Service system-oriented and oriented object-based rights management method

An object-oriented and service-oriented technology, applied in the field of computer security, can solve the problems of inability to flexibly support enterprise security policies, single authority management, and increase the complexity of authorization management, so as to improve the authority management mechanism, reduce management overhead, and increase the complexity of authorization management. The effect of stretch

Inactive Publication Date: 2012-04-18
BEIJING JIAXUN FEIHONG ELECTRIC CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these two methods provide application developers with a complete permission management mechanism, the permission management of functions is relatively simple, and they have certain limitations when dealing with the permission management of the same function and multiple scenarios, which increases the authorization. The complexity of management cannot flexibly support the security policy of the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service system-oriented and oriented object-based rights management method
  • Service system-oriented and oriented object-based rights management method
  • Service system-oriented and oriented object-based rights management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The preferred embodiments will be described in detail below in conjunction with the accompanying drawings. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0032] Step 1: Identify the services of the target system and the functions they contain, and create the basic data required for the model in the target system database:

[0033] Convert the service in the target system to figure 2 The structure is stored in the target system database service table;

[0034] Convert the functions in the target system to image 3 The structures are stored in target system database function tables.

[0035] Step 2: Identify the attributes contained in each function of the target system, and at the same time, create the basic data required for the model in the target system database: that is, the input controls and buttons contained in the function interface,

[0036] Move the button...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service system-oriented and oriented object-based rights management method, belonging to the technical field of computer security. The method comprises the steps of: identifying the function of an operation system in the form of service; abstracting and organizing open service functions in the form of orienting an object; taking each service function as a rights management object; and enveloping the operation, the attribute and the data range which are contained by the function in the object to identify by being taken as an atomic scale rights management unit. By analyzing the scene, different views are abstracted to be taken as authorization templates of object levels. The function visibility of a user is controlled by ensuring whether the service has been distributed when authorizing, and a more perfect rights management mechanism is provided to an application developer by authorizing the rights management unit of the object level in each authorization template, thereby reducing the complexity of the authorization management and the management cost, flexibly supporting security policies of enterprises, and having great flexibility to the change of the enterprises.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an object-oriented authority management method oriented to a service system. Background technique [0002] In rights management, there are currently two main methods: [0003] 1. Service-oriented rights management [0004] 2. Role-based rights management [0005] Among the above two methods, the first method exposes business functions in the form of software services, so that other applications can use these services through published and discoverable interfaces, thereby realizing the management of user rights; the second method uses The relationship between user-role-function item is used for permission management. The role is an intermediate relationship between users and function items. The system assigns the operation authority of function items to each role, and then assigns corresponding users to each role, so as to achieve the purpose of operation authority ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/45
Inventor 马传峰
Owner BEIJING JIAXUN FEIHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products