Access control method based on attribute and rule

An access control and attribute technology, applied in the field of access control of information resources, can solve problems such as inability to meet system needs, achieve the effect of enhancing flexibility and convenience, strong practicability, and simplifying security management issues

Inactive Publication Date: 2010-06-09
SHANGHAI DIANJI UNIV
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These make manual management and assigning user roles into a terrible...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method based on attribute and rule
  • Access control method based on attribute and rule
  • Access control method based on attribute and rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Some basic concepts and definitions used in this method are as follows:

[0030] 1. User (User) is an entity that operates on resources.

[0031] 2. User Attribute (User Attribute, ua), indicating the identity and characteristics of the user. Such as user nationality (User-Country), user age (User-Age).

[0032] 3. Resource. An entity that is manipulated by a user.

[0033] 4. Resource Attribute (Resource Attribute, ra), which represents information about resource characteristics. Different resources have different corresponding attributes, and the same resource has a variety of different attribute information, such as: movie resources include movie name (Movie-Title), movie content (Movie-Content), movie language (Movie-Language) and movie release time (Movie-ReleaseDate) and other attributes.

[0034] 5. Combined attribute expression (cae), when the access strategy for a certain resource attribute is formulated by certain attributes of the user, the combination o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method based on attributes and rules, comprising the following steps: (1) according to an access strategy, drawing up a rule based on an attribute assignment role; (2) for a user making a request of accessing resources, obtaining a user attribute and the corresponding value thereof by the system according to the user information in the database; (3) according to the user attribute and the corresponding value thereof which are obtained in step (2), building a user attribute expression, and distributing a user role according to the rule made in step (1); (4) searching the corresponding permission for distributing user roles and building a combination permission so as to ensure that users can access and obtain the summarized information of resources. The invention can combine user attributes with rules and realizes an efficient access control mechanism capable of automatically distributing the user role.

Description

technical field [0001] The invention relates to an access control method of information resources, in particular to an access control method based on attributes and rules. Background technique [0002] With the rapid development and wide application of computer network technology, network information security is particularly important. Its fundamental goal is to ensure the confidentiality, integrity and availability of information in computers. Among them, access control is an important technology to ensure the security of management information. . There are many access control technologies, such as Discretionary Access Control (DAC for short), Mandatory Access Control (MAC for short), and Role Based Access Control (RBAC for short). Among them, the RBAC model is recognized as the most promising new-generation access control model for its efficient authorization management, and has been extensively studied and applied. [0003] In large enterprises, user and permission mana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/06G06F17/30H04L12/911
Inventor 朱一群
Owner SHANGHAI DIANJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products