Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Role-based complete access control method under intelligent contract

A technology of smart contracts and access control, used in secure communication devices, computer security devices, instruments, etc.

Active Publication Date: 2021-03-23
QILU UNIV OF TECH
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the needs and deficiencies of the current technological development, the present invention provides a role-based complete access control method under smart contracts to solve how to realize distributed, security audit, fine-grained allocation of roles, and dynamic addition, deletion and modification of access rights Check the question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role-based complete access control method under intelligent contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] combined with figure 1 , this embodiment proposes a role-based full access control method under smart contracts, and its implementation process includes:

[0053] ①. Based on the attribute encryption mechanism algorithm FH-CP-ABE of the file hierarchy, the resource owner DO performs the initialization operation.

[0054] The attribute encryption mechanism algorithm FH-CP-ABE based on the file hierarchy is a known algorithm, which consists of four operations: Setup represents the initial establishment of the algorithm, parameter setting, and is executed by a trusted authority authorization center. KeyGen represents a key generation algorithm. According to the generated master key and public key, it is calculated from the user attribute list parameters to generate the user's private key. This operation is performed by a fully trusted authorization center. Encrypt represents an encryption algorithm, which is executed by the resource owner DO. The encryption algorithm real...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a role-based complete access control method under a smart contract, and relates to the technical field of block chains. In order to realize fine-grained distribution of roles and dynamically add, delete, modify and check access rights, the adopted scheme is as follows: a resource owner initializes an attribute encryption mechanism algorithm of a file hierarchical structureand an identity-based signature algorithm to generate a public parameter, an attribute private key and a signature key pair; a resource owner deploys an intelligent contract and initializes roles andauthorities; based on an encryption algorithm, the resource owner encrypts the hash value set of the role by using a hierarchical tree structure to form a ciphertext; when a user sends a role requestto a resource owner to receive a ciphertext, decrypting the ciphertext by utilizing the attribute private key, signing based on a signature algorithm, submitting the ciphertext to the resource owner for verification, and calling a function in the intelligent contract after the verification is passed, thereby realizing authorization authentication of the user and mapping of roles and authorities; and the user calls a function in the smart contract to detect whether the user has the right to access the resources.

Description

technical field [0001] The invention relates to the field of technical smart contracts, in particular to a role-based complete access control method under smart contracts. Background technique [0002] With the advancement and development of science and technology, the development of the network is also becoming more and more rapid. In the rapidly developing Internet age, electronic finance, e-commerce, and electronic communication have brought us very convenient operations, and at the same time promoted the development of productivity and economy. However, with the development of the network, there are many security risks on the more and more convenient network. How to ensure the security of information in network transmission is an urgent problem to be solved. One of the technologies, access control, is a security technology to prevent unauthorized entities from illegally obtaining resources. Through access control technology, after granting legal and valid identities to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06G06Q40/04G06Q20/38G06F21/64G06F21/60
CPCH04L9/3236H04L9/3247H04L63/0442H04L63/10G06Q40/04G06Q20/3829G06F21/64G06F21/602
Inventor 禹继国柳丹阳闫碧薇董安明王桂娟
Owner QILU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products