CN114266071A - Access right control method, device, equipment and medium - Google Patents

Access right control method, device, equipment and medium Download PDF

Info

Publication number
CN114266071A
CN114266071A CN202111584039.9A CN202111584039A CN114266071A CN 114266071 A CN114266071 A CN 114266071A CN 202111584039 A CN202111584039 A CN 202111584039A CN 114266071 A CN114266071 A CN 114266071A
Authority
CN
China
Prior art keywords
attribute set
attribute
user
data
encrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111584039.9A
Other languages
Chinese (zh)
Inventor
李雨含
范渊
刘博�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN202111584039.9A priority Critical patent/CN114266071A/en
Publication of CN114266071A publication Critical patent/CN114266071A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a method, a device, equipment and a medium for controlling access authority, which comprise the following steps: acquiring an access request aiming at target encrypted data sent by a user side, wherein the access request carries a user attribute set corresponding to the user side; judging whether the user attribute set meets an authority verification condition or not based on the user attribute set and a data attribute set corresponding to the target encrypted data; and if the authority verification condition is met, returning the key of the target encrypted data to the user side so that the user side can decrypt the target encrypted data by using the key to obtain decrypted data. Thus, access control is realized based on the attributes, and the safety of data can be guaranteed.

Description

Access right control method, device, equipment and medium
Technical Field
The present application relates to the field of access right control technologies, and in particular, to a method, an apparatus, a device, and a medium for controlling access right.
Background
Currently, data sharing is an important means for maximizing data value, but the data sharing also threatens the security of data while maximizing the data value. Thus. How to share the security of data is a problem to be solved urgently at present.
Disclosure of Invention
In view of the above, an object of the present application is to provide an access right control method, apparatus, device and medium, which can improve security of shared data. The specific scheme is as follows:
in a first aspect, the present application discloses an access right control method, including:
acquiring an access request aiming at target encrypted data sent by a user side, wherein the access request carries a user attribute set corresponding to the user side;
judging whether the user attribute set meets an authority verification condition or not based on the user attribute set and a data attribute set corresponding to the target encrypted data;
and if the authority verification condition is met, returning the key of the target encrypted data to the user side so that the user side can decrypt the target encrypted data by using the key to obtain decrypted data.
Optionally, the method further includes:
determining a data attribute set corresponding to the target encrypted data and a weight corresponding to each attribute in the data attribute set;
constructing a weighted access tree based on the data attribute set and the weight corresponding to each attribute in the data attribute set; each leaf node in the weighted access tree represents an attribute, and each non-leaf node is provided with a threshold value and a first preset operation rule.
Optionally, the determining whether the user attribute set meets an authority verification condition based on the user attribute set and a data attribute set corresponding to the target encrypted data includes:
determining attributes in the user attribute set which are consistent with the attributes in the weighted access tree to obtain target attributes;
and calculating a weighted attribute value corresponding to the non-leaf node step by step based on the target attribute, the weight corresponding to the target attribute and the first preset operation rule, if the weighted attribute value is greater than the threshold value of the corresponding non-leaf node, calculating a weighted attribute value corresponding to a parent non-leaf node of the current non-leaf node until a weighted attribute value corresponding to a root node of the weighted access tree is calculated, and if the weighted attribute value is greater than the threshold value corresponding to the root node, judging that the user attribute set meets an authority verification condition.
Optionally, before returning the key of the target encrypted data to the user side, the method further includes:
calculating the target attribute and the weight corresponding to the target attribute by using a second preset operation rule to obtain a first identifier;
judging whether a second identifier consistent with the first identifier exists locally or not, and if so, triggering the step of returning the key of the target encrypted data to the user side.
Optionally, the method further includes:
and calculating each authorization attribute set by using the second preset operation rule in advance to obtain the second identifier corresponding to each authorization attribute set.
Optionally, the method further includes:
acquiring an authorization request aiming at target encrypted data sent by a user side;
and responding to the authorization request, and determining an authorization attribute set corresponding to the user side.
Optionally, the determining, in response to the authorization request, an authorization attribute set corresponding to the user side includes:
and sending authorization confirmation prompt information to the data master end, and determining an authorization attribute set corresponding to the user end when the confirmation information returned by the data master end is obtained.
In a second aspect, the present application discloses an access right control apparatus, comprising:
the access request acquisition module is used for acquiring an access request aiming at target encrypted data sent by a user side, wherein the access request carries a user attribute set corresponding to the user side;
the authority verification module is used for judging whether the user attribute set meets an authority verification condition or not based on the user attribute set and a data attribute set corresponding to the target encrypted data;
and the key returning module is used for returning the key of the target encrypted data to the user side if the permission verification module judges that the permission verification condition is met, so that the user side can decrypt the target encrypted data by using the key to obtain decrypted data.
In a third aspect, the present application discloses an electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the aforementioned access right control method.
In a fourth aspect, the present application discloses a computer-readable storage medium for storing a computer program which, when executed by a processor, implements the aforementioned access right control method.
It can be seen that, in the embodiment of the present application, an access request for target encrypted data sent by a user side is obtained first, where the access request carries a user attribute set corresponding to the user side, and then whether the user attribute set meets an authority verification condition is determined based on the user attribute set and a data attribute set corresponding to the target encrypted data, and then if the authority verification condition is met, a secret key of the target encrypted data is returned to the user side, so that the user side decrypts the target encrypted data by using the secret key to obtain decrypted data. That is, the method and the device for verifying the access user attribute acquire the user attribute set of the access user, then judge whether the user attribute set meets the authority verification condition or not based on the data attribute set corresponding to the target encrypted data, and if so, return the secret key so that the access user can decrypt the encrypted data.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of an access right control method disclosed in the present application;
fig. 2 is a schematic structural diagram of an access right control device disclosed in the present application;
fig. 3 is a block diagram of an electronic device disclosed in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, an embodiment of the present application discloses an access right control method, including:
step S11: acquiring an access request aiming at target encrypted data sent by a user side, wherein the access request carries a user attribute set corresponding to the user side.
In particular embodiments, the set of user attributes may include a role, the department of the user, and the like.
In addition, the method and the device can acquire an authorization request aiming at the target encrypted data sent by the user side; and responding to the authorization request, and determining an authorization attribute set corresponding to the user side, wherein the authorization attribute set is a subset of the data attribute set. And firstly sending authorization confirmation prompt information to the data master end, and when the confirmation information returned by the data master end is acquired, determining an authorization attribute set corresponding to the user end. That is, authorization requires consent from the data owner.
Therefore, when the user side of the authorized user sends the access request aiming at the target encrypted data, the user attribute set carried by the access request is the authorized attribute set of the user.
In addition, in a specific embodiment, after the authorization request for the target encrypted data sent by the user side is obtained, a fee payment prompting interface can be returned to the user side, so that the user can pay corresponding fees, and thus, the sharing enthusiasm of the data owner can be improved.
Step S12: and judging whether the user attribute set meets an authority verification condition or not based on the user attribute set and a data attribute set corresponding to the target encrypted data.
In a specific embodiment, a data attribute set corresponding to the target encrypted data and a weight corresponding to each attribute in the data attribute set may be determined; constructing a weighted access tree based on the data attribute set and the weight corresponding to each attribute in the data attribute set; each leaf node in the weighted access tree represents an attribute, and each non-leaf node is provided with a threshold value and a first preset operation rule. There may be multiple levels of non-leaf nodes, there may be multiple non-leaf nodes at each level, and the non-leaf node of each non-root node is also provided with a corresponding weight.
That is, in the embodiment of the present application, a weighted access tree may be first constructed based on a data attribute set corresponding to target encrypted data and a weight corresponding to each attribute in the data attribute set.
Further, in the embodiment of the present application, attributes in the user attribute set and attributes in the weighted access tree that are consistent with each other may be determined to obtain target attributes;
and calculating a weighted attribute value corresponding to the non-leaf node step by step based on the target attribute, the weight corresponding to the target attribute and the first preset operation rule, if the weighted attribute value is greater than the threshold value of the corresponding non-leaf node, calculating a weighted attribute value corresponding to a parent non-leaf node of the current non-leaf node until a weighted attribute value corresponding to a root node of the weighted access tree is calculated, and if the weighted attribute value is greater than the threshold value corresponding to the root node, judging that the user attribute set meets an authority verification condition.
It will be appreciated that a weighted access tree is used to implement access control, each non-leaf node in the weighted access tree representing a restriction gate, consisting of child nodes and a threshold through which a set of user attributes may pass when an attribute weighting value from the set of user attributes is above a set threshold. A weighted access tree is connected by a plurality of limiting gates through an AND or OR relationship, if a user attribute set finally reaches a root node, the user attribute set is proved to be in accordance with an access condition, and a user who owns the attribute set has the right to access data. The restriction gate may be set by the user owner.
It should be noted that the non-leaf nodes other than the root node are also provided with corresponding weights, for example, in the access policy tree, each leaf node l represents an attribute, and the number of child nodes contained in each non-leaf node is nl'Having a threshold value tl'Corresponding to a first predetermined operation rule fl'(x) The threshold of the non-leaf node is expressed as (n)l',tl',fl'(x)),
Figure BDA0003427314940000051
Wherein alpha is0Denotes a constant term, α1To
Figure BDA0003427314940000052
Representing the weight, x, corresponding to the respective child node1To
Figure BDA0003427314940000053
Representing the attribute value or weighted attribute value corresponding to each sub-node under the non-leaf node, and for the non-leaf node with the sub-node being a leaf node, substituting f the attribute value of the target attribute with the attribute of the user attribute set consistent with the attribute of the leaf node in the weighted access treel'(x) If the inconsistent attribute is 0, the corresponding attribute value is substituted into fl'(x) Obtaining the weighted attribute value corresponding to the non-leaf node, if the weighted attribute value is larger than the threshold value of the non-leaf node, entering the operation of the upper level, and substituting the corresponding weighted attribute value into fl'(x) If the threshold value is less than the threshold value of the non-leaf node, f is brought in when the previous-stage operation is carried outl'(x) The value of (d) is 0. In some embodiments, the constant term may not be used.
Therefore, different weights are given to different attributes, and the attributes and the corresponding weights in the user attribute set can reach the root node to access corresponding data, so that on one hand, the security of the data is guaranteed, and on the other hand, it needs to be pointed out that in a group without managers, each member is assigned with the same authority to ensure the equality of people, but after the same authority is assigned, the member may have a negative attitude in the sharing process, so that the effective data sharing cannot be performed. According to the method and the device, user access authority control is achieved based on the weighted access tree, the weight and the attribute, the shared incentive strategy can be customized based on the user attribute, for example, after data are shared, the weight corresponding to the corresponding attribute of the user can be improved, and therefore if a data owner does not set that only authorized users can access the data owner, the user has higher probability to access the data through the corresponding weighted access tree, and the problem of membership fatigue caused by identity equality of a block chain technology is solved.
Step S13: and if the authority verification condition is met, returning the key of the target encrypted data to the user side so that the user side can decrypt the target encrypted data by using the key to obtain decrypted data.
In a specific embodiment, before returning the key of the target encrypted data to the user side, the method further includes: calculating the target attribute and the weight corresponding to the target attribute by using a second preset operation rule to obtain a first identifier; judging whether a second identifier consistent with the first identifier exists locally or not, and if so, triggering the step of returning the key of the target encrypted data to the user side. The second preset operation rule can be weighted operation, so that the user attribute set is further verified, and the data security can be further improved.
It should be noted that, in the embodiment of the present application, each authorization attribute set is calculated in advance by using the second preset operation rule, so as to obtain the second identifier corresponding to each authorization attribute set.
It can be seen that, in the embodiment of the present application, an access request for target encrypted data sent by a user side is obtained first, where the access request carries a user attribute set corresponding to the user side, and then whether the user attribute set meets an authority verification condition is determined based on the user attribute set and a data attribute set corresponding to the target encrypted data, and then if the authority verification condition is met, a secret key of the target encrypted data is returned to the user side, so that the user side decrypts the target encrypted data by using the secret key to obtain decrypted data. That is, the method and the device for verifying the access user attribute acquire the user attribute set of the access user, then judge whether the user attribute set meets the authority verification condition or not based on the data attribute set corresponding to the target encrypted data, and if so, return the secret key so that the access user can decrypt the encrypted data.
Referring to fig. 2, an embodiment of the present application discloses an access right control apparatus, including:
the access request obtaining module 11 is configured to obtain an access request for target encrypted data sent by a user side, where the access request carries a user attribute set corresponding to the user side.
And the authority checking module 12 is configured to determine whether the user attribute set meets an authority checking condition based on the user attribute set and a data attribute set corresponding to the target encrypted data.
And the key returning module 13 is configured to return the key of the target encrypted data to the user side if the permission verification module determines that the permission verification condition is met, so that the user side decrypts the target encrypted data by using the key to obtain decrypted data.
It can be seen that, in the embodiment of the present application, an access request for target encrypted data sent by a user side is obtained first, where the access request carries a user attribute set corresponding to the user side, and then whether the user attribute set meets an authority verification condition is determined based on the user attribute set and a data attribute set corresponding to the target encrypted data, and then if the authority verification condition is met, a secret key of the target encrypted data is returned to the user side, so that the user side decrypts the target encrypted data by using the secret key to obtain decrypted data. That is, the method and the device for verifying the access user attribute acquire the user attribute set of the access user, then judge whether the user attribute set meets the authority verification condition or not based on the data attribute set corresponding to the target encrypted data, and if so, return the secret key so that the access user can decrypt the encrypted data.
In a specific embodiment, the apparatus further comprises:
an attribute weight determining module, configured to determine a data attribute set corresponding to the target encrypted data and a weight corresponding to each attribute in the data attribute set;
a weighted access tree determination module, configured to construct a weighted access tree based on the data attribute set and a weight corresponding to each attribute in the data attribute set; each leaf node in the weighted access tree represents an attribute, and each non-leaf node is provided with a threshold value and a first preset operation rule.
Correspondingly, the authority checking module 12 is specifically configured to determine an attribute that is consistent between the user attribute set and the weighted access tree to obtain a target attribute; and calculating a weighted attribute value corresponding to the non-leaf node step by step based on the target attribute, the weight corresponding to the target attribute and the first preset operation rule, if the weighted attribute value is greater than the threshold value of the corresponding non-leaf node, calculating a weighted attribute value corresponding to a parent non-leaf node of the current non-leaf node until a weighted attribute value corresponding to a root node of the weighted access tree is calculated, and if the weighted attribute value is greater than the threshold value corresponding to the root node, judging that the user attribute set meets an authority verification condition.
Further, the apparatus further comprises:
the first identifier operation module is used for utilizing a second preset operation rule to operate the target attribute and the weight corresponding to the target attribute before returning the key of the target encrypted data to the user side to obtain a first identifier;
and the first identification judgment module is used for judging whether a second identification consistent with the first identification exists locally or not, and if so, triggering the step of returning the key of the target encrypted data to the user side.
Further, the apparatus further comprises:
and the second identifier calculation module is used for calculating each authorization attribute set by utilizing the second preset operation rule in advance to obtain the second identifier corresponding to each authorization attribute set.
Further, the apparatus further comprises:
the authorization request processing module is used for acquiring an authorization request aiming at the target encrypted data sent by a user side; and responding to the authorization request, and determining an authorization attribute set corresponding to the user side.
And the authorization request processing module is specifically configured to send an authorization confirmation prompt message to the data master, and when obtaining the confirmation message returned by the data master, determine an authorization attribute set corresponding to the user side.
Referring to fig. 3, an embodiment of the present application discloses an electronic device 20, which includes a processor 21 and a memory 22; wherein, the memory 22 is used for saving computer programs; the processor 21 is configured to execute the computer program, and the access right control method disclosed in the foregoing embodiment.
For the specific process of the above access right control method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, and details are not repeated here.
The memory 22 is used as a carrier for resource storage, and may be a read-only memory, a random access memory, a magnetic disk or an optical disk, and the storage mode may be a transient storage mode or a permanent storage mode.
In addition, the electronic device 20 further includes a power supply 23, a communication interface 24, an input-output interface 25, and a communication bus 26; the power supply 23 is configured to provide an operating voltage for each hardware device on the electronic device 20; the communication interface 24 can create a data transmission channel between the electronic device 20 and an external device, and a communication protocol followed by the communication interface is any communication protocol applicable to the technical solution of the present application, and is not specifically limited herein; the input/output interface 25 is configured to obtain external input data or output data to the outside, and a specific interface type thereof may be selected according to a specific application requirement, which is not specifically limited herein.
Further, an embodiment of the present application also discloses a computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the access right control method disclosed in the foregoing embodiment.
For the specific process of the above access right control method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, and details are not repeated here.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The foregoing detailed description is directed to a method, an apparatus, a device, and a medium for controlling access rights provided by the present application, and a specific example is applied in the detailed description to explain the principles and embodiments of the present application, and the description of the foregoing embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. An access authority control method, comprising:
acquiring an access request aiming at target encrypted data sent by a user side, wherein the access request carries a user attribute set corresponding to the user side;
judging whether the user attribute set meets an authority verification condition or not based on the user attribute set and a data attribute set corresponding to the target encrypted data;
and if the authority verification condition is met, returning the key of the target encrypted data to the user side so that the user side can decrypt the target encrypted data by using the key to obtain decrypted data.
2. The access right control method according to claim 1, further comprising:
determining a data attribute set corresponding to the target encrypted data and a weight corresponding to each attribute in the data attribute set;
constructing a weighted access tree based on the data attribute set and the weight corresponding to each attribute in the data attribute set; each leaf node in the weighted access tree represents an attribute, and each non-leaf node is provided with a threshold value and a first preset operation rule.
3. The method according to claim 2, wherein the determining whether the user attribute set satisfies an authority check condition based on the user attribute set and a data attribute set corresponding to the target encrypted data includes:
determining attributes in the user attribute set which are consistent with the attributes in the weighted access tree to obtain target attributes;
and calculating a weighted attribute value corresponding to the non-leaf node step by step based on the target attribute, the weight corresponding to the target attribute and the first preset operation rule, if the weighted attribute value is greater than the threshold value of the corresponding non-leaf node, calculating a weighted attribute value corresponding to a parent non-leaf node of the current non-leaf node until a weighted attribute value corresponding to a root node of the weighted access tree is calculated, and if the weighted attribute value is greater than the threshold value corresponding to the root node, judging that the user attribute set meets an authority verification condition.
4. The method according to claim 3, wherein before returning the key of the target encrypted data to the user side, the method further comprises:
calculating the target attribute and the weight corresponding to the target attribute by using a second preset operation rule to obtain a first identifier;
judging whether a second identifier consistent with the first identifier exists locally or not, and if so, triggering the step of returning the key of the target encrypted data to the user side.
5. The access right control method according to claim 4, further comprising:
and calculating each authorization attribute set by using the second preset operation rule in advance to obtain the second identifier corresponding to each authorization attribute set.
6. The access right control method according to claim 5, further comprising:
acquiring an authorization request aiming at target encrypted data sent by a user side;
and responding to the authorization request, and determining an authorization attribute set corresponding to the user side.
7. The method according to claim 6, wherein the determining the corresponding set of authorization attributes of the user end in response to the authorization request comprises:
and sending authorization confirmation prompt information to the data master end, and determining an authorization attribute set corresponding to the user end when the confirmation information returned by the data master end is obtained.
8. An access authority control apparatus, comprising:
the access request acquisition module is used for acquiring an access request aiming at target encrypted data sent by a user side, wherein the access request carries a user attribute set corresponding to the user side;
the authority verification module is used for judging whether the user attribute set meets an authority verification condition or not based on the user attribute set and a data attribute set corresponding to the target encrypted data;
and the key returning module is used for returning the key of the target encrypted data to the user side if the permission verification module judges that the permission verification condition is met, so that the user side can decrypt the target encrypted data by using the key to obtain decrypted data.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the access rights control method of any of claims 1 to 7.
10. A computer-readable storage medium for storing a computer program which, when executed by a processor, implements the access right control method according to any one of claims 1 to 7.
CN202111584039.9A 2021-12-22 2021-12-22 Access right control method, device, equipment and medium Pending CN114266071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111584039.9A CN114266071A (en) 2021-12-22 2021-12-22 Access right control method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111584039.9A CN114266071A (en) 2021-12-22 2021-12-22 Access right control method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN114266071A true CN114266071A (en) 2022-04-01

Family

ID=80829703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111584039.9A Pending CN114266071A (en) 2021-12-22 2021-12-22 Access right control method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN114266071A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114900289A (en) * 2022-07-08 2022-08-12 广东瑞普科技股份有限公司 Data security processing method, system, device and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114900289A (en) * 2022-07-08 2022-08-12 广东瑞普科技股份有限公司 Data security processing method, system, device and medium

Similar Documents

Publication Publication Date Title
KR102197371B1 (en) Identity verification method and device
CN112182519B (en) Computer storage system security access method and access system
US20090076965A1 (en) Counteracting random guess attacks against human interactive proofs with token buckets
CN106789875A (en) A kind of block chain service unit, block chain service system and its communication means
CN113242230B (en) Multi-level authentication and access control system and method based on intelligent contracts
EP3336735B1 (en) Creation of a database for dynamic multi-factor authentication
WO2020207024A1 (en) Authority management method and related product
CN102479305A (en) Software licensing verification method and system
CN111143816A (en) Verification and authorization method and verification server
CN109587126A (en) User anthority identifying method and system
CN113542214A (en) Access control method, device, equipment and machine readable storage medium
CN106997440A (en) A kind of role access control method
Chai et al. BHE-AC: A blockchain-based high-efficiency access control framework for Internet of Things
CN114266071A (en) Access right control method, device, equipment and medium
CN112464213B (en) Operating system access control method, device, equipment and storage medium
CN109495514A (en) Mutual role help system and method based on edge termination
CN112468497B (en) Block chain terminal equipment authorization authentication method, device, equipment and storage medium
CN111885057B (en) Message middleware access method, device, equipment and storage medium
CN112487487A (en) Authority management method, device, equipment and storage medium for member of block chain node
CN114979281B (en) Data interaction method applied to industrial internet cloud service platform
CN114884753B (en) Data access processing method applied to industrial internet cloud service platform
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment
CN116170199A (en) Equipment access verification system based on gateway of Internet of things
CN116170806A (en) Smart power grid LWM2M protocol security access control method and system
US11275823B2 (en) Authority configuration method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination