04L9/0836H04L9/3236H04L9/3247H04L63/0442
Inventor 沈红程刘嘉伟吴林强许琮浩
Owner 杭州城市大数据运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products