Supercharge Your Innovation With Domain-Expert AI Agents!

Data security access control method, device and system based on os/400

An access control and data security technology, applied in transmission systems, electrical components, etc., can solve problems such as unrealizable, unrecorded user access system information and operation information, and difficulty in auditing, to achieve the effect of real-time blocking

Active Publication Date: 2019-11-08
TAIKANG LIFE INSURANCE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, OS / 400 cannot set access rights to a certain field in a file in the permission setting of a file. If a user has read permission to a file, but if it is desired that the user cannot access certain sensitive information in the file, then can not achieve
Thirdly, OS / 400 currently does not record the information of users accessing the system and their operation information, which makes it difficult to audit in the future

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security access control method, device and system based on os/400
  • Data security access control method, device and system based on os/400
  • Data security access control method, device and system based on os/400

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and fully convey the concept of example embodiments to those skilled in the art. The drawings are merely schematic illustrations of the invention and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted.

[0030] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the invention. However, those skilled in the art will appreciate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an OS / 400-based data security access control method, a device and a system. The method comprises the following steps of when an OS / 400 operating system checks and allows the user right of the remote data access, acquiring the relevant parameters of the remote data access through the Exit Point of the OS / 400 operating system; according to the acquired relevant parameters and a pre-configured access permission control table, judging the compliance of the remote data access; and returning a corresponding compliance determination result to the OS / 400 operating system. Based on the above method, the Exit Point technique of the OS / 400 operating system is utilized, and the relevant parameters of the remote data access are acquired through the Exit Point of the OS / 400 operating system. Meanwhile, in combination with the pre-configured access permission control table, the compliance is checked. Therefore, the security access control is more personalized, and the real-time Interdiction of the risk operation is achieved.

Description

technical field [0001] The invention relates to computer network security technology, in particular to an OS / 400-based data security access control method, device and system. Background technique [0002] OS / 400 is a non-open operating system launched by IBM that runs on the IBM System I hardware platform and is widely used in the commercial field. [0003] With the rapid development of the Internet and e-commerce, more and more users access remote systems and databases through remote communication technology. These remote data accesses enter the system through specific or general service ports. If the access operations cannot be effectively controlled and audited, it will bring great risks to information security and system security. [0004] The current OS / 400 adopts dual control of user authority check and file private authority check for remote database access. When a user enters the system, the user name and password are first checked. After passing the user authorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876H04L63/101H04L63/102H04L63/105
Inventor 王春元
Owner TAIKANG LIFE INSURANCE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More