METHOD AND APPARATUS FOR CONTROLLING ACCESS TO DATA BASED ON LAYER
First Claim
Patent Images
1. An access control apparatus, comprising:
- a terminal authentication unit to acquire identification (ID) information and a public key (PK) of a terminal;
an encryption unit to encrypt a node key (NK) of a target layer to grant access authority to the terminal using the PK of the terminal;
an Access Control List (ACL) production unit to produce an ACL of the target layer based on the encrypted NK and the ID information of the terminal; and
an ACL copy production unit to produce a copy of the ACL based on link information of the encrypted NK and the ID information of the terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is an access control apparatus and method for giving access authority with respect to data. The access control apparatus may encrypt, using a Public Key (PK) of a terminal, a Node Key (NK) of a target layer in which the access authority is to be granted to the terminal, and produce an Access Control List (ACL) of the target layer based on the encrypted NK and ID information of the terminal. Also, the access control apparatus may produce a copy of the ACL based on the produced ACL, and store the produced copy of the ACL in a lower layer.
21 Citations
24 Claims
-
1. An access control apparatus, comprising:
-
a terminal authentication unit to acquire identification (ID) information and a public key (PK) of a terminal; an encryption unit to encrypt a node key (NK) of a target layer to grant access authority to the terminal using the PK of the terminal; an Access Control List (ACL) production unit to produce an ACL of the target layer based on the encrypted NK and the ID information of the terminal; and an ACL copy production unit to produce a copy of the ACL based on link information of the encrypted NK and the ID information of the terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An access control method, comprising:
-
acquiring identification (ID) information and a public key (PK) of s terminal to authenticate the terminal; encrypting an node key (NK) of a target layer to grant access authority to the terminal using the PK of the terminal; producing an Access Control List (ACL) of the target layer based on the encrypted NK and the ID information of the terminal; and producing a copy of the ACL based on link information of the encrypted NK and ID information of the terminal. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of controlling access to a data layer, the method including:
-
encrypting a node key (NK) of a target data layer using a public key (PK) of a terminal; and producing an Access Control List (ACL) based on the encrypted NK and ID information of the terminal; wherein the ACL applies only to the target data layer in a plurality of data layers to which access is controlled by a common controller. - View Dependent Claims (22, 23, 24)
-
Specification