Privilege management system and method

A permission management and permission technology, applied in the field of information security, can solve problems such as waste of manpower and material resources, modify or cancel permissions, increase system risks, etc., achieve low difficulty and complexity, ensure timeliness, and ensure security. Effect

Inactive Publication Date: 2010-02-03
国家信息中心
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen from the above that in the existing authority management system, the grant and cancellation of user authority need to be manually operated by the administrator, and the automatic cancellation of authority cannot be realized.
That is to say, after the authorization, the administrator needs to monitor, modify or reset the authority, which not only increases the difficulty and complexity of authority management, but also leads to a great waste of manpower and material resources.
Especially in the case of a large number of personnel and frequent cancellation of authority, this defect is particularly prominent
[0006] In addition, in the existing rights management system, the administrator needs to manually intervene to cancel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privilege management system and method
  • Privilege management system and method
  • Privilege management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]The technical core of the present invention is: adding time-constrained authorization on the basis of the existing authorization method, that is, when authorizing the user, while granting the user's authority, it also adds a time-constrained condition to the authority, and includes the time-constrained The authorization results of the conditions are published to the directory server. In this way, when the access control module provides access control services for the business, it not only needs to retrieve whether there is a binding relationship between the user identity and the corresponding resource, but also needs to judge the time constraints contained in it. If the current access time satisfies Only when the time constraints are met, the access control is allowed, and the business system can display the corresponding resource information for the user; on the contrary, if the current access time does not meet the time constraints, even if the binding relationship betw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privilege management system, wherein a privilege management module is used for managing establishment of authorization strategy and distribution of privilege and setting a time constraint condition for relative privilege during authorization according to actual needs; an attribute certificate signing module signs an attribute certificate according to a binding relationship and the time constraint condition between a user and the privilege; a catalogue server stores the attribute certificate and user information; and an access management module establishes a safety mechanism between the user and a target resource, carries out privilege authentication according to the attribute certificate and the user information when the user tries to access the target resource todetermine whether the user is allowed to access the target resource or not, thereby protecting the safety of the target resource. In addition, the invention discloses a privilege management method. The privilege management system and method can conveniently carry out setting and automatic cancel on the privilege in time, thereby lowering the difficulty and the complexity of the privilege management and also the system risk.

Description

technical field [0001] The present invention relates to information security technology, in particular, to a system and a related method for managing user rights. Background technique [0002] With the development of information technology, many enterprises and institutions have realized information management, and implement user authority management according to the department and position of employees. The so-called user rights management refers to the management of the rights of users to access / use the system. [0003] Usually, when the existing user rights management system designs authorization management, the mainstream method is based on role policy management, which comprehensively and safely solves the management of various elements of user authorization management, the formulation of various authorization strategies and the Management functions such as the distribution of various permissions. The so-called role refers to the collection of permissions in the appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 李新友吴亚非任金强陈晨
Owner 国家信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products