Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data resource authorization and authentication method, device and system based on Hash tree

A data resource and hash tree technology, applied in the field of authorization and authentication of digital resources, can solve problems such as large data volume, excessive exposure of authorization information, increase of authorization information, etc.

Pending Publication Date: 2022-04-15
CHINA TELECOM CORP LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) There may be third parties such as figure 2 The data executor shown makes the authorized access mechanism more complicated;
[0005] 2) The amount of data owned by the authorized owner is relatively large, and the independent authorization of each data will result in a multiplied increase in authorized information; and
[0006] 3) When authenticating permissions, the data to be authenticated may be submitted by the data executor, which may expose too much authorization information
Therefore, authorization information other than the authorization information to be authenticated has to be provided to the data executor, resulting in unnecessary exposure of excessive authorization information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data resource authorization and authentication method, device and system based on Hash tree
  • Data resource authorization and authentication method, device and system based on Hash tree
  • Data resource authorization and authentication method, device and system based on Hash tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. Relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0037] On the whole, the present invention uses a hash tree to construct authorization certificates that can be used for authority authentication. Figure 5 It shows an example of improved data authorization and access control according to the present invention. In this control example, the data owner authorizes multiple data resources in batches, and in the authentication process, the data user only needs to provide The authority record of the data resource to be authenticated, without providing the authority record of other data resources to be authorized in batches. In addition, an embodiment of the present invention also uses ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention at least relates to a data resource authorization and authentication method, device and system based on a hash tree. The data resource authorization method based on the hash tree comprises the following steps: constructing the hash tree based on each permission record in a plurality of permission records of a plurality of data resources; and forming an authorization certificate, wherein the authorization certificate at least comprises a root node value of the constructed hash tree.

Description

technical field [0001] The invention relates to the field of network technology and security, and more specifically to the authorization and authentication of digital resources. Background technique [0002] Authorization refers to using a criterion to determine the operations that the subject can perform on the object, and its essence is the description of the relationship between the subject, object and authority. A relatively common method is to implement authorization management through the maintenance of authorization records (also called authorization information or authority records). Authorization records describe the users (or user groups, roles) who are allowed to access a certain resource, and finally calculate whether a certain user can access the resource based on the user ID (and the user group, role to which they belong). This method is easy to implement, but there is a risk of tampering with the authorization record, and its security depends on how the autho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/32
Inventor 周旭华凌颖严梦嘉
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products