Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access control model as well as method and terminal thereof

A technology of network access control and model, applied in the field of network

Inactive Publication Date: 2015-06-10
PLA UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the above method, the user's authority still needs to be set by the administrator, and there is still the problem of access by unfamiliar users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control model as well as method and terminal thereof
  • Network access control model as well as method and terminal thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Such as figure 1 As shown, the network access control policy model proposed in the preferred embodiment of the present invention includes RBAC ontology, user module, session module, role module, authority module and rule module, wherein the rule module is used to realize user module, role module, The derivation between or within the permission modules can automatically assign the corresponding relationship between users and roles, roles and permissions, and the assignment of roles can also be restricted according to actual needs.

[0019] The modules mentioned in this embodiment can be software, hardware, firmware, or a combination thereof that independently implements a specific function, such as programs, storage media, integrated circuits, etc., and can also be stored in the same network entity or in a distributed manner. In different network entities, the present invention is not necessarily limited to specific implementation manners. Each module is described in de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network access control model as well as a method and a terminal thereof, used for allocating appropriate access right to a user who accesses a network resource. The network access control model comprises a user module, a right module, a character module, a body module, a rule module and a session module, wherein the user module is used for extracting at least one attribute of the user; the right module is used for defining one permission for execute one action to a protected object and defining a plurality of access rights to the network resource; the character module defines a plurality of characters, a plurality of access rights are preset for each character; the body module at least defines the attribute of the user; the rule module at least defines one rule, wherein the rule is used for allocating a matched character to the user based on the attribute, so that the user can access the network resource; and the session module is used for establishing, maintaining and cancelling association between the user and the matched character. By the network access control model as well as a method and a terminal thereof disclosed by the invention, appropriate access rights can be dynamically allocated to a strange access user, thus security of network access is enhanced.

Description

technical field [0001] The invention relates to network technology, in particular to a method and system for controlling access to network resources. Background technique [0002] In Web services, service requests and responses are usually transmitted through Simple Object Access Protocol (Simple Object Access Protocol, SOAP) messages based on HyperText Transport Protocol (HyperText Transport Protocol, HTTP), which makes traditional network layer firewalls view SOAP messages as Legal application layer protocol. If illegal users access unprotected Web services through SOAP messages, it may lead to unauthorized access and even bring harm to internal applications. In addition, some Web services may only be open to specific user groups, and only authenticated and authorized requesters can access the corresponding services. Therefore, effective access control to service requests is an important problem to be solved in Web service applications. [0003] The web service environm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 吴礼发李华波曾晓光郑成辉赖海光贺正求
Owner PLA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products