Access control method and device

A technology of permission control and permission configuration, applied in the field of network security, can solve the problem that the RBAC model cannot meet the resource flexibility requirements, and achieve the effect of reducing complexity and management overhead

Active Publication Date: 2013-01-16
ALIBABA CLOUD COMPUTING LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a permission control method and device to solve the problem that the RBAC model cannot meet the flexibility requirements of resource permission control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0048]With the development of website business, websites provide service functions in the form of services or service packages, and the applications of services and service packages are becoming more and more extensive. Based on this, this application proposes an efficient and flexible authority control method, which can directly divide business functions into authority, service and service package according to the business definition, and control the access of website resources according to this division. Of course, the method described in this application is not limited to the authority control of website resources, that is, it is independent of website business functions, and can also be applied to oth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method and device for solving the problem that an RBAC (role-based access control) model cannot meet the flexibility requirement on the access control of resources. The method comprises the following steps: an access configuration file presetting step comprising mapping the business function to be access, service and service packet in the access configuration file; an access configuration file loading step comprising mapping the access, service and service packet in the access configuration file to be access memory model data; an access judging step comprising receiving the user request and judging whether to access the user request by use of the access memory model data. Totally different from the existing RBAC model, the network resource can be directly defined flexibly based on the business, and the resource (business packet) can be packed to authorize to a user of the network, every time the user issues a request, whether the user can access to the requested resource can be determined efficiently.

Description

technical field [0001] The present application relates to network security technology, in particular to a permission control method and device. Background technique [0002] In the network environment, for a website, each URL (Universal Resource Locator, Uniform Resource Locator) is a resource of the website. Every time a user initiates a resource access request, the website needs to perform a security check on the request to confirm Whether users can take actions or view content on the site. This kind of website authorization to user behavior is called authority, and authority control is the control of the mapping relationship between users and their accessible resources. [0003] The most widely used authority control method is the role-based RBAC (Role-Based Access Control) authority control model. The RBAC model includes five basic data elements: users (USERS), roles (ROLES), target objects (OBS), operations (OPS), and permissions (PRMS). Permissions are assigned to ro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 尹俊蔺亚军
Owner ALIBABA CLOUD COMPUTING LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products