Method for solving access control in authority management

A technology of access control and rights management, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as access control that cannot meet resource diversity, achieve rich rights management connotation, increase power control, and extend The effect of management radius

Active Publication Date: 2009-07-08
INSPUR SOFTWARE CO LTD
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are generally three types of traditional access control strategies: autonomous access control methods, mandatory access control methods, and role-based access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for solving access control in authority management
  • Method for solving access control in authority management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] With reference to accompanying drawing, method of the present invention is described in detail as follows:

[0015] The method of the invention clarifies the range of user authority control by classifying resources; layering functional resources provides convenience and quickness for user authorization management.

[0016] For example: a certain role has user management permissions, and this user management function may correspond to six or seven related operations. In this case, it is very tiring to initialize the permissions of a certain role in the permission setting management interface. The thing is, in order to add a functional authority to a role, you need to set the authority of six or seven operations respectively.

[0017] In response to this situation, our model adds the concept of functions and modules before the operation. When the user authorizes, he only needs to set the modules where the above six or seven operations are located.

[0018] Resources in o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for solving access control in an authority management. Based on the RBAC model access control technology, the method divides resource fine granularity into a function resource and a data resource and achieves a centralization management and an authorization to the resource, wherein the function resource is layered designed and realized according to the system, module, function and resource, and visiting sensitive business data is performed a flexible definition and a management by the data resource type management from the business view; finally the operation page authorization is finished by a client-role-function resource authority mode and the data authorization is finished by a client-data resource mode. The method of the invention realizes the security access control of the resource in the system, module, function and resource fine granularity, effectively enriches the authority management connotation, increases the authority control force, prolongs the management size, and improves the management aspect.

Description

technical field [0001] The invention relates to a computer application technology, in particular to a method for solving access control in authority management. Background technique [0002] Information is an asset that, like other important business assets, has value to an organization and thus needs to be properly protected, the issue of information security. Information security can be achieved by implementing a set of controls. These controls may be policies, practices, procedures, organizational structures, or software functions that are established to ensure that the organization's specific security objectives are met. [0003] Access control is one of the core strategies of information security. Its task is to ensure the legal use of system resources by limiting access to resources and preventing damage caused by intrusion by illegal users or inadvertent operations by legitimate users. The core of access control is the authorization strategy, that is, in order to li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
Inventor 张晖郑婷婷李娟高浩文阮静
Owner INSPUR SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products