Resource access control method

A control method and resource access technology, which is applied in the field of resource access control in B/S applications, can solve problems such as the contradiction between the granularity of permissions and the number of roles, the lack of a dynamic authorization mechanism, and the heavy workload of granting permissions to roles, etc., to achieve The effect of reducing the development burden, describing accurately and conveniently, and improving resource search efficiency

Active Publication Date: 2014-04-02
四川九洲投资控股集团有限公司
View PDF7 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) In the authorization process, the workload of assigning roles to users and granting permissions to roles is still very large;
[0005] 2) There is a contradiction between the granularity of permissions and the number of roles in large-scale systems
[0006] 3) RBAC is essentially a passive security control model, lacking a flexible dynamic authorization mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention realizes centralized resource management and resource authorization more conveniently and swiftly by introducing the concepts of dynamic authority spanning tree and Linux kernel based on binary capability on the RBAC model.

[0021] In order to better understand the present invention, a basic introduction to the design idea of ​​rights management is given below.

[0022] The RBAC (Role-based Access Control) model is currently the most widely used authority management model. This model has the characteristics of light management workload, flexible and simple, and strong scalability. It takes roles as the core and uses roles to decouple permissions and user relationships. The administrator assigns permissions to roles, and then assigns appropriate roles to users, so that users have resource permissions through the medium of roles. The present invention introduces a dynamic permission tree and the Linux kernel based on the concept of binary capabilit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a resource access control method, which comprises the steps of inputting basic information of users; performing user validity authentication; obtaining the ID (Identity) of authenticated valid users in a role list; searching a control domain of a resource-permission structure list according to the ID of the users in the role list and in combination with role-permission assignment result information; if the users have resource access permissions, extracting permission character strings and corresponding resource permission lists to dynamically generate a permission-tree and initialize a window. The resource access control method has the advantages that the permissions can be better and dynamically assigned to roles to enable software system users to interact with the system intuitively, conveniently and quickly; the database query time is shortened, the space consumption is reduced, the dependence of the application system on super users is eliminated and the security of the system is effectively guaranteed.

Description

technical field [0001] The invention relates to a resource access control method, in particular to a resource access control method in B / S applications based on FLEX and .NET. Background technique [0002] Generally speaking, in the process of transferring information resources, the three most concerned issues are "which resources need to be protected", "which subjects can access the protected resources", and "what operations these authorized subjects can perform on the protected resources". "The three types of problems correspond to three types of resources, namely subject, object and authority. In essence, access control is to manage and restrict access to system resources through subjects, objects and control strategies to prevent illegal users from entering the system and destroying information resources. , illegal use and utilization of resource information for illegal activities. To solve the above problems, three types of access control technologies can be applied, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 许军刘念林王德鹏李汶隆
Owner 四川九洲投资控股集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products