Decision method for access control and equipment

An access control strategy and access control technology, applied in the field of communication

Active Publication Date: 2015-07-29
CHINA ACAD OF TELECOMM TECH
View PDF4 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a decision-making method and device for access control, which are used to solve the problem of how to combine multiple access control strategies to meet the requirements for access control in the oneM2M system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decision method for access control and equipment
  • Decision method for access control and equipment
  • Decision method for access control and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0252] Embodiment 1. This embodiment will cover three methods of policy acquisition in practical applications: (1) Acquisition is used by an access control system (that is, a system including PEP, PDP, PAP, PIP, etc.) decision) centrally managed global access control policy, (2) obtain the resource access control policy directly associated with the resource accessed by the visitor (that is, the user device), (3) obtain the resource access control policy carried in the access control token provided by the visitor The access control policy related to this resource access.

[0253] In this embodiment, three different policy description methods will be used to describe three different access control policies respectively, and how to deal with the evaluation and integration of heterogeneous policies will be introduced accordingly.

[0254] The application scenarios of this embodiment are as follows:

[0255] The address of the resource in the oneM2M system that the user Alice requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a decision method for access control and equipment. The objective of the invention is to satisfy requirements for access control in one machine-to-machine (M2M) system. The methods includes the following steps that: a policy decision point (PDP) receives a first request transmitted by a policy execution point (PEP), and generates a second request according to information which is carried by the for the first request and is relates to resource access of user equipment, and transmits the second request to a policy access point (PAP), wherein the second request is used for requesting the policy access point (PAP) to determine a resource access control scheme for resources accessed by the user equipment; and the policy decision point (PDP) receives the resource access control scheme returned by the policy access point (PAP) and assess the first request according to policies carried by the resource access control scheme; and the policy decision point (PDP) performs computation an obtained assessment result according to a logical computation relationship carried by the resource access control scheme, so as to generate an access control result and transmits the access control result to the policy execution point (PEP).

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an access control decision-making method and equipment. Background technique [0002] The International Organization for Standardization of the Internet of Things (oneM2M; Machine to Machine, machine to machine) is a standard for the interconnection of IoT devices and systems, and its standardization work is the device interconnection protocol for the service layer. oneM2M defines four basic types of nodes, namely Application Dedicated Node, Application Service Node, Middle Node, and Infrastructure Node. [0003] Application-specific nodes do not have service functions, such as smart meters; application service nodes have service functions and can provide certain service functions to other types of nodes, such as device and data management. Application service nodes can be located in various devices in the Internet of Things; Intermediate nodes are used to provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 周巍徐晖
Owner CHINA ACAD OF TELECOMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products