Book resource access control method based on Chinese remainder theorem
A Chinese remainder theorem and resource access technology, applied in the field of book resource access control based on Chinese remainder theorem, can solve problems such as easy exposure of personal identity information, reduction of computing and communication overhead, and inability to flexibly protect sensitive data.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0067] In the case of complex information sharing, the book resource authentication center in the domain needs to authenticate the identity of the information sharing members, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, while information sharing is multi-party authentication, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only members who comply with access control policies can share information. In view of this application background, the present invention proposes an access control method based on the Chinese remainder theorem, such as figure 1 As shown, the steps are as follows: ①Resource access terminals participating in information resource sharing first perform parameter initialization to generate their own public / private key pairs; ②Registration of resource ...
Embodiment 2
[0095] An access control method based on the Chinese remainder theorem, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, the maximum number of resource access terminals participating in information resource sharing is 10, and the entity set of resource access terminals is expressed as The set of corresponding resource access terminal identities is expressed as Book resource certification center CA defines the attribute set of all resource access terminals as Attr={A 1 ,A 2 ,A 3}, resource access terminal u i The attribute set is attr i ={a i,1 ,a i,2 ,a i,3}, 1≤i≤10, resource access terminal u k The attribute set is attr k ={a k,1 ,a k,2}, 1≤k≤10, k≠i. The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help the understanding of the implementation meth...
PUM
![No PUM](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com