Access control method based on attribute-based access control policy

An access control strategy and access control technology, applied in the network field, can solve problems such as inconsistency between old and new permissions, time-consuming efficiency, etc., and achieve the effect of high error rate and improved efficiency

Active Publication Date: 2015-10-07
INST OF INFORMATION ENG CAS
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the conversion of access control in the database, there is no unified tool that can automatically perform the conversion to achieve the conversion. In the past, the conversion wa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method based on attribute-based access control policy
  • Access control method based on attribute-based access control policy
  • Access control method based on attribute-based access control policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0029] This solution intends to implement an access control conversion mechanism between the Internet of Things search engine and the third party, and transform the third party's role-based access control into the attribute-based XACML access control commonly used in the Internet of Things. In this way, the Internet of Things search engine can quickly respond to the search request according to the XACML access control and the database data submitted by the third party.

[0030] A complete role-based access control model such as figure 1 As shown, UA represents the mapping relationship between users and roles, PA represents the mapping relationship between roles and permissions, and session S is generated when users ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method based on an attribute-based access control policy. The method is characterized by 1) extracting attribute information of a user-role table and a role-authority table in a database and generating a user-role-authority access control relation Hash table; 2) generating an access control policy according to the access control relation Hash table: carrying out iteration traversal on the access control relation Hash table to obtain key value pairs, that is, an attribute set of each user and authority thereof, and then, generating an access control policy rule of the user according to the authority attribute of the user; and 3) for each received access request, an internet-of-thing search engine judging the access request according to the access control policy rule to determine whether access is allowed. The method can give a quick response to the search request, thereby greatly improving efficiency of the internet-of-thing search engine.

Description

technical field [0001] The invention belongs to the field of network technology, and in particular relates to an access control method based on an attribute access control strategy. Background technique [0002] The background of the present invention is that in the Internet of Things search environment, when a user searches for third-party data, in order to protect the privacy of the user, the Internet of Things search engine cannot tell the third-party user information, so the third-party database data and its role-based access control The policy is submitted to the Internet of Things search engine, and the Internet of Things search engine judges the user's access rights to resources and returns a response to the user. There are various third-party access controls. However, the access control commonly used in the Internet of Things is attribute-based access control. If the third party can convert the access control strategy and data to the Internet of Things search engine ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/101
Inventor 郭云川汤伟强殷丽华李超
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products