Unlock instant, AI-driven research and patent intelligence for your innovation.

Content grading access control system and method

An access control and content classification technology, applied in the field of information management, can solve problems such as poor flexibility, application limitations, and inability to reflect non-hierarchical relationships, and achieve the effects of strong adaptability, access security, and enhanced security

Active Publication Date: 2010-06-09
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is only suitable for scenarios with strict level definitions, that is, users who obtain high-level keys must be able to decrypt low-level content, so the application is relatively limited
For data content that does not need to reflect the level, this method cannot give the user the corresponding access rights as required, that is, it cannot reflect the non-level relationship required by the system, so the flexibility is poor
[0004] In addition, this method cannot control the use of the key set. Once the user has the key set of a certain data record, he can arbitrarily transmit and copy the content of the record without restriction.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content grading access control system and method
  • Content grading access control system and method
  • Content grading access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In addition, the present invention uses the digital rights management (DRM) system to protect the key set K, and then distributes the key set K to users / use groups, which enhances the security of access control, and controls the key set K through the DRM system. The acquisition of K enables the system to further restrict the user / use group.

[0020] figure 1 It is the composition structure of the content hierarchical access control system in the present invention;

[0021] figure 2 It is the process of realizing hierarchical content access control in the present invention;

[0022] image 3 It is the generation process of the hierarchical key group in a preferred embodiment of the present invention;

[0023] Figure 4 It is the process of encrypting data records in a preferred embodiment of the present invention;

[0024] Figure 5 It is the issuance process of the key set K in a preferred embodiment of the present invention;

[0025] Figure 6 It is the proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a content hierarchy access control system and a method, in which, said system includes an issuance sub-system and a use sub-system and said issuance sub-system generates levelcryptographic keys progressively and uses all the level keys to cipher data recordings progressively to issue them to the usage sub-system, the content issuance sub-system sets the control and levelcryptographic keys based on the user limitation information and issues said keys to the usage sub-system, which judges if the received key has the control key, if so, it uses all its generated level keys to de-cipher the data recording progressively, otherwise, it uses said level keys to de-cipher the data recording.

Description

technical field [0001] The invention relates to information management technology, in particular to a content hierarchical access control system and method. Background technique [0002] The rapid development of communication networks makes the transmission and distribution of information data more and more convenient. Consequently, the protection requirements for the security of important and high-value digital information content are getting higher and higher. The so-called security protection refers to encrypting data content to ensure its transmission security, or when a data record allows multiple users, setting access permissions for the above-mentioned users, so that when different users view the same data record, You can only get the content within the scope of your own permissions. [0003] In response to this security protection requirement, Intel proposed a patent on multi-dimensional content protection, which divides data records into levels and sets different ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 邵刚钟杰萍张庆杰莫彩文
Owner HUAWEI TECH CO LTD