Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and cloud server for constructing role-based access control system

A cloud server, access control technology, applied in the information field, can solve problems such as low degree of automation, complex business processes, lack of business process analysis, etc., to achieve the effect of improving efficiency and high degree of automation

Active Publication Date: 2017-06-20
HUAWEI TECH CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Top-down approaches often require complex business process analysis with low automation
The bottom-up method has a high degree of automation, but due to the lack of business process analysis, the semantics of the obtained roles are not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and cloud server for constructing role-based access control system
  • Method and cloud server for constructing role-based access control system
  • Method and cloud server for constructing role-based access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0018] figure 1 is a schematic diagram of an example of an RBAC system to which embodiments of the present invention can be applied. It should be noted that figure 1 The examples are just to help those skilled in the art better understand the embodiments of the present invention, but not to limit the scope of the embodiments of the present invention. For example, in figure 1 , describes 4 users (User), 3 roles (Role) and 3 servers, but in the embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method for constructing RBAC and a cloud server. The method includes: receiving a request message from a client for requesting to construct a hierarchical RBAC role set, the request message carrying UPA data; obtaining an RBAC template, and performing role matching according to the RBAC template and the UPA data to determine the The first role set of the hierarchy; perform role mining according to the first role set and the UPA data to determine the RBAC role set; send the RBAC role set to the client, so that the client builds RBAC based on the RBAC role set system. In the embodiment of the present invention, not only the semantic accuracy of the RBAC role set can be improved and the cost can be reduced, but also the efficiency of constructing the RBAC system can be improved.

Description

technical field [0001] The present invention relates to the field of information technology, and in particular, relates to a method for constructing a role-based access control (Role-based Access Control, RBAC) system and a cloud server. Background technique [0002] Access control is a defense measure against unauthorized use of resources, and its basic goal is to ensure users' reasonable and effective access to system resources. There are roughly three methods of access control, namely the traditional discretionary access control (Discretionary Access Control, DAC) method and mandatory access control (Mandatory Access Control, MAC) method, and the popular RBAC method in recent years. Among them, the granularity of the DAC method is too fine, while the granularity of the MAC method is too coarse, and both of them have a large workload and are not easy to manage. The RBAC method is policy-neutral, and can be used to represent different types of policies including DAC and MA...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62H04L29/08
CPCG06F21/604
Inventor 魏何张新文吴晓昕
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products