Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control device and access control method therefor

A technology of access control and access control strategy, which is applied to computer security devices, instruments, computing, etc., and can solve problems such as difficult access control content

Active Publication Date: 2015-05-06
KK TOSHIBA +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the access control in the form of whether to allow actions, such as conditions such as allowed access time, access location, detailed function restrictions, etc., it is difficult to describe the content of access control in detail and flexibly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control device and access control method therefor
  • Access control device and access control method therefor
  • Access control device and access control method therefor

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0060] figure 1 It is a schematic diagram showing the access control device and its peripheral configuration according to the first embodiment. The access target resource management device 10 is connected to the access control device 20 . The access control device 20 includes an interface unit 21, a resource access unit 22, an access control execution unit 23, an access determination unit 24, an attribute management unit 25, an access control policy acquisition unit 26, an access control policy storage unit 27, an attribute update A task execution unit 28 and an access subject authentication task execution unit 29 .

[0061] Here, the resource management device 10 is a device that manages a document file of a control object or a resource constituted by an action execution unit. When the resource is a document file, it corresponds to a storage device that stores the document file. In the case of , it corresponds to an action execution device including the action execution uni...

no. 2 approach

[0135] Figure 12 is a schematic diagram showing the access control device and its peripheral configuration according to the second embodiment, Figure 13 It is a schematic diagram for explaining the operation in this embodiment, and the same reference numerals are assigned to the same parts as those in the above-mentioned drawings, and detailed description thereof will be omitted, and the different parts will be mainly described here.

[0136] That is, the second embodiment is a modified example of the first embodiment, and the procedure for acquiring attribute information and the functional parts are changed. That is, in the access control device 20 of the first embodiment, the access control execution unit 23 does not acquire attribute information from the attribute management unit 25 in step ST4, but the access determination unit 24 acquires attribute information from the attribute management unit 25 in step ST6. attribute information.

[0137] In contrast, in the access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to one embodiment, an access control apparatus suspends the resource access event prior to access of the resource access device when the resource access event is started. The access control apparatus acquires attribute information from the attribute management device by using the deny-type policy in the access control policy and decides the permission or the denial of the access based on this attribute information and the deny-type policy. The access control apparatus releases the suspension when a result of decision in the supplied access decision result is indicative of the permission and no obligation-type policy is present in the access decision response.

Description

technical field [0001] Embodiments of the present invention relate to an access control device and a storage medium. Background technique [0002] In recent years, the importance of access control technology that controls specific information and actions based on authority information has increased. For example, whether access control in the form of actions is allowed to be widely exploited. [0003] In the access control in the form of whether to allow an action, for example, there is a method in which authority information on a document file is set as a security attribute. In this method, permission information on document files is described in the form of whether to allow actions such as "permission to view" and "permission to edit", and the permission information is assigned to users. Such authorization information can be known as an access control matrix (Access Control Matrix) or an access control list (Access Control List). [0004] However, it is difficult to desc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/62G06F21/78G06F21/604
Inventor 池田龙朗冈田光司保坂范和冈本利夫
Owner KK TOSHIBA