Dynamic access control method of pervasive computing

An access control and pervasive computing technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of not considering unfamiliar subjects, access control, and not considering the characteristics of information space and physical space at the same time, so as to achieve simplification Authorization decision, effect of ensuring security

Inactive Publication Date: 2007-09-19
HUAZHONG NORMAL UNIV
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It solves the problem that traditional access control cannot handle distributed authorization, but this capability-style system cannot really solve the distributed authorization feature, it does not solve why trust
Now some researchers have made some useful explorations on access control in ubiquitous computing and related fields, but they have not considered how to control access to unfamiliar subjects, have not considered the characteristics of information space and physical space, and the existence of an authorization process too complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic access control method of pervasive computing
  • Dynamic access control method of pervasive computing
  • Dynamic access control method of pervasive computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] According to the hierarchical trust model, the present invention realizes dynamic access control by extending the role-based access control model.

[0039] The service provider evaluates the basic trust value T of the service requester a .

[0040] Trust value T a Formation Referring to Figure 1, the service requester initiates a service request 10; the service provider requires the service requester to provide some attributes 11 according to the trust policy of the accessed service; the service requester presents these attributes 12, or in order to protect its own sensitive attributes, Before presenting these attributes, the service provider needs to display certain attributes 13, and when its own attribute access policy is satisfied, the service requester provides attributes 14 to the other party.

[0041] Subject-based trust value T a , the principal is assigned a set of roles.

[0042] Refer to Figure 2 for user role assignment, according to the user's trust val...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an access control method for common computing environment. The method realizes dynamic access control by combining a hierarchy credit mode with a role-based access control mode. The hierarchy credit mode is a structure with two hierarchies, wherein the bottom credit value determines the role assignment; the upper credit value determines the role activation and the permitted activation. The upper credit value is related to applied context, different upper credit values correspond to different activated roles and permission, thus the obtained service is different. The method is mainly applied in solving the problem of authorization in common computing environment as well as in realizing access control to the applied resources in other dynamic environments.

Description

Technical field [0001] The invention relates to a dynamic access control method, which is mainly used to solve the authorization problem in the pervasive computing environment. Background technique [0002] Ubiquitous computing is the fusion of information space and physical space. In this fusion space, people can obtain digital services transparently anytime and anywhere. But this ubiquitous and mobile environment brings new security concerns. Due to the unpredictability of the subjects that cooperate with each other, traditional access control technologies for static networks or closed systems cannot be used in pervasive computing environments. [0003] One of the main features of ubiquitous computing is the rich interactive interface between users and resources, which can use a variety of multimedia input and output methods to participate in the operation, management and maintenance of smart spaces. Due to the nature of the way users interact, it is unlikely that a smar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 郭亚军王玉林陈丽华刘庆华李洪力
Owner HUAZHONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products