Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An organization identity encryption and decryption method

An encryption and decryption, identity technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as leakage, users are not prudent in using their own information, data leakage, etc.

Active Publication Date: 2022-01-14
JIANGSU RONGZE INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The user and authority management of the existing application system usually uses the user name and password to verify the user's identity, and then determines the user's identity in the organization according to the user's role or group, and performs authorization and access control based on this. This method will cause user identity information to be scattered in the hands of identity authenticators at various enterprise levels. Users will not be cautious enough to use their own information, or enterprises will conduct information verification on user identities, which will lead to the exposure of identity information, and user identity information will be in the hands of various enterprises. Stored on the server, different companies attach different importance to data security and take different measures, making the leakage of user data a problem of barrel effect. If any part is breached, the user's privacy will be leaked. Under such circumstances, it is a problem that we need to solve to complete the verification of organizational identity in the business scenario of multi-organization cooperation. To this end, a method for encrypting and decrypting organizational identity is now provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An organization identity encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] User and authority management of traditional application systems usually uses username and password to verify user identity, and then determines the user's identity in the organization according to the user's role or group, and performs authorization and access control based on this. The following questions:

[0020] 1. The problem of repeated authentication and multi-site authentication

[0021] The identity system built by multiple heads wastes resources, but also has many obstacles in data sharing and use. The data information between different enterprise entities is stored separately and cannot be used comprehensively.

[0022] 2. Identity data privacy and security issues

[0023] User identity information is scattered in the hands of managers of various enterprises and organizations. Users are not careful enough to use their own information, or enterprises verify user identity information, which will lead to exposure of identity information and even serious violat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an organization identity encryption and decryption method, which relates to the technical field of encryption and decryption. It generates the public key of the enterprise organization and the private key of the enterprise organization, and then forms the user's private key through the attribute label in the organization identity, thereby completing the user's authentication. To determine the organization identity, in the process of encrypting and decrypting the ciphertext, the third-party application platform uses "zero-knowledge" verification to verify the user's organization identity, and then authorizes the user through the access policy of the organization structure, thereby Enabling users to complete the encryption and decryption process of ciphertexts; the present invention encrypts enterprise organizations and individual users using attribute tags, thereby enabling the verification of organizational identities, one-to-many authorization and access control to be completed, and at the same time through "Zero-knowledge" verification enables users to complete all verification and authorization processes in third-party application platforms without providing personal privacy.

Description

technical field [0001] The invention belongs to the technical field of encryption, in particular to an organization identity encryption and decryption method. Background technique [0002] Attribute-Based Encryption (ABE) is essentially an asymmetric encryption technology, but the biggest difference from asymmetric encryption such as RSA and ECC is that it implements one-to-many encryption and decryption. In ABE, the user's organizational identity is regarded as a series of attributes, which can be decrypted only when the attributes of the user's key match the encryption attributes. The organization's identity verification, one-to-many authorization and access control are realized through cryptographic algorithms; [0003] The user and authority management of the existing application system usually uses the user name and password to verify the user's identity, and then determines the user's identity in the organization according to the user's role or group, and performs auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3218H04L63/0442
Inventor 钟晓朱俊领
Owner JIANGSU RONGZE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products