Method for protecting privacy based on access control

A privacy information and access control technology, applied in the direction of digital transmission systems, electrical components, transmission systems, etc., can solve privacy protection and other issues, and achieve the effects of leakage prevention, strong versatility and practicability, and easy implementation

Inactive Publication Date: 2011-11-09
BEIJING UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the present invention can be compatible with the existing access control mechanism to form a general privacy information protection method to solve the problem of privacy protection in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting privacy based on access control
  • Method for protecting privacy based on access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In this embodiment, the hospital protects the medical record information of patient A as an example. Patient A's medical record information is private information that needs to be protected, namely object o; medical record information is stored in the hospital's server, and all access to private information is controlled by the server. Patient A's medical record information involves the privacy of the hospital and patient A. Therefore, there are two privacy subjects: hospital s' 1 , patient A s’ 2 ; Here consider the situation that doctors and nurses access medical record information, that is, the subjects are: doctor s 1 , nurses 2 .

[0030]First, the privacy subject hospital and patient A respectively set access control policies when different subjects access medical record information. Usually, the privacy access policy set by the hospital is often for all patient medical record information, so it is relatively loose, so as to facilitate doctors and nurses to pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A privacy information protecting method based on access control belongs to computer network security field and is used in network application whose privacy information needs to be protected in the Internet. The invention expands the access right to privacy access right; when setting the right, conditions which need to be satisfied when authorizing the right are added; and a user is allowed to control the privacy information at real time, thus increasing the flexibility of the user to control the privacy information. Furthermore, all the entities relevant to the privacy information are added into the access control as privacy subjects, so that all the relevant subjects can set access control strategies for privacy information protection according to privacy information protection requirements. Accesses to the privacy information are controlled according to the strategies of the privacy subjects, which makes the privacy information protection method more perfect, thus avoiding all invasions of privacy of the user. The privacy information protecting method gives consideration to the distinctive features of privacy information protection, namely the flexibility and integrity requiredin privacy protection, and fully guarantees the rights and interests of the user.

Description

technical field [0001] The invention relates to a privacy information protection method based on access control in a network environment. The achievements of the present invention can be used for network applications in the Internet that need to protect private information. Background technique [0002] In a sense, the protection of private information is to control the access of private information, so that users can control the flow of private information. In the access control method, the protected information is called subject O, the entity accessing the protected information is called object S, and a subject and an object correspond to a set of access rights R, that is, during the access process, the subject can execute All actions on the object. The access of the subject to the object is controlled by setting the access rights related to the subject and the object, also called the access control policy P. [0003] In the existing private information access control m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/56
Inventor 何泾沙徐菲徐晶吴旭
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products