Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

139 results about "Attribute authority" patented technology

An attribute authority (also known as an attribute store) is a directory or database in which systems can securely add, modify, and save attributes. An attribute authority is a trusted source of data for ABAC decisions. Data sources such as MySQL databases, LDAP directories, Active Directories, and Web services can be configured as...

Method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption

The invention discloses a method for realizing timely user attribute cancel based on ciphertext-policy attribute-based encryption. The method is realized by the following steps: a system is established to generate a system public key and a master key; an encipherer constructs an access strategy; the encipherer carries out encryption to generate a ciphertext; an attribute authority center generates a user private key and an authorization private key; a cloud server constructs a path secret key binary tree; the cloud server carries out proxy re-encryption and generates a re-ciphertext to realize the cancel of user attributes; and a decipher carries out decryption to obtain a plaintext. The method helps to reduce the burden of the attribute authority center, and can solve the private key updating problem corresponding to the attribute cancel quickly and efficiently; when one or some attributes of a user is cancelled, access authority for other attributes is still reserved; and the cancelling of one or some attributes of the user does not influence the access authorities of other uses to the cancelled attribute; and the method has the advantages of being capable of cancelling the user attributes in a flexible, timely, fine-grained and efficient manner.
Owner:XIDIAN UNIV

Ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption)

The invention discloses a ciphertext access control method based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption), which belongs to the field of information security. The method comprises the following steps: preparation and maintenance work which comprises initialization of CP-ABE (Ciphertext-Policy Attribute-Based Encryption), user registration and auditing, generation of an asymmetric key pair for signature and encryption by the system and the user, generation of a CP-ABE attribute key SK for the user and key and attribute certificate management is carried out; 2, and file sharing requires a file provider, an extensible access control markup language (XACML) access control system and a sharing user to work cooperatively. The attribute certificate in a PMI system is used as an expression document for a CP-ABE attribute set and the access structure, the XACML expresses the CP-ABE policy, and security of the attribute set and the access control structure description is ensured. A hierarchical structure with an inheritance relationship is introduced, features such as distribution, authorization and calculability are supported, the attribute authorization ability needs to comply with constraints, and the method is applicable to a distributed and open network application environment.
Owner:INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI

Data access control method and system in large-scale cloud storage based on block chain

The invention belongs to the technical fields of cloud storage, access control and blocks chains, and particularly relates to a data access control method and a data access control system in large-scale cloud storage based on a block chain. The method comprises the steps: registering all participants as nodes of a block chain platform; selecting a key administrator by utilizing an authority proving mechanism and executing an attribute password scheme of a (t, n) threshold multi-attribute authority ciphertext strategy; initiating an anonymous key generation transaction between key managers to generate an attribute private key for the applicant; the data owner uploads the encrypted data to the cloud storage server under the constructed data access strategy; the applicant anonymously sends adata access request to the cloud storage server, and the server verifies whether the user identity attribute is revoked and returns a result after successful pre-decryption; and the user decrypts thereceived pre-decrypted ciphertext to obtain a final plaintext. The invention provides a centerless fine-grained access control method for large-scale cloud storage data, and the centerless fine-grained access control method has good expansibility and user privacy guarantee.
Owner:上海宇讷科技有限公司

Distributed cross-chain system and cross-chain information interaction and system access control mechanism

ActiveCN112003889AImprove securityMeet the needs of cross-chain message brokersUser identity/authority verificationTrunkingEngineering
The invention discloses a distributed cross-chain system and a cross-chain information interaction and system access control mechanism. The distributed cross-chain system comprises a plurality of cross-chain clients, a cross-chain relay node, an attribute authority mechanism and a point-to-point encryption channel. The access control mechanism comprises the steps that a relay node verifies a blockchain user; the relay node adapts to the block chain attribute and agents the cross-chain message and encryption transmission of the block chain attribute, the attribute authority mechanism issues anattribute key and a cross-chain certificate to the relay node, a target block chain peer-to-peer relay node receives the encrypted file and decrypts and compares the cross-chain certificate, and finally the cross-chain message is received by a target block chain user so as to realize cross-chain communication. According to the invention, the relay node can be flexibly set to meet the cross-chainmessage proxy requirement of the specific block chain; high flexibility and expandability are realized, meanwhile, a decentralized attribute revocable and updatable attribute cryptographic mechanism is utilized, a fine-grained access control strategy is provided for cross-chain communication of the block chain, and the safety of a cross-chain system of the block chain is improved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Fine-grained data access control method based on fragmenting of secret keys

The invention discloses a fine-grained data access control method based on fragmenting of secret keys. The method mainly solves the problems that the safety is low and the calculation amount is large in the prior art. The method comprises the implementation steps that (1) a data owner encrypts shared data to obtain a cryptograph; (2) an attribute authority generates two attribute private keys for an access group user and sends the two attribute private keys to a semi-trusted agency and the access group user respectively; (3) when the access group user meets the requirement of an access control structure, the semi-trusted agency converts the cryptograph into an intermediate result through the first attribute private key, and the access group user decrypts the intermediate result through the second attribute private key to obtain the shared data; (4) the attribute private key fragmenting technology is adopted to control the access group user to obtain an incomplete attribute private key, so that the owner does not need to encrypt the shared data again after executing the undoing operation. By means of the method, fine-grained access control can be provided for the shared data, and the safety of the shared data can be improved. The method can be applied to access of the shared data under cloud shared data access control.
Owner:XIDIAN UNIV

Method and device for obtaining surveillance video of internet of videos

The embodiment of the invention provides a method and a device for obtaining a surveillance video, which are applied to internet of videos. The method comprises the following steps: a mobile terminaldevice sends a first surveillance video list obtaining request to a background server; the mobile-terminal background server recognizes target user attribute authority corresponding to target user information; the mobile-terminal background server sends a second surveillance video list obtaining request to a monitoring platform server; the monitoring platform server searches a surveillance video list corresponding to the user attribute authority and returns to the mobile-terminal background server; the mobile-terminal background server sends a surveillance video list to the mobile terminal device; the mobile terminal device shows the surveillance video list and receives a selection operation of a user based on the surveillance video list; the mobile terminal device sends the first surveillance video obtaining request to a stream media server so as to obtain the surveillance video data through the stream media server. The method and the device for obtaining a surveillance video in the invention can make the user watch the surveillance video conveniently and reduces the manpower resource required for audit.
Owner:VISIONVERA INFORMATION TECH CO LTD

Outsourcing attribute encryption method supporting attribute cancellation

The invention provides an outsourcing attribute encryption method supporting attribute cancellation. A part of secret key generation and ciphertext decryption operation is given to an outsourcing mechanism for completion, and a version number is set for a private key of a user to support the attribute cancellation. Secret key generation is completed by an attribute authority and an outsourcing secret key generation mechanism together, and decryption operation is completed by a cloud storage provider and the user together. When a secret key is generated, the attribute authority sends correlation data to the outsourcing secret key generation mechanism, the outsourcing secret key generation mechanism returns a part of the generated secret key to the attribute authority, and the attribute authority calculates a correlation result so as to obtain a conversion secret key. When some attributes of a certain user are cancelled, the version number of the private key of the user is updated, an upgraded secret key is generated and sent to the user to enable the user to update his private key, at the same time, the conversion secret key corresponding to the user on the cloud storage provider is updated, and thus the purpose of attribute cancellation of the user is realized.
Owner:GUANGDONG UNIV OF TECH

Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment

The invention discloses an attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under a cloud environment. The method comprises steps: a central authority mechanism generates a global identifier AID or UID for a subordinate attribute authority mechanism or a user, and calculates an attribute weight segmentation set for each attribute in a system; the central authority mechanism randomly selects a bilinear pairing and a bilinear group, generates a system main key MK and a public key PK, retains the MK and publishes the PK; the central authority mechanism distributes the main key or a weight attribute private key for the subordinate attribute authority mechanism or the user; a data owner selects an access policy, encrypts a file and uploads the file to a cloud server; the user requests the cloud server for accessing to the encrypted file, the cloud server returns back a ciphertext CT, the user decrypts the file through the weight attribute private key, and if the attribute in the private key satisfies the access policy, the user obtains a plaintext. With the method provided by the invention, a graded hierarchical multiple-authority mechanism is established, and the authorities of different grades can be in charge of different attributes and distribute private key components.
Owner:NANJING UNIV OF POSTS & TELECOMM

Revocable attribute-based encryption system and method for cloud storage

The invention discloses a revocable attribute-based encryption system and method for cloud storage. An attribute authorization module generates a public key and a main private key of an encryption system, and an attribute private key and an attribute group initial key of a data user; a data owner module constructs a data access structure, and obtain initial ciphertext by encrypting the plaintext;a data management module generates a attribute group key through the constructed key encryption key tree, performs re-encryption processing on the initial ciphertext to generate a ciphertext file anda ciphertext header of the ciphertext file, and stores the ciphertext file via a storage module; the data management module can also update the attribute group key after the data user module attributeis revoked, and process to obtain an updated ciphertext file. The data user module accesses the ciphertext file and decrypts the ciphertext file to obtain a plaintext corresponding to the ciphertextfile. Therefore, the attribute-level user revocation capability is implemented, the collusion attack between a revoking user and a non-revoking user can be resisted, and fixed-length ciphertext lengthand higher efficiency are achieved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Multi-authority attribute-based encryption method based on blockchain

The invention provides a multi-authority attribute-based encryption method based on a blockchain, which comprises the following steps of: globally initializing a system, generating a system general parameter (GP), and recording the GP into a genesis block; initializing attribute authority, wherein all the attribute authority generates a group of attribute public and private keys by using the GP; encrypting data, wherein an encryptor generates a data ciphertext and a key ciphertext by using symmetric encryption and attribute encryption algorithms; generating a user private key, wherein the attribute authority generates a group of attribute private keys for the user; decrypting the data, wherein the user decrypts the ciphertext by using the attribute private key to obtain shared data; and revoking the attribute, wherein due to user attribute revocation, an attribute set does not meet an access strategy, and a updated ciphertext address cannot be obtained. According to the invention, the blockchain is utilized to record the time sequence attribute state of the user, so that distributed distribution, storage and revocation of the attribute private key are realized, the key management efficiency of a distributed attribute-based encryption mechanism is improved, and the security of data sharing in a distributed environment is enhanced.
Owner:NANTONG UNIVERSITY

Partial strategy hiding access control method and system and wireless communication system

The invention belongs to the technical field of wireless communication, and discloses a partial strategy hiding access control method and system and a wireless communication system. A central authorization center generates global public parameters, a system master key and a user global unique identity identifier; the attribute authorization center generates an attribute authorization center publicand private key pair, and generates a user agent key and a decryption key; the data owner formulates an access control strategy according to a sharing demand, embeds the access control strategy intothe ciphertext, and uploads the partially hidden access control strategy and the ciphertext to the cloud together; the cloud service provider judges whether the data requester meets the partially hidden access control strategy or not; the data user uses the decryption key to complete final authentication; when user revocation occurs, the cloud service provider deletes the proxy key corresponding to the revoked user; and when attribute revocation occurs, the cloud service provider updates the corresponding proxy key and ciphertext. According to the invention, the authentication efficiency is high under the same security strength.
Owner:XIDIAN UNIV

Attribute encryption access control system and method based on block chain

The embodiment of the invention relates to an attribute encryption access control system and method based on a block chain. The system comprises: a block chain system which comprises a plurality of attribute authorization mechanisms and is used for generating public parameters and master key data after initialization operation and sending the public parameters; a data accessor which interacts with the block chain system; Internet-of-Things equipment which interacts with the block chain system; and a cloud server which interacts with the data accessor and the Internet-of-Things equipment, and is used for receiving and storing the ciphertext data and the transaction number data sent by the Internet-of-Things equipment, and receiving a request ciphertext instruction sent by the data accessor. According to the multi-centralization and non-tampering characteristics of the block chain, a trusted third party can enable a plurality of attribute authorization mechanisms and data owners to participate in attribute endorsement auditing by using the alliance chain, and the ciphertext hash value is stored; and the attribute-based fine-grained access control of the user is realized through an attribute encryption and symmetric encryption hybrid mechanism of a hidden ciphertext strategy.
Owner:XIAN UNIV OF POSTS & TELECOMM

Access control determination engine optimization system and method based on big data

An access control determination engine optimization system based on big data is composed of a client terminal and a server terminal. The server terminal is used for conducting decision evaluation, authorization and execution on a request sent by the client terminal. The access control determination engine optimization system comprises an original access control determination engine, an infrastructure portion of the original access control determination engine, a preprocessing frame, a real-time service frame and a background operation and maintenance frame, wherein the original access control determination engine and the infrastructure portion of the original access control determination engine comprise an access control determination evaluation engine module, a strategy execution point, an attribute authority module and a strategy library module, the preprocessing frame is used for processing required before deployment of the access control determination engine, and comprises an attribute preprocessing module, a first-stage clustering module and a second-stage clustering module, the real-time service frame is used for processing a real-time request generated when the server terminal runs, and comprises a registration center module, a mapping relation module and a set operation optimization module, and the background operation and maintenance frame comprises a recent entity registration module, an attribute change and maintenance module, a strategy change and maintenance module and a preparation strategy set module. The access control determination engine optimization system has the advantages of being efficient and high in availability, safety and universality.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Resource efficient security data sharing method and system

The invention provides a resource efficient security data sharing method and system. The method comprises the steps that an issuer preprocesses original data to obtain metadata M, wherein the metadataM is encrypted through utilization of a fog node symmetrical encryption scheme, a symmetrical key is protected by a set access structure, the accurate symmetrical key only can be obtained through decryption of a decryption server when an attribute set S of a subscriber satisfies the access structure corresponding to a target ciphertext, and further the metadata M is restored; the symmetrical keyand attributes are managed by an attribute authority; the access structure is an access tree gamma established by the issuer, non-leaf nodes of the access tree gamma are threshold gates, leaf nodes are associated with attribute values, and the access tree gamma comprises a left subtree gamma <c> and a right substree t <c>; the left subtree gamma <c> is determined by the issuer and corresponds to the ciphertext; and the right substree t <c> is the lead node for describing a time stamp. According to the method and the system, different security demands are realized, the computing cost is clearlyreduced, and the efficient user revocation is realized.
Owner:SHANGHAI JIAO TONG UNIV +2

Distributed attribute-based encryption method supporting fine-grit attribute revocation on lattice

The invention discloses a distributed attribute-based encryption method supporting fine-grit attribute revocation on lattice, and belongs to the field of the information security. The method comprisesthe following steps: at the system initialization stage: the linear secret sharing is performed on a target vector at a system initialization stage, a sub-secret sharing value is served as a privatekey of a corresponding attribute authorization mechanism, and the attribute authorization mechanism establishes the corresponding binary revocation tree for the managed system attribute; at the user attribute key and the update key generation stage: the attribute authorization mechanism obtains the secondary sub-secret sharing value of the user attribute by using secondary linear secret sharing, and the computes the user attribute key and the user attribute update key through a primary image extraction algorithm and a left-sampling algorithm; at the encryption stage: an encryption party computes the ciphertext of the message by using the Gaussian noise, the encrypted and preprocessed noise vector and the system public parameter; at the decryption: a decryption party decrypts the ciphertextby using the user attribute key and the user attribute update key. The method disclosed by the invention is high in security, flexible in access policy and supports the fine-grit attribute permissionrevocation.
Owner:芽米科技(广州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products