Method and system for controlling access rights

A control method and control system technology, applied in the field of network security, can solve problems such as inability to control super user rights, and achieve the effect of improving security and reliability

Active Publication Date: 2014-02-12
DAWNING CLOUD COMPUTING TECH CO LTD
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem that the authority of super users cannot be controlled in the related art, the present invention proposes an acc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling access rights
  • Method and system for controlling access rights
  • Method and system for controlling access rights

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0035] According to an embodiment of the present invention, a method for controlling access authority is provided.

[0036] Such as figure 1 As shown, the access authority control method according to the embodiment of the present invention includes:

[0037] Step S101, extracting the user tag of the accessing party that requests access to the access object, wherein the access object is pre-configured with a user tag and a permission tag corresponding to the user tag;

[0038] Step S103, acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for controlling access rights. The method includes the steps of firstly, extracting a name tag of an access party which requests to conduct access operation on an access object, wherein name tags and right tags corresponding to the name tags are preset in the access object; secondly, determining whether the access party passes validation or not according to the preset name tags and the extracted name tag, and determining that the access party passes the validation if the extracted name tag is consistent with one of the preset name tags; thirdly, determining whether the access party has the access right to conduct access operation on the access object or not according to the right tag corresponding to the extracted name tag. According to the method and system for controlling the access rights, the access rights of all users are effectively controlled, the problem that an existing related technology can not limit super users is solved, and safety and reliability of the system are improved.

Description

technical field [0001] The present invention relates to the field of network security, in particular to an access authority control method and control system. Background technique [0002] The access control adopted in the Linux system is a single autonomous access control based on the access mode bit of traditional UNIX. When realizing this function, the access control code of the system is hashed in the core, and there is no unified access control module and corresponding interface, lacks the corresponding flexibility, scalability and ease of maintenance, and cannot customize the access control strategy of the system. [0003] Currently, there is a technology that can implement corresponding rights management, that is, ACL (Access Control List). The so-called ACL is an access control list of a file / directory, which can assign RWX permissions to any specified user / group, and can realize detailed permission management of a file through some command configurations. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 欧阳涛田勇孙征孙国忠
Owner DAWNING CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products