Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

135 results about "Access control matrix" patented technology

In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in 1971.

Fine-grained access control method for data in cloud storage

The invention discloses a fine-grained access control method for data in cloud storage. The method includes the steps: firstly, a data owner blocking files and formulating an external access strategy of file blocks and an internal access strategy of the file blocks according an access control policy, and a trusted third party generating a public key and a master key according to an attribute password mechanism; the data owner utilizing a symmetric password mechanism to encipher the file blocks, utilizing the attribute password mechanism to encipher a symmetric key, and sending a cypher text of the file blocks and a cypher text of a secret key to the cloud; the data owner and the trusted third party utilizing the attribute password mechanism to authorize a user, and generating an attribute key and an attribute processed by an attribute encryption function for each attribute of the user; the data owner sending an user permission change statement to the trusted third party; and the trusted third party judging whether adding or deleting the user permission or not for the user according to the user permission change statement. Compared with the prior art, the method for the fine-grained data access control in the cloud storage has the access control with more fine-grained data under the condition of not increasing additional costs.
Owner:HUAZHONG UNIV OF SCI & TECH

Identity and access control and management system and method in cloud environment

The invention discloses an identity and access control and management system and method in a cloud environment. The system comprises an identity and access control and management system (IAM), a user terminal and an application server. For different application services, integrated identity authentication and unified user management follow an identity authentication and access control separation principle, and user identity and access control management is realized. On the respect of user identity information management, from generation to cancellation of the user identity, a registration service provides self-help service for the user; on the respect of user authentication, a double-factor authentication technology is used for realizing the bidirectional authentication of the user and an authentication server and issuing an authentication bill to realize one-time authentication and multi-time use; and on the respect of access control and management, the access authority of the user is managed based on a role access control strategy of a user group, and the server is authorized to issue an authorized bill to the user. By adopting the identity and access control and management system and method disclosed by the invention, the user is convenient to manage the identity information, multi-time authentication is avoided, the authentication security is enhanced, and the illegal access of unauthorized users is prevented.
Owner:XIDIAN UNIV

Revocable key external package decryption method based on content attributes

The invention relates to a revocable key external package decryption method based on content attributes. For a trusted authority, 1, initialization is carried out, and system parameters are output; 2, a random number generation algorithm operates; 3, a collision-resistant Hash function is selected, and the Hash value is calculated; 4, a public key and a main key are calculated; 5, the random number is selected, and exponentiation calculation and multiplication are carried out; 6, the collision-resistant Hash function operates, the exponentiation operation is carried out, and a decryption key is obtained. For a data holder, 7, AES data encryption is carried out; 8, an access control matrix is generated; 9, a random number is selected, and an inner product is calculated; 10, multiplication, exponentiation and exclusive-or operation is operated, and ciphertexts are obtained. For a decryption operator, 11, a decryption request and a transformation key are sent. For a mobile storage serve provider, 12, CT2 is sent to an external package decryption agency. For the external package decryption agency, 13, the transformation key is utilized, and the transformation ciphertext is calculated. For the decryption operator, 14, a conversation key is obtained through calculation; 15, AES data decryption is carried out.
Owner:HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS

Face recognition-based attendance access control system

The present invention provides a face recognition-based attendance access control system, which comprises a first camera module used for acquiring a first image information in a first preset to-be-monitored space, a second camera module used for acquiring a second image information in a second preset to-be-monitored space, a face recognition and processing module used for conducting the gray processing and the illumination compensation processing on the acquired first and second image information so as to obtain an grayscale image, and extracting the feature information of face components from the grayscale image, a feature data comparison module used for conducting the similarity comparison on the feature information of face components and the pre-stored face data information, and generating an access control switch control signal when the similarity achieves a similar threshold, and an access control module used for receiving the access control switch control signal to open or close a door. According to the invention, the cross monitoring function on the image information in different to-be-monitored spaces can be realized by the first camera module and the second camera module. Therefore, the recognition accuracy is improved.
Owner:CHONGQING KAIZE TECH

Access control method and system based on two-dimension code

The invention discloses an access control method and an access control system based on a two-dimension code, wherein the method comprises the steps as follows: access control equipment generating random information when detecting an operation triggered by a user, generating the two-dimension code according to the generated random information, displaying the two-dimension code, transmitting to a management platform via using the random information as first authentication information; a user terminal obtaining the two-dimension code displayed on the access control equipment via shooting, analyzing the two-dimension code to obtain the random information; using the obtained random information as second authentication information, transmitting a verification request to the management platform, wherein the verification request comprises the second authentication information and a user terminal identification; the management platform using the first authentication information to verify the second authentication information when judging that the user terminal identification is a legal identification, the management platform transmitting an access control opening instruction to the access control equipment when the verification is passed. The method of the invention improves the safe reliability of authentication because the management platform performs dual authentication to information of the two-dimension code and identity of the user.
Owner:CHINA TELECOM CORP LTD

Attribute-based hybrid encryption method capable of tracing leaked secret key

Disclosed is an attribute-based hybrid encryption method capable of tracing a leaked secret key. The method comprises the following steps: a trusted authority: 1, inputting a coefficient lambda, and outputting a system parameter; 2, running a randomized number generation algorithm; 3, selecting one anti-bump Hash function, and calculating a Hash value; 4, running a fingerprint code generation algorithm GenFC; 5, calculating a bilinear pair exponentiation operation; 6, distributing a fingerprint code to a user, and specifying an attribute set S; 7, running the randomized number generation algorithm, multiplication and exponentiation operation; and 8, embedding the fingerprint code in a user private key; a data holder: 9, carrying out AES data encryption; 10, generating an access control matrix; 11, running an attribute-based hybrid encryption algorithm Encapsulate, and encrypting an AES session secret key; and 12, running a bilinear pair and multiplication and division operation to obtain a session secret key; a data user: 13, running an AES data decryption algorithm; and the trusted authority: 1*, searching for an adaptability code word; 2*, calculating pj and Z; and 3, calculating a weight sum, and outputting a set C.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products