Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed extensible access control authorization system and method based on block chain

An access control and blockchain technology, applied in database distribution/replication, transmission system, digital data protection, etc., can solve the problems of inefficient access control, insufficient equipment, and lack of consideration of a large number of capabilities in industrial sites

Inactive Publication Date: 2021-07-02
SICHUAN UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem that the existing access control scheme does not take into account that there are a large number of equipment with insufficient capabilities on the industrial site, and the factory layout and equipment are highly dynamic. The increase of access control, the increase of computing and storage costs and the inefficiency of access control, through the blockchain smart contract as the carrier, a new distributed architecture is proposed based on the blockchain, combined with the traditional attribute-based The access control model of the system introduces the concept of attribute serial number value pair and prefix identification to optimize the system policy retrieval method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed extensible access control authorization system and method based on block chain
  • Distributed extensible access control authorization system and method based on block chain
  • Distributed extensible access control authorization system and method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following is a detailed description of the access control workflow based on the system architecture of this solution in conjunction with the accompanying drawings, mainly introducing the specific interaction process of the system's cross-domain access control, as shown in Figure 5 shown.

[0033] The workflow can be mainly divided into two stages: system initialization and cross-domain access control. The specific process of the initialization phase of the system is described as follows:

[0034] 1) The administrator deploys the smart contract and obtains the contract address.

[0035] 2) The device registers in the edge gateway to obtain its globally unique identifier.

[0036] 3) The edge gateway acts as an agent for the registration operation of the devices in its management domain in the smart contract.

[0037] 4) Bind the administrator to the device, and the administrator adds, deletes, and updates the attributes of the device and the associated gateway an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed extensible access control authorization system and method based on a block chain. According to the scheme, the block chain smart contract is taken as a carrier, a new architecture is provided, a traditional access control model is combined, and the concept of the attribute sequence number value pair and the prefix identifier is introduced to optimize the system strategy retrieval method. According to the architecture level, an intelligent gateway is introduced between a block chain network and each management domain to serve as an access request and data request agent, and equipment registration and attributes are managed by an administrator; according to the intelligent contract level, a strategy implementation contract, a strategy contract and a strategy management contract are designed in the scheme, and authorization management is carried out on access control together; and according to the policy retrieval method level, prefix identifiers are generated for access requests and policies, bit calculation is performed on the access requests and the policies, policy preliminary matching is performed, and policy conflict configuration is introduced, so that the policy retrieval speed is greatly optimized. Therefore, compared with other access control solutions, the scheme has certain advantages.

Description

technical field [0001] The invention belongs to the field of access control technology, and relates to a distributed and scalable access control authorization scheme for attributes. The scheme proposes a new distributed architecture, combined with a traditional attribute-based access control model, and introduces attribute sequence number value pairs and prefix identifiers. The concept of the system optimizes the policy retrieval method. Background technique [0002] The privacy and security of industrial data is of paramount importance and is in the fundamental economic interest of businesses and their customers. Access control technology is one of the core technologies of data security protection. It can grant the subject access to the object according to the pre-defined access authorization policy, and effectively control the process of the subject's use of the authority, so as to realize authorized access to data and prevent unauthorized access. Information leakage. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F16/27G06F21/62G06F21/64H04L12/66H04L29/06
CPCH04L67/025H04L67/1097H04L63/10H04L63/20H04L12/66G06F16/27G06F21/64G06F21/6218H04L67/566
Inventor 陈良银黄苗岳凯峰陈彦如张媛媛王浩赵万槟石静李亚洁何秀靖
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products