Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure web page tag library system supported by multiple strategies

A security label, multi-policy technology, applied in instruments, computing, electrical digital data processing, etc., can solve the problems of no control-level fine-grained access control, lack of policy integration support, inability to meet security levels, etc., to achieve reusability Strong, flexible authentication method, convenient secondary development effect

Inactive Publication Date: 2009-09-30
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it does not provide control-level fine-grained access control; in actual engineering, RBAC may need to cooperate with other mechanisms, and Acegi lacks support for policy integration
It cannot meet the mandatory access control requirements such as security level, and the protection of data resources mainly depends on the protection of Web pages, business methods or domains, which is still not flexible enough
The security label is only convenient for the collection and use of authentication and authorization information, and has no more meaning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure web page tag library system supported by multiple strategies
  • Secure web page tag library system supported by multiple strategies
  • Secure web page tag library system supported by multiple strategies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Below in conjunction with accompanying drawing and example the present invention is described in further detail.

[0034] Such as figure 1As shown, the secure Java Web application page label library system that provides multi-policy support provided by the present invention includes a secure login module 100, a security context service module 200, a policy definition module 300, a Web security server component 400, a Web security response generator 500 and Security tag library 600 .

[0035] The security tag library 600 defines a set of security tags that can be imported in various Java Web pages. By directly defining the security components corresponding to the tag library in the page, developers can quickly and intuitively develop security components that meet various practical engineering requirements. The required web application module, and by setting the unique security ID of each security label in the policy document, can easily define various security rules bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secure Java Web application page tag library system supported by multiple strategies comprises a secure logging module, a secure context service module, a strategy definition file, a Web secure server subassembly, a Web security responding generator, a secure tag library and a responding page. The secure Java Web application page tag library system can provide various page tags controlled by secure access on a Web page and basically contains expression forms of all page tags in a JSP tag library, thereby providing a set of high-efficiency integral page developing tag library with a secure access control function for developers. The secure Java Web application page tag library supported by multiple strategies can not only accomplish a basic page HTML control component display function but also display visible and available resources of a user according to the own authority of the user after being installed, and the developers need not carrying out extra coding work.

Description

technical field [0001] The invention belongs to computer information security technology, and in particular relates to an access control-based Web page security tag library. The system is an improvement to the existing Web page tag library, and can perform security control on various page elements on the Web page. According to the authorization of each website to the user, the page elements will display specific content according to the user's authority. Background technique [0002] With the continuous development and improvement of software design technology, especially the higher and higher requirements for the efficiency and agility of Web application development, rapid application development technology (RAD, RapidApplication Development) has increasingly become a hot technology in the field of actual engineering development. The core idea of ​​RAD is to develop powerful applications through a set of reusable components. Well-known Visual Basic, PowerBuilder, and Dephi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F17/30
Inventor 李瑞轩卢正鼎刘彬唐卓鲁剑锋胡劲纬
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products