Access control device and access control method therefor
A technology of access control and access control strategy, which is applied to computer security devices, instruments, computing, etc., and can solve problems such as difficult access control content
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 approach
[0060] figure 1 It is a schematic diagram showing the access control device and its peripheral configuration according to the first embodiment. The access target resource management device 10 is connected to the access control device 20 . The access control device 20 includes an interface unit 21, a resource access unit 22, an access control execution unit 23, an access determination unit 24, an attribute management unit 25, an access control policy acquisition unit 26, an access control policy storage unit 27, an attribute update A task execution unit 28 and an access subject authentication task execution unit 29 .
[0061] Here, the resource management device 10 is a device that manages a document file of a control object or a resource constituted by an action execution unit. When the resource is a document file, it corresponds to a storage device that stores the document file. In the case of , it corresponds to an action execution device including the action execution uni...
no. 2 approach
[0135] Figure 12 is a schematic diagram showing the access control device and its peripheral configuration according to the second embodiment, Figure 13 It is a schematic diagram for explaining the operation in this embodiment, and the same reference numerals are assigned to the same parts as those in the above-mentioned drawings, and detailed description thereof will be omitted, and the different parts will be mainly described here.
[0136] That is, the second embodiment is a modified example of the first embodiment, and the procedure for acquiring attribute information and the functional parts are changed. That is, in the access control device 20 of the first embodiment, the access control execution unit 23 does not acquire attribute information from the attribute management unit 25 in step ST4, but the access determination unit 24 acquires attribute information from the attribute management unit 25 in step ST6. attribute information.
[0137] In contrast, in the access...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 