Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission authentication method and system for information security sharing

A technology of information security and authority authentication, applied in the field of information security, can solve the problems of single authority authentication method, inflexible application, and affecting the security of information sharing, and achieve the effect of high accuracy and improved security

Pending Publication Date: 2022-02-11
卢秋如
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application solves the technical problem of affecting the security of information sharing by providing a permission authentication method and system for information security sharing in the prior art because the permission authentication method is single and cannot be applied flexibly. Authorization authentication can be applied flexibly and with high accuracy, so as to realize independent authorization authentication and improve the technical effect of information sharing security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission authentication method and system for information security sharing
  • Permission authentication method and system for information security sharing
  • Permission authentication method and system for information security sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, the embodiment of the present application provides an authority authentication method for information security sharing, wherein the method includes:

[0032] Step S100: Obtain the first information security sharing scene;

[0033] Step S200: Extract elements of the first information security sharing scene to obtain security elements of the first sharing scene;

[0034] Specifically, with the development of Internet technology, information sharing is becoming more and more popular. Sharing resource information with others in order to achieve a more reasonable allocation of resources and save social costs is to improve the utilization of information resources and avoid unnecessary waste in information collection, An important means of repeated waste in storage and management, therefore, the security of information sharing is of great significance. The first information security sharing scenario is an information and data sharing application sc...

Embodiment 2

[0082] Based on the same inventive idea as the authority authentication method for information security sharing in the foregoing embodiments, the present invention also provides an authority authentication system for information security sharing, such as Figure 6 As shown, the system includes:

[0083] A first obtaining unit 11, configured to obtain a first information security sharing scenario;

[0084] A second obtaining unit 12, the second obtaining unit 12 is configured to extract elements of the first information security sharing scene, and obtain the security elements of the first sharing scene;

[0085] A third obtaining unit 13, the third obtaining unit 13 is configured to classify the first shared file information according to the file feature decision tree, and obtain the first shared file feature result;

[0086] A fourth obtaining unit 14, the fourth obtaining unit 14 is configured to evaluate the sensitivity of the characteristic result of the first shared file,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a permission authentication method and system for information security sharing, and the method comprises the steps of carrying out the element extraction of a first information security sharing scene, and obtaining a first sharing scene security element; classifying the first shared file information according to a file feature decision tree to obtain a first shared file feature result; evaluating the sensitivity degree of the first shared file feature result to obtain the sensitivity of the first shared file; calling a first permission matching authentication model from a permission matching authentication model library according to the first shared file sensitivity; inputting the first sharing scene security element and the first sharing file feature result into the first permission matching authentication model to obtain a first permission authentication result; and performing sharing management on the first shared file information according to the first authority authentication result. The technical problem that in the prior art, an authority authentication method is single and cannot be flexibly applied, and consequently the information sharing safety is affected is solved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an authority authentication method and system for information security sharing. Background technique [0002] With the development of Internet technology, information sharing is becoming more and more popular. Share resource information with others to achieve resource allocation more reasonably and save social costs. An important means of repeated waste on the Internet, therefore, the security of information sharing is of great significance. [0003] However, in the process of realizing the technical solution of the invention in the embodiment of the present application, the inventor of the present application found that the above-mentioned technology has at least the following technical problems: [0004] The prior art authority authentication method is single and cannot be applied flexibly, resulting in the problem of affecting the security of information sharing. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/31G06K9/62G06N3/08
CPCG06F21/6218G06F21/6245G06F21/602G06F21/31G06N3/08G06F18/24
Inventor 卢秋如杨方兴
Owner 卢秋如
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products