Method and device for controlling access security

An access security control and access control technology, which is applied in the field of social network services, can solve the problems of user privacy leakage and other issues, and achieve the effect of intelligent privacy policy setting, expansion flexibility and robustness, and more privacy policy setting

Active Publication Date: 2014-04-23
NEUSOFT CORP
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of the above problems, the purpose of the present invention is to provide an access security control method and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling access security
  • Method and device for controlling access security
  • Method and device for controlling access security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In the following description, for illustrative purposes, many specific details are set forth in order to provide a comprehensive understanding of one or more embodiments. However, it is obvious that these embodiments can also be implemented without these specific details. In other examples, for the convenience of describing one or more embodiments, well-known structures and devices are shown in the form of block diagrams.

[0045] In order to solve the above-mentioned problems, the present invention uses the specific method of attribute instances to record the content of each user's successful access; according to the user's preset security / privacy sensitive attribute set, domain ontology, access control ontology, and access history ontology, and Based on the policy rule generation algorithm, generate access control policy rules; based on the user's historical access content and the user’s current access request, perform context-related constraint checking. If the access r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for controlling access security, wherein the method comprises the steps of establishing semantic web technology-based domain knowledge bases (including a domain ontology base, a domain example base and a domain rule base) and access control knowledge bases (including an access control ontology base, an access history ontology base and an access control policy rule base), when a user succeeds in accessing resources in the domain knowledge bases, recording the historical contents accessed by the user by an attribute example embodying method and generating an access control policy rule simultaneously, when the same user requests for accessing to the resources in the domain knowledge bases again, determining whether the access content of the user at the present time and the historical content accessed by the user previously break the made access policy rule, and if breaking the made access policy rule, rejecting the access request of the user at the present time, otherwise, allowing the access request of the user at the present time. The method and the device can be used for solving the security and privacy disclosure problems caused by context linkage between the contents accessed a plurality of times by the same user.

Description

Technical field [0001] The present invention relates to the technical field of social network services, and more specifically, to an access security control method and device for preventing access security and privacy leakage problems caused by multiple accesses of the same user to the content. Background technique [0002] Social networking systems (SNS) are increasingly becoming an important type of online application, which can promote online social interaction and information sharing among a large number of users. Each SNS system uses various methods to encourage users to expand their social relationships through mutual interaction and content sharing. [0003] However, with the expansion of user social relationships, users continue to generate content and information into these systems. These content and information include both explicit static information, such as uploading a photo, a document, etc., as well as implicit The behavior information of users, such as the interact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6218H04L63/10
Inventor 陈德彦张霞赵宏赵立军平安蒋理成
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products