Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authority control system and method based on block chain and SGX

A technology of access rights and control systems, applied in the field of information technology security, can solve the problems that users cannot independently know the changes of their own rights, access control mechanisms are vulnerable to attacks, and cannot be perceived by others, so as to achieve the best transparency and security , to ensure safety, to improve the effect of safety

Active Publication Date: 2022-05-10
ZHEJIANG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing access control methods do not consider the security of the access control itself, and lack transparency
Users accessing the information system cannot independently know the changes of their own permissions, and if the information system does not have a unified record and monitoring behavior for internal permission changes, it will also face the risk of malicious attackers obtaining permissions without being perceived by others
In addition, in the cloud-based data organization structure, when accessing information through a complex network environment, a more precise and fine-grained access control mechanism is required to manage user and access object data in a unified manner, and the access control mechanism itself is more vulnerable to Attacks, so a safe and reliable access control method with strong scalability is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authority control system and method based on block chain and SGX
  • Access authority control system and method based on block chain and SGX
  • Access authority control system and method based on block chain and SGX

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It must be declared that the user authority information A in this embodiment user and access object permission information A target , for the purpose of describing the image, the basic permission level is used for marking. In other specific implementations, it can be implemented in the form of role-based access control, attribute-based access control, etc.; this embodiment uses asymmetric encryption to encrypt the administrator key, but in the specific implementation It can be adjusted according to the actual situation. Therefore, the diagrams and text descriptions given in the subsequent description of the embodiments are only examples, and all modifications based thereon should be considered within the scope of the present invention.

[0033] The block chain and SGX-based access authority control system described in this embodiment has an o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authority control system and method based on a block chain and an SGX. The system comprises a block chain system, an authority management contract, an authority control contract and local service thereof, an authority verification contract and local service thereof on a block chain node, and an identity verification system, and provides a safe, credible, transparent and controllable underlying architecture for access authority control. According to the system, authority operation control and management are carried out through an intelligent contract, off-chain secret processing is carried out on key data in an on-chain authority operation process through a local SGX security area, and information security and accuracy are ensured. In addition, the system also specially considers the immediacy requirement of permission deletion, special processing is carried out on the permission deletion, and attacks based on a time sequence are avoided. According to the method disclosed by the invention, an information security, process and monitorable underlying architecture is provided for an access authority control mechanism, particularly an access authority control mechanism of an information system based on a cloud, and better security guarantee is provided for organizations and individuals.

Description

technical field [0001] The present invention relates to the field of information technology security, in particular to an access authority control system and method based on blockchain and SGX. Background technique [0002] In a huge information system, it is usually necessary to classify and control the information content that different participants can access, so that participants can and can only access the information content that the system allows them to access, so as to ensure the privacy and security of information data sex. This brings up the need for access control. The basic idea of ​​access control is to firstly identify the user identity by verifying various login credentials, including user name password, security token, biometrics, etc. After obtaining the user's identity, according to the access level and other authority information set by the system for the user, the user's identity information, etc., the user is given the corresponding access authority. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/1097
CPCH04L63/0876H04L63/102H04L63/108H04L63/123H04L63/126H04L67/1097
Inventor 陈建海范俊松许端清白杨沈睿纪守领何钦铭
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products