A method and system for implementing resource personalized security access control

A secure access and resource technology, applied in the field of communication, can solve problems such as low efficiency, difficulty in development and deployment, and poor resource service user experience, and achieve the effects of easy development, improved satisfaction, and easy deployment

Inactive Publication Date: 2011-12-28
ZTE CORP
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] First, there is a lack of effective support for personalized security services for resources
[0011] Secondly, there is a lack of effective support for the continuity and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for implementing resource personalized security access control
  • A method and system for implementing resource personalized security access control
  • A method and system for implementing resource personalized security access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In practical applications, a system capable of realizing personalized security access control of resources in the Internet of Things can be provided, including:

[0057] The security management module is used for the input and management of the basic security policy parameters of the system security policy module, the self-organization authentication module and the self-organization authorization module.

[0058] The context awareness module is used to receive user resource access requests, and receive, process and send the user's environment, various resource states related to user access requests, and other related events and object contexts. The context awareness module at least includes but is not limited to sensor group awareness components, user role awareness components, resource awareness components, event processing components, event drive components and application layer interfaces.

[0059] The security policy module is configured to receive the basic paramet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and system for realizing resource individualized security access control, which can obtain the characteristic identity information associated with the user by the context awareness module, as well as the environment and resource capability characteristic information associated with the identity information; the change of the characteristic information After the situation is filtered and processed by the context awareness module, a corresponding event is formed and notified to the security policy module. The security policy module determines the real-time security policy of the user based on the change of the user context and the set of basic security policies; During the configurable life cycle of the policy, the authentication module and the authorization module obtain the user's real-time security policy from the security policy module, and dynamically update the user's authentication mechanism and authorization mechanism accordingly. The method and system of the present invention combine user context awareness technology with corresponding user real-time security policies, and can effectively support the continuity and dynamics of Internet of Things resource security services.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and system for realizing resource individualized security access control. Background technique [0002] The Internet of Things is a highly complex and heterogeneous network. The Internet of Things fully embodies the deep integration of the physical world and the information space, enabling humans to integrate into an integrated intelligent ecological environment and realize the collaboration and unity of humans, machines, and things. [0003] Context-aware computing is one of the important technologies in the field of computer applications. Since this technology can significantly enhance the intelligence of computer applications, it has become one of the hot research fields since the late 1990s. With the development of Internet of Things technology in recent years, the popularization of intelligent perception and intelligent control ideas in the living environment, as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/00H04W12/63
Inventor 王世彤
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products