Multi-level role permission control method and device based on cryptography

A role authority control, multi-level technology, applied in the computer field, can solve problems such as high construction cost and maintenance cost, inability to solve the verification authority requirement, security and stability hidden dangers of traditional solutions, etc., to achieve strong security and stability, The effect of reducing development and maintenance costs

Active Publication Date: 2021-02-26
杭州城市大数据运营有限公司 +2
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The traditional permission control scheme is divided into functional access control and data access control, which can only solve the requirement of access permission control, but cannot solve the requirement of verification permission
[0005] 2. There are major hidden dangers in the security and stability of traditional solutions, such as using simulated login, brute force cracking, decompilation and other technical means to attack the authority system, and crack to obtain the highest authority
[0006] 3. The traditional solution also needs to be customized and developed according to the business needs, and the construction cost and maintenance cost are relatively high
[0007] 4. Simple layered deterministic cryptography cannot realize time-dimension access authority control such as delayed access and single-period data access, and at the same time cannot implement verification authority control functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level role permission control method and device based on cryptography
  • Multi-level role permission control method and device based on cryptography
  • Multi-level role permission control method and device based on cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] Terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a" and "the" are also intended to include plural forms unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items.

[0044] It should be understood that although the terms f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-level role permission control method and device based on cryptography, electronic equipment and a storable medium. The method comprises the following steps: dividing a role superior-subordinate relationship according to a service permission demand; controlling the access permission in the spatial dimension through the key encryption and decryption permission; whereina part of roles have verification permission, single original text information needing to be verified is sent to a verification party by a verified party (data input party) or a management party (highest permission party), the verification party performs hash operation on the original text information to obtain a hash head, the hash head is compared with the hash head of the encrypted informationobtained by the verification party, and if the two hash heads are consistent, the verification content is not tampered. The method is suitable for various access permission and verification permission requirements in the space dimension and the time dimension, extremely complex service requirements in real life can also be flexibly realized through simple configuration, and the development cost and the maintenance cost of a permission system are greatly reduced. Based on the cryptography technology, the permission is determined through the secret key, and high safety and stability are achieved.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a cryptographic-based multi-level role authority control method, device, electronic equipment and a storage medium. Background technique [0002] Asymmetric cryptographic algorithm (asymmetric cryptographic algorithm): This algorithm requires two keys, a public key (public key) and a private key (private key). The public key and the private key are a pair. If the data is encrypted with the public key, only the corresponding private key can be used to decrypt it; if the data is encrypted with the private key, only the corresponding public key can be used to decrypt the data. decrypt. [0003] Hierarchical Deterministic (HD for short): Hierarchical refers to the hierarchical relationship between keys, and child keys can be generated from parent keys; Deterministic refers to, According to the number of the key in the hierarchy, the specific content of the key can be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06G06F21/64
CPCG06F21/64H04L9/0836H04L9/3236H04L9/3247H04L63/0442
Inventor 沈红程刘嘉伟吴林强许琮浩
Owner 杭州城市大数据运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products