Access group-based privacy protection-supporting access authorization method

A technology of privacy protection and access group, which is applied in the field of network privacy protection technology and access control, and can solve problems such as inflexible access policies and inability of visitors to join access groups independently

Inactive Publication Date: 2016-03-23
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing access control strategy is mainly the default access control strategy. The default access control strategy is the access strategy provided to the user in advance by the service provider. Such an access strategy is very inflexible, so that a large number of visitors cannot independently join the appropriate access group

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access group-based privacy protection-supporting access authorization method
  • Access group-based privacy protection-supporting access authorization method
  • Access group-based privacy protection-supporting access authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] The relevant concepts and specific descriptions of an access authorization method based on access groups that support privacy protection are given below:

[0049] (1) User: refers to the person who creates, publishes and manages private data on the Internet. For example, the owner of personal data such as "small videos", "mobile phone photo albums" and "personal status" in WeChat Moments. During the privacy setting process, they have the right to create different access groups according to their own privacy preferences.

[0050] (2) Visitor: refers to a person who can access other user data on the Internet. If a user discloses his data on the Internet, anyone can become a visitor of his data; if a user only discloses part of his data, only visitors who meet the relevant access control permissions can access the data. Use V to repr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access group-based privacy protection-supporting access authorization method. The access group-based privacy protection-supporting access authorization method includes the following steps that: existing access groups are initialized; new access groups are created in a customized manner; the access groups are dynamically distributed; and access is authorized. According to the access group-based privacy protection-supporting access authorization method of the invention, the correlation between the privacy preferences of the access groups and the attributes of accessors is analyzed, and proper access groups can be distributed for the accessors dynamically, and therefore, personalized privacy protection requirements can be satisfied.

Description

technical field [0001] The invention belongs to the field of network privacy protection technology and access control technology, and in particular relates to an access authorization method based on an access group and supporting privacy protection. Background technique [0002] With the dual development of network technology and information technology, a large amount of user privacy information is stored on the Internet, which may be maliciously attacked or stolen. How to protect user privacy information in the Internet environment has become a research hotspot at this stage, and has important theoretical and practical significance. Access control is a commonly used privacy protection method, which means that through monitoring users, legitimate users can obtain effective access control rights within a legal time, preventing unauthorized users from accessing system resources. [0003] Traditional access control is mainly divided into three categories: discretionary access ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0892H04L63/0407H04L63/10
Inventor 王海艳朱振江骆健汤涌泉赵济洲吴英强
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products