APP user data access control system and method based on attribute encryption
A user data and access control technology, applied in the field of data security, can solve the problems of unreliable cloud storage and data loss, and achieve the effect of realizing access control, improving access control, and solving the problem of computing overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.
[0047] Such as figure 1 The schematic diagram of the APP user data access control system based on attribute encryption is shown. The system includes five types of entities:
[0048] A. Attribute Authority (AA): The attribute authority generates the attribute key related to the AUDA attribute of the APP user data visitor, and the attribute public key PK AA and attribute master key MK AA ; Assuming that the attribute authority is honest and trustworthy, it will perform tasks honestly according to the rules;
[0049] B. Central authority (Central Authority, CA): The central authority ...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com