CN110311881A - A kind of authorization method, encryption method and terminal device - Google Patents

A kind of authorization method, encryption method and terminal device Download PDF

Info

Publication number
CN110311881A
CN110311881A CN201810256498.6A CN201810256498A CN110311881A CN 110311881 A CN110311881 A CN 110311881A CN 201810256498 A CN201810256498 A CN 201810256498A CN 110311881 A CN110311881 A CN 110311881A
Authority
CN
China
Prior art keywords
participant
private key
signature
group
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810256498.6A
Other languages
Chinese (zh)
Other versions
CN110311881B (en
Inventor
杨圣磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Health Information Technology Ltd
Original Assignee
Alibaba Health Information Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Health Information Technology Ltd filed Critical Alibaba Health Information Technology Ltd
Priority to CN201810256498.6A priority Critical patent/CN110311881B/en
Priority to CN202111337963.7A priority patent/CN114205114B/en
Publication of CN110311881A publication Critical patent/CN110311881A/en
Application granted granted Critical
Publication of CN110311881B publication Critical patent/CN110311881B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application provides a kind of authorization method, encryption method and terminal devices, wherein the authorization method includes: to send access request to participant group;It receives the participant in the group and passes through the signature that the private key held generates;In the case where determining that the signature received meets full dose signature set, determination has obtained access authority, wherein the private key set that any N number of participant is held in the group is equal to private key complete or collected works, wherein N is less than or equal to the quantity of participant in the group.Private key distribution is set by using participant and the one-to-many mode of private key, it is excessive to solve existing private key and the limitation of usage scenario present in participant one-to-one correspondence mode, the problem of can not adapting to more scene demands, has achieved the effect that can satisfy more scene demands.

Description

A kind of authorization method, encryption method and terminal device
Technical field
The application belongs to Internet technical field more particularly to a kind of authorization method, encryption method and terminal device.
Background technique
Currently, being generally by the way of for signature and the encryption and decryption etc. of realizing data, each participant is held certainly Oneself private key, private key and participant are one-to-one relationships.The authentication center (CA) all trusted by all participants provides Certificate, each participant hold the certificate of corresponding public key.
Because private key and participant are one-to-one relationships, in signature, signature is verified, to data into Row encryption, during being encrypted to data, if there is N number of participant participates in signature or the participation encryption of N number of participant, It so requiring N number of participant and participates in verification, N number of participant participates in decryption, can say without what strategy, but also signature, Verification, encryption, decryption situations such as can not be adapted to it is some it is special in the case where.
In view of the above-mentioned problems, currently no effective solution has been proposed.
Summary of the invention
The application is designed to provide a kind of authorization method, encryption method and terminal device, can satisfy more scenes Authorization and encryption and decryption demand.
On the one hand a kind of authorization method is provided, comprising:
Access request is sent to participant group;
It receives the participant in the group and passes through the signature that the private key held generates;
In the case where determining that the signature received meets full dose signature set, determination has obtained access authority, wherein described The private key set that any N number of participant is held in group is equal to private key complete or collected works, wherein N is less than or equal to participant in the group Quantity.
On the other hand a kind of encryption method is provided, comprising:
Resource publication request is sent to participant group;
It receives the participant in the group and passes through the signature that the private key held generates;
In the case where the signature acknowledged receipt of meets full dose signature set, determines and has obtained resource publication permission, wherein The private key set that any N number of participant is held in the group is equal to private key complete or collected works, wherein N is less than or equal in the group join With the quantity of side;
Encryption key is generated by the full dose signature set, resource to be released is encrypted.
A kind of terminal device, including processor and for the memory of storage processor executable instruction, the processing Device realizes the above method when executing described instruction.
A kind of terminal device, including processor and for the memory of storage processor executable instruction, the processing Device realizes the above method when executing described instruction.
A kind of computer readable storage medium is stored thereon with computer instruction, and it is above-mentioned that described instruction is performed realization The step of method.
Authorization method, encryption method and terminal device provided by the present application, it is one-to-many by using participant and private key Mode is distributed private key is arranged, and limits to solve usage scenario present in existing private key and participant one-to-one correspondence mode It is excessive, the problem of more scene demands can not be adapted to, achieve the effect that can satisfy more scene demands.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the private key distribution mode schematic diagram of the embodiment of the present application;
Fig. 2 is another schematic diagram of the private key distribution mode of the embodiment of the present application;
Fig. 3 is the another schematic diagram of the private key distribution mode of the embodiment of the present application;
Fig. 4 is the another schematic diagram of the private key distribution mode of the embodiment of the present application;
Fig. 5 is the method flow diagram of the authorization method of the embodiment of the present application;
Fig. 6 is the method flow diagram of the encryption method of the embodiment of the present application;
Fig. 7 is the configuration diagram of the terminal device of the embodiment of the present application;
Fig. 8 is the structural block diagram of the authorization device of the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common The application protection all should belong in technical staff's every other embodiment obtained without creative efforts Range.
In view of why the authorization of existing signature, cipher mode have that adaptation range is not wide, is primarily due to Participant and private key are one-to-one relationships, if it is desired to completing decryption either signature check, it is necessary to participate in encryption and label Name is involved in into the decryption and authorization that can be just illustrated.
If for this purpose, one private key corresponds only in view of not corresponding only to a private key according to a this participant The mode of one participant distributes private key, and can correspond to one or more private keys using a participant, or without private Key, a private key can be possessed by one or more participants, then sign there is no need to be limited to N number of people, that This N number of people is needed just to can be carried out signature check together, just to complete to authorize.
For example, A has private key 1,2 and 3, and B has private key 1 and 2, and C has private key 2 and 3, and D has private key 3.So B and D pass through In the case that private key 1, private key 2 and private key 3 are signed, A oneself can realize signature check, and B and C also may be implemented to sign Verification, as long as gathering out private key 1, the such set of private key 2 and private key 3, so that it may realize the verification to the signature, without The people for being defined as only signing, which gathers, just can be carried out signature check.
Based on the above thinking, a kind of authorization based on signature is provided in this example, is described as follows:
In the authorization based on signature of this example, one group of private key Kn (wherein, the sum that n indicates private key) is in all ginsengs Can distribute as follows with square Pm (wherein, the sum that m indicates participant): a participant may be held wherein more Piece private key, it is also possible to without any private key, one piece of private key may only one participant hold, it is also possible to held by multiple participants Have.Each participant holds the corresponding public key Cn of all private keys.
Wherein, for participant, the process of authorization is exactly that all private keys held with oneself sign to data Process, the process for verifying permission is exactly to verify the process of all signatures, and obtain and as private key quantity and do not repeat Signature Sn.
Based on the above-mentioned private key method of salary distribution, the processes such as authorization, verification, encryption, decryption are described as follows:
1) (signature), verification (signature check) are authorized
Some resource R is held by P (wherein, P can be resource management participant, be also possible to third party), and is existed more The participant (P1 ... Pn) of a resource management, wherein P1 ... Pn held through consultation provide private key (that is, Wherein more pieces of private keys may be held according to a participant, it is also possible to which, without any private key, one piece of private key may only one ginseng With Fang Chiyou, it is also possible to private key allocation strategy be arranged by the mode that multiple participants are held).
When the visitor U (can be the participant of resource management, be also possible to third party) of resource needs to access resource R When, visitor U can first construct access request G, and access request G is sent to the participant of resource managements more as far as possible (P1……Pn)。
For the participant (P1 ... Pn) of resource management, all private keys oneself held can be used, to access Request G signs, and is signed (S1 ... Sn) with generating, and signature (S1 ... Sn) is sent back visitor U.
Since the sum of public and private key is disclosed in disclosed and all public key (certificate) is also, therefore, to work as visitor In the case that U is collected into sufficient amount of signature (S1 ... Sn, after removing repetition signature), signature is verified, thus Determine the permission for itself having obtained access resource R.
Access request and sufficient amount of signature (S1 ... Sn) are sent to P by visitor U, and P passes through disclosed public and private key Sum and disclosed public key, the signature (S1 ... Sn) of access request is verified, for example, it may be verifying quantity whether Enough, if by verifying, so that it is determined that whether visitor U has permission to access resource R.
2) it encrypts, decrypt
Some resource pool P is managed, wherein multiple participants (P1 ... Pn) are by multiple participants (P1 ... Pn) The private key provided is held through consultation, and all private keys have the sequence provided.
When resource publisher U (can be the participant of resource management, be also possible to third party) needs to issue a data D When, resource publisher U first can execute a digest algorithm Z to data D, generate abstract H (that is, request H).Resource publisher U H can will be requested to be sent to participants (P1 ... Pn) more as far as possible.Participant (P1 ... Pn) is held all using oneself Private key signs to request H, generates signature (S1 ... Sn), and signature (S1 ... Sn) is sent back resource publisher U.
It is also disclosed since the sum of public and private key is disclosed and all public key (certificate).Therefore, when resource is sent out After cloth side U is collected into sufficient amount of signature (S1 ... Sn, after removing repetition signature), signature can be verified, with Determine the permission for itself having got publication data.
Resource publisher U according to the sequence of prespecified private key, is sequentially arranged all signatures (S1 ... Sn), To obtain a unique sequence, which can be previewed into the algorithm F of definition by some, generate one symmetrically Encryption key S.Data D is encrypted by symmetric cryptographic key S, generates encrypted data E.It will request H and encryption Data E afterwards is published to resource pool P, to complete the data publication of encryption.
For the side of checking of data C, if necessary to ciphertext data, then just needing to take out request H from resource pool P With encrypted data E.And request H is sent to participants (P1 ... Pn) more as far as possible.Participant (P1 ... Pn) uses All private keys oneself held sign to request H, generate signature (S1 ... Sn), and signature (S1 ... Sn) is sent Return the data side of checking C.It is also disclosed since the sum of public and private key is disclosed and all public key (certificate).Work as data The side of checking C is collected into sufficient amount of signature (S1 ... Sn, after removing repetition signature), and verifies to signature, just Know the ability for oneself having obtained ciphertext data.
The data side of checking C arranges all signatures (S1 ... Sn) according to the sequence of preset private key, and available one Unique sequence.For this unique sequence, the algorithm F of definition can be previewed by some, and it is close to generate a symmetric cryptography Key S, the data side of checking C decrypt data E using the symmetric cryptographic key to obtain data D, and can be produced with data D by algorithm Z Whether raw new abstract H' determines whether abstract H is consistent with H', legal with verify data.
I.e., it is contemplated that validity check and encryption and decryption cannot use same group of private key to can be generated to realize encryption and decryption Symmetric cryptographic key can control what this group of private key was ordered into, the signature generated in this way is also to have in the case where encryption and decryption Sequence, the sequence of the duplicate removal signature obtained every time is also consistent, and it is close thus can to obtain symmetric cryptography based on this sequence Key SK, so as to complete encryption and decryption.
For example, determine the fixed sequence program of key in advance are as follows: private key 1, private key 2, private key 5, private key 3, private key 7, private key 4, Private key 6, then the sequence of the symmetric cryptographic key generated is namely based on private key 1, private key 2, private key 5, private key 3, private key 7, private key 4, such a private key sequence of private key 6 generates, and carries out data encryption based on this, correspondingly, when decryption, also according to this A rule, so that it may obtain key and be decrypted.
When realizing, private key can be by arbitrary policy definition holder, and is sent to other holders.Public key It can be generated by the generation side of public private key pair, to prevent ambiguity.And when realizing, all participants can be allowed all to trust CA endorsement, concurrent cloth include the certificate of public key.
The above method is illustrated below with reference to several concrete scenes, it is important to note, however, that the concrete scene is only It is not constituted an undue limitation on the present application in order to which the application is better described.
As shown in Figure 1, business scenario are as follows: participant has X and Y, and X holds private key K1 and all certificate C1 and C2, and Y holds private Key K2 and certificate C1 and C2.
So, SX is exactly the signature that private key K1 is generated, then SY is exactly the signature that private key K2 is generated, X and Y together can groups At private key and certificate complete or collected works: the verification of signature thus may be implemented in K1, K2, C1 and C2.
As shown in Fig. 2, business scenario are as follows: participant has that X and Y:X hold private key K1 and certificate C1, Y also hold K1 and certificate C1, SX and SY are identical, are all the signatures that K1 is generated.
So by X and Y either side, complete or collected works can be formed: K1.Therefore, X and Y either side can realize label The verification of name.
As shown in figure 3, business scenario are as follows: X holds private key K1 and K2, and Y holds private key K2 and K3, and Z holds private key K1 and K3. All participants all hold certificate C1, C2 and C3.
Correspondingly, signature SX includes the signature S1 and S2 that K1 and K2 is generated, signature SY includes the signature S2 that K2 and K3 is generated And S3, signature SZ include the signature S1 and S3 that K1 and K3 is generated.
So, the signature set that SX and SY include are as follows: the signature set that S1, S2 and S3, SY and SZ include be S1, S2 and The signature set that S3, SX and SZ include is S1, S2 and S3.
Therefore, also Y can complete signature check to X, and X and Z can complete signature check, and Y and Z can complete signature check, Because any two side can form complete or collected works.
As shown in figure 4, being a schematic scene, M participant altogether, wherein N number of participant can form a private Key complete or collected works.I.e., it is only necessary to by setting rule, find reasonable layout of the private key between this M participant, guarantee to have and only The set for the private key for having any N number of or N number of above participant to hold is equal to the complete or collected works of private key, then passing through any N number of ginseng Verification can be realized with side.
This application provides a kind of authorization methods, as shown in figure 5, may include steps of:
Step 501: sending access request to participant group;
Step 502: receiving the participant in the group and pass through the signature that the private key held generates;
Step 503: in the case where determining that the signature received meets full dose signature set, determination has obtained access authority, Wherein, the private key set that any N number of participant is held in the group is equal to private key complete or collected works, wherein N is less than or equal to the group The quantity of middle participant.
That is, access request is sent to participant group for authorization requests side, so that triggering participant is based on itself The private key held generates signature, as long as authorization requests side obtains enough signatures, that is, the signature set of full dose turns out Through obtaining access mandate.
After determination has obtained access authority, authorization requests side can be by the access request and full dose signature collection It closes and sends the participant request, to request access to.
Participant in above-mentioned group can include but is not limited to: resource management participant, above-mentioned access request can To include but is not limited to: resource access request.
A kind of encryption method is additionally provided in this application, as shown in fig. 6, may include steps of:
Step 601: sending resource publication request to participant group;
Step 602: receiving the participant in the group and pass through the signature that the private key held generates;
Step 603: in the case where the signature acknowledged receipt of meets full dose signature set, determination has obtained resource release right Limit, wherein the private key set that any N number of participant is held in the group is equal to private key complete or collected works, wherein N is less than or equal to described The quantity of participant in group;
Step 604: encryption key being generated by the full dose signature set, resource to be released is encrypted.
That is, needing to encrypt resource when thering is resource to be issued, it at this moment can send and provide to participant group Source posting request is obtaining enough signatures so that triggering obtains the signature that participant is generated according to own private key, that is, label In the case where name complete or collected works, determines and obtained resource publication permission, so that it may resource be encrypted and be sent out based on the signature of full dose Cloth.
In one embodiment, encryption key is generated by the full dose signature set, resource to be released is carried out It encrypts, may include:
S1: the signature in the full dose signature set is ranked up according to preset private key sequence;
S2: according to preset algorithm, ranking results are generated into symmetric cryptographic key;
S3: the resource to be released is encrypted by the symmetric cryptographic key.
When sending resource publication request to participant group, can be includes: to hold to the data to be released Row digest algorithm generates abstract;It regard abstract as resource publication request, is sent to the participant group.
Encryption key is being generated by full dose signature set, after encrypting to resource to be released, the method is also It include: to make a summary described with encrypted data publication into resource pool.
Embodiment of the method provided by the present application can execute in terminal device.Fig. 7 is that one kind of the embodiment of the present invention is awarded The hardware block diagram of power method/encryption method terminal device.As shown in fig. 7, terminal device 10 may include one or more (processor 102 can include but is not limited to Micro-processor MCV or programmable logic to a (one is only shown in figure) processor 102 The processing unit of device FPGA etc.), memory 104 for storing data and the transmission module 106 for communication function. It will appreciated by the skilled person that structure shown in Fig. 7 is only to illustrate, the structure of above-mentioned electronic device is not made At restriction.For example, terminal device 10 may also include than shown in Fig. 7 more perhaps less component or have with shown in Fig. 7 Different configurations.
Memory 104 can be used for storing the software program and module of application software, such as the authorization in the embodiment of the present invention Corresponding program instruction/the module of method/encryption method, the software program that processor 102 is stored in memory 104 by operation And module realizes authorization method/encryption of above-mentioned application program thereby executing various function application and data processing Method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetism Storage device, flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise phase The memory remotely located for processor 102, these remote memories can pass through network connection to terminal 10.On The example for stating network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmission module 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 10 provide.In an example, transmission module 106 includes that a network is suitable Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to Internet is communicated.In an example, transmission module 106 can be radio frequency (Radio Frequency, RF) module, For wirelessly being communicated with internet.
Referring to FIG. 8, it may include: first that the authorization device, which is applied in request method, apparatus, in Software Implementation Sending module 801, receiving module 802, determining module 803.Wherein:
First sending module 801, for sending access request to participant group;
Receiving module 802 passes through the signature that the private key held generates for receiving the participant in the group;
Determining module 803, in the case where determining that the signature received meets full dose signature set, determination to have obtained visit Ask permission, wherein the private key set that any N number of participant is held in the group is equal to private key complete or collected works, wherein N is less than or equal to The quantity of participant in the group.
In one embodiment, above-mentioned authorization device can also include: the second sending module, for having obtained in determination After access authority, the access request and the full dose signature set are sent into the participant and requested, to request access to.
In one embodiment, the participant in above-mentioned group may include: resource management participant.
In one embodiment, above-mentioned access request may include: resource access request.
In Software Implementation, which is applied in request method, apparatus, may include: sending module, receives Module, determining module and encrypting module.Wherein:
Sending module, for sending resource publication request to participant group;
Receiving module passes through the signature that the private key held generates for receiving the participant in the group;
Determining module, in the case where for meeting full dose signature set in the signature acknowledged receipt of, determination has obtained resource Issue permission, wherein the private key set that any N number of participant is held in the group be equal to private key complete or collected works, wherein N less than etc. The quantity of participant in the group;
Encrypting module encrypts resource to be released for generating encryption key by the full dose signature set.
In one embodiment, encryption key is generated by the full dose signature set, resource to be released is carried out Encryption may include: to be ranked up according to preset private key sequence to the signature in the full dose signature set;According to preset Ranking results are generated symmetric cryptographic key by algorithm;The resource to be released is added by the symmetric cryptographic key It is close.
In one embodiment, resource publication request is sent to participant group, may include: to described to be released Data executive summary algorithm generates abstract;It regard the abstract as resource publication request, is sent to the participant group.
In one embodiment, by the full dose signature set generate encryption key, to resource to be released into After row encryption, the method can also include: to make a summary described with encrypted data publication into resource pool.
Authorization method provided by the present application and encryption method are arranged by using the participant mode one-to-many with private key Private key distribution, thus solve existing private key and usage scenario present in participant one-to-one correspondence mode limitation it is excessive, can not The problem of adapting to more scene demands has achieved the effect that can satisfy more scene demands.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or noninvasive The labour for the property made may include more or less operating procedure.The step of enumerating in embodiment sequence is only numerous steps One of execution sequence mode, does not represent and unique executes sequence.It, can when device or client production in practice executes To execute or parallel execute (such as at parallel processor or multithreading according to embodiment or method shown in the drawings sequence The environment of reason).
The device or module that above-described embodiment illustrates can specifically realize by computer chip or entity, or by having The product of certain function is realized.For convenience of description, it is divided into various modules when description apparatus above with function to describe respectively. The function of each module can be realized in the same or multiple software and or hardware when implementing the application.It is of course also possible to Realization the module for realizing certain function is combined by multiple submodule or subelement.
Method, apparatus or module described herein can realize that controller is pressed in a manner of computer readable program code Any mode appropriate is realized, for example, controller can take such as microprocessor or processor and storage can be by (micro-) The computer-readable medium of computer readable program code (such as software or firmware) that processor executes, logic gate, switch, specially With integrated circuit (Application Specific Integrated Circuit, ASIC), programmable logic controller (PLC) and embedding Enter the form of microcontroller, the example of controller includes but is not limited to following microcontroller: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, Memory Controller are also implemented as depositing A part of the control logic of reservoir.It is also known in the art that in addition to real in a manner of pure computer readable program code Other than existing controller, completely can by by method and step carry out programming in logic come so that controller with logic gate, switch, dedicated The form of integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. realizes identical function.Therefore this controller It is considered a kind of hardware component, and hardware can also be considered as to the device for realizing various functions that its inside includes Structure in component.Or even, it can will be considered as the software either implementation method for realizing the device of various functions Module can be the structure in hardware component again.
Part of module in herein described device can be in the general of computer executable instructions Upper and lower described in the text, such as program module.Generally, program module includes executing particular task or realization specific abstract data class The routine of type, programs, objects, component, data structure, class etc..The application can also be practiced in a distributed computing environment, In these distributed computing environment, by executing task by the connected remote processing devices of communication network.In distribution It calculates in environment, program module can be located in the local and remote computer storage media including storage equipment.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It is realized by the mode of software plus required hardware.Based on this understanding, the technical solution of the application is substantially in other words The part that contributes to existing technology can be embodied in the form of software products, and can also pass through the implementation of Data Migration It embodies in the process.The computer software product can store in storage medium, such as ROM/RAM, magnetic disk, CD, packet Some instructions are included to use so that a computer equipment (can be personal computer, mobile terminal, server or network are set It is standby etc.) execute method described in certain parts of each embodiment of the application or embodiment.
Each embodiment in this specification is described in a progressive manner, the same or similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.The whole of the application or Person part can be used in numerous general or special purpose computing system environments or configuration.Such as: personal computer, server calculate Machine, handheld device or portable device, mobile communication terminal, multicomputer system, based on microprocessor are at laptop device System, programmable electronic equipment, network PC, minicomputer, mainframe computer, the distribution including any of the above system or equipment Formula calculates environment etc..
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application there are many deformation and Variation is without departing from spirit herein, it is desirable to which the attached claims include these deformations and change without departing from the application's Spirit.

Claims (11)

1. a kind of authorization method characterized by comprising
Access request is sent to participant group;
It receives the participant in the group and passes through the signature that the private key held generates;
In the case where determining that the signature received meets full dose signature set, determination has obtained access authority, wherein the group In the private key set held of any N number of participant be equal to private key complete or collected works, wherein N is less than or equal to the number of participant in the group Amount.
2. the method according to claim 1, wherein the method is also after determination has obtained access authority Include:
The access request and the full dose signature set are sent into the participant request, to request access to.
3. the method according to claim 1, wherein the participant in the group includes: that resource management participates in Side.
4. according to the method described in claim 3, it is characterized in that, the access request includes: resource access request.
5. a kind of encryption method characterized by comprising
Resource publication request is sent to participant group;
It receives the participant in the group and passes through the signature that the private key held generates;
In the case where the signature acknowledged receipt of meets full dose signature set, determines and obtained resource publication permission, wherein is described The private key set that any N number of participant is held in group is equal to private key complete or collected works, wherein N is less than or equal to participant in the group Quantity;
Encryption key is generated by the full dose signature set, resource to be released is encrypted.
6. according to the method described in claim 5, it is characterized in that, by the full dose signature set generate encryption key, it is right Resource to be released is encrypted, comprising:
The signature in the full dose signature set is ranked up according to preset private key sequence;
According to preset algorithm, ranking results are generated into symmetric cryptographic key;
The resource to be released is encrypted by the symmetric cryptographic key.
7. according to the method described in claim 5, it is characterized in that, sending resource publication request to participant group, comprising:
To the data executive summary algorithm to be released, abstract is generated;
It regard the abstract as resource publication request, is sent to the participant group.
8. the method according to the description of claim 7 is characterized in that by the full dose signature set generate encryption key, After being encrypted to resource to be released, the method also includes:
By the abstract and encrypted data publication into resource pool.
9. a kind of terminal device, which is characterized in that including processor and for the memory of storage processor executable instruction, The processor realizes method described in any one of Claims 1-4 when executing described instruction.
10. a kind of terminal device, which is characterized in that including processor and for the storage of storage processor executable instruction Device, the processor realize method described in any one of claim 6 to 8 when executing described instruction.
11. a kind of computer readable storage medium is stored thereon with computer instruction, described instruction, which is performed, realizes that right is wanted The step of seeking any one of 6 to 8 the method.
CN201810256498.6A 2018-03-27 2018-03-27 Authorization method, encryption method and terminal equipment Active CN110311881B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810256498.6A CN110311881B (en) 2018-03-27 2018-03-27 Authorization method, encryption method and terminal equipment
CN202111337963.7A CN114205114B (en) 2018-03-27 2018-03-27 Authorization method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810256498.6A CN110311881B (en) 2018-03-27 2018-03-27 Authorization method, encryption method and terminal equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202111337963.7A Division CN114205114B (en) 2018-03-27 2018-03-27 Authorization method and terminal equipment

Publications (2)

Publication Number Publication Date
CN110311881A true CN110311881A (en) 2019-10-08
CN110311881B CN110311881B (en) 2022-01-14

Family

ID=68073519

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111337963.7A Active CN114205114B (en) 2018-03-27 2018-03-27 Authorization method and terminal equipment
CN201810256498.6A Active CN110311881B (en) 2018-03-27 2018-03-27 Authorization method, encryption method and terminal equipment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202111337963.7A Active CN114205114B (en) 2018-03-27 2018-03-27 Authorization method and terminal equipment

Country Status (1)

Country Link
CN (2) CN114205114B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184960A (en) * 2020-09-28 2021-01-05 杭州安恒信息技术股份有限公司 Intelligent lock control method and device, intelligent lock system and storage medium
CN115632890A (en) * 2022-12-23 2023-01-20 北京锘崴信息科技有限公司 Secure decryption method and device for private data and financial private data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008186064A (en) * 2007-01-26 2008-08-14 Nec Corp Distributed authentication system, distributed authentication method, and distributed authentication program
CN101610514A (en) * 2009-07-23 2009-12-23 中兴通讯股份有限公司南京分公司 Authentication method, Verification System and certificate server
CN103095697A (en) * 2013-01-09 2013-05-08 华东师范大学 Multiple signature generation and verification system and method thereof
CN105406964A (en) * 2015-12-25 2016-03-16 河南城建学院 Group-oriented practical re-signature method with forward security
CN106506156A (en) * 2016-12-15 2017-03-15 北京三未信安科技发展有限公司 A kind of distributed Threshold Signature method based on elliptic curve
CN106533698A (en) * 2016-12-15 2017-03-22 北京三未信安科技发展有限公司 RSA-based distributed threshold signature method and system
CN106961336A (en) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 A kind of key components trustship method and system based on SM2 algorithms

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140115327A1 (en) * 2012-10-22 2014-04-24 Microsoft Corporation Trust services data encryption for multiple parties

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008186064A (en) * 2007-01-26 2008-08-14 Nec Corp Distributed authentication system, distributed authentication method, and distributed authentication program
CN101610514A (en) * 2009-07-23 2009-12-23 中兴通讯股份有限公司南京分公司 Authentication method, Verification System and certificate server
CN103095697A (en) * 2013-01-09 2013-05-08 华东师范大学 Multiple signature generation and verification system and method thereof
CN105406964A (en) * 2015-12-25 2016-03-16 河南城建学院 Group-oriented practical re-signature method with forward security
CN106506156A (en) * 2016-12-15 2017-03-15 北京三未信安科技发展有限公司 A kind of distributed Threshold Signature method based on elliptic curve
CN106533698A (en) * 2016-12-15 2017-03-22 北京三未信安科技发展有限公司 RSA-based distributed threshold signature method and system
CN106961336A (en) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 A kind of key components trustship method and system based on SM2 algorithms

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184960A (en) * 2020-09-28 2021-01-05 杭州安恒信息技术股份有限公司 Intelligent lock control method and device, intelligent lock system and storage medium
CN112184960B (en) * 2020-09-28 2022-08-02 杭州安恒信息技术股份有限公司 Intelligent lock control method and device, intelligent lock system and storage medium
CN115632890A (en) * 2022-12-23 2023-01-20 北京锘崴信息科技有限公司 Secure decryption method and device for private data and financial private data
CN115632890B (en) * 2022-12-23 2023-04-07 北京锘崴信息科技有限公司 Secure decryption method and device for private data and financial private data

Also Published As

Publication number Publication date
CN114205114B (en) 2023-12-29
CN110311881B (en) 2022-01-14
CN114205114A (en) 2022-03-18

Similar Documents

Publication Publication Date Title
CN112804064B (en) Attribute encryption access control system and method based on block chain
CN109450877B (en) Block chain-based distributed IDaaS identity unified authentication system
CN111797415A (en) Block chain based data sharing method, electronic device and storage medium
CN108632045A (en) A kind of block chain data processing method, device, processing equipment and system
CN108600272A (en) A kind of block chain data processing method, device, processing equipment and system
CN110601816B (en) Lightweight node control method and device in block chain system
CN109474430B (en) Cluster key generation method and device and storage medium thereof
CN110197082A (en) Data processing method, data processing equipment and computer system
CN110800250A (en) Controlled distribution of encrypted private keys
CN110365662B (en) Business approval method and device
CN104735087A (en) Public key algorithm and SSL (security socket layer) protocol based method of optimizing security of multi-cluster Hadoop system
CN112528250A (en) System and method for realizing data privacy and digital identity through block chain
CN109815747A (en) Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN111865917B (en) Block chain-based safe delivery method, system and medium for Internet of things equipment
CN109818754B (en) Method and equipment for generating keys for multiple clients and single server by client
CN110311881A (en) A kind of authorization method, encryption method and terminal device
CN109728901A (en) Digital signature authentication method, device and system
Tian et al. Accountable fine-grained blockchain rewriting in the permissionless setting
CN104202317A (en) Cloud platform data management method and system
CN110492997B (en) Encryption system, method, device and storage medium based on super account book
CN111245594B (en) Homomorphic operation-based collaborative signature method and system
CN115396087B (en) Identity authentication method, device, equipment and medium based on temporary identity certificate
CN103490890A (en) Combination public key authentication password method based on conic curves
Kaaniche et al. Id-based user-centric data usage auditing scheme for distributed environments
CN109818753A (en) Selecting a client is the method and apparatus that multi-client multiserver generates key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant