Method for protecting privacy based on access control

A privacy information and access control technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve privacy protection and other issues, and achieve the effects of preventing leakage, easy implementation, strong versatility and practicability

Inactive Publication Date: 2009-06-24
BEIJING UNIV OF TECH
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the present invention can be compatible with the existing access control mechanism to form a general privacy information protection method to solve the problem of privacy protection in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy based on access control
  • Method for protecting privacy based on access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In this implementation example, the hospital protects the medical record information of patient A as an example. Patient A's medical record information is private information that needs to be protected, that is, object o; the medical record information is stored in the server of the hospital, and all access to private information is controlled by the server. The medical record information of patient A involves the privacy of the hospital and patient A, therefore, there are two privacy subjects: hospital s’ 1 , Patient As' 2 ;Here consider the situation where doctors and nurses access medical record information, that is, the subjects are: doctor s 1 , nurses 2 .

[0029]First, the privacy subject hospital and patient A respectively set the access control policies for different subjects to access medical record information. Usually, the privacy access policy set by the hospital is often aimed at all patient medical record information, so it is relatively loose, so tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A privacy information protecting method based on access control belongs to computer network security field and is used in network application whose privacy information needs to be protected in the Internet. The invention expands the access right to privacy access right; when setting the right, conditions which need to be satisfied when authorizing the right are added; and a user is allowed to control the privacy information at real time, thus increasing the flexibility of the user to control the privacy information. Furthermore, all the entities relevant to the privacy information are added into the access control as privacy subjects, so that all the relevant subjects can set access control strategies for privacy information protection according to privacy information protection requirements. Accesses to the privacy information are controlled according to the strategies of the privacy subjects, which makes the privacy information protection method more perfect, thus avoiding all invasions of privacy of the user. The privacy information protecting method gives consideration to the distinctive features of privacy information protection, namely the flexibility and integrity required in privacy protection, and fully guarantees the rights and interests of the user.

Description

technical field [0001] The invention relates to a privacy information protection method based on access control in a network environment. The achievements of the invention can be used in network applications that need to protect private information in the Internet. Background technique [0002] In a sense, the protection of private information is to control the access of private information, so that users can control the flow of private information. In the access control method, the protected information is called the subject O, and the entity that accesses the protected information is called the object S. A subject and an object correspond to a set of access rights R, that is, the subject can execute in the access process All actions on the object. By setting the access rights related to the subject and object, also called the access control policy P, to control the subject's access to the object. [0003] In the existing private information access control methods, the o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56
Inventor 何泾沙徐菲徐晶吴旭
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products