Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for resource access

A resource access and resource technology, applied in the information field, can solve the problems of inability to ensure access control of the requested device, redundant content, and inability to confirm the permission of the requested device.

Active Publication Date: 2019-08-13
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the content of the access control policy resource is lengthy, and the process of creating and updating the access control policy resource by the device to which the access control policy resource belongs is very complicated
In addition, directly adding group resource identifiers and corresponding permissions to the access control policy resources, since the requesting device accessing the accessed resources is not a group device, the permissions of the requesting device cannot be confirmed, and the request cannot be ensured. Access control of the device to the accessed resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for resource access
  • Method and device for resource access
  • Method and device for resource access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0111] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0112] An embodiment of the present invention provides a method for resource access, and the method is applied in a machine-to-machine communication (M2M) system. The method embodiment describes a processing flow of a device to which an accessed resource belongs. Such as figure 1 shown, including the following steps:

[0113] Step 102: Receive an access request from a requester resource to an accessed resource, wherein the access request includes the i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the communication field, and provides a method and device for resource access in machine communication. The method for resource access in machine-to-machine communication includes: receiving an access request from a requester resource to an accessed resource, wherein the access request includes the identifier of the accessed resource, the identifier of the resource of the requester, and the requested operation on the accessed resource; The identifier of the accessed resource determines the accessed resource; obtains the access control policy resource of the accessed resource; determines that the requester resource is one of the access control policy resources that has the operation authority for the requested operation The group resource identifies a group member of the corresponding group resource; and executes the requested operation on the accessed resource. The present invention implements group-based access control on resources by judging whether the requester resource is a group member of the group resource with operation authority.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a resource access method and device. Background technique [0002] Machine-to-Machine Communications (M2M) is a networked application and service centered on machine intelligence interaction. It embeds wireless or wired communication modules and application processing logic inside the machine to realize the user's informatization requirements for monitoring, command and dispatch, data collection and measurement. In the M2M system, various M2M devices, such as various sensors, are directly connected to the M2M service platform through the M2M gateway, so as to realize various M2M services. Such as electricity meter reading, smart home, etc. Through the service capability provided by the M2M service platform, the data collected by the M2M device can be obtained, or the M2M device can be controlled and managed. [0003] In the existing M2M specification, using the RE...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/08H04W4/70H04W4/00
CPCH04W4/00
Inventor 高莹殷佳欣张永靖
Owner HUAWEI CLOUD COMPUTING TECH CO LTD