A method, device and system for access control

An access control and equipment technology, applied in the field of information security, can solve the problems of breach of confidentiality and integrity, inability to guarantee confidentiality, and inability to combine confidentiality and integrity, so as to ensure confidentiality and integrity and ensure security. Effect

Active Publication Date: 2020-09-22
BEIJING UXSINO SOFTWARE
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Although the Bell-Lapadula and Biba models are suitable for different fields, both the Bell-Lapadula model and the Biba model have certain limitations in actual application. Ensuring integrity cannot guarantee confidentiality, but ensuring confidentiality and integrity Can be compromised, so neither can have both confidentiality and integrity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for access control
  • A method, device and system for access control
  • A method, device and system for access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe operations as sequential processing, many of the operations may be performed in parallel, concurrently, or simultaneously. In addition, the order of operations can be rearranged. The process may be terminated when its operations are complete, but may also have additional steps not included in the figure. The processing may correspond to a method, function, procedure, subroutine, subroutine, or the like.

[0074] The "first device" and / or "second device" referred to in the context may include the "computer device" described below. The computer device, also referred to as "computer", refers to an intelligent electronic device that can perform predetermined processing procedures such as numerical calculations and / or logical calculations by running predetermined pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a method, device and system for access control. The method comprises determining operation information corresponding to an access request through the security role type and the security level based on a subject and an object in the access request. Compared with the prior art, through the implementation of a multi-level model based on the role, a graduation role is added on the basis of forced access control based on the role through the to solve the problem that the forced access control only based on the role cannot meet the requirement when the user of the same role is excessive; the security and the integrity are effectively guaranteed at the same time, the method is more suitable for diversified requirements of the modern society in comparison with the traditional BLP and RBAC model.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a technology for access control. Background technique [0002] With the rapid development of computer technology and networks, people use computers more frequently and in a wider range of applications, such as communication, entertainment, and leisure through computers. However, the dependence on computers also poses a threat to the information security of users. [0003] Access control is to control the subject's access to the resources in the system. There are three elements of access control: subject (Subject), which refers to an entity that makes a request or requirement, and is the active initiator of access operations; object (Object), a passive entity that accepts access from other entities; control strategy, refers to the subject’s control of the object Manipulate sets of behaviors and constraints. [0004] The triad of information security: Confidentialit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/102H04L63/104
Inventor 梁继良马骅田昕辉夏攀窦雯
Owner BEIJING UXSINO SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products