Improved network access control method and device

A technology of network access control and network access, which is applied in the field of improved network access control methods and devices, can solve problems such as lack of adaptability, and achieve the effect of strong flexibility

Inactive Publication Date: 2016-11-02
FOSHAN UNIVERSITY
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The main purpose of the present invention is to provide an improved network access control method and device, which solves the technical defect that the existing network access control method lacks adaptability in social networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved network access control method and device
  • Improved network access control method and device
  • Improved network access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Access Control (Access Control) refers to the means by which the system restricts the user's identity and the predefined policy group to which it belongs to use data resources. It is usually used by system administrators to control users' access to network resources such as servers, directories, and files. Access control is an important basis for system confidentiality, integrity, availability, and legal use. It is one of the key strategies for network security prevention and resource protection. Authorized access.

[0035] A social network includes multiple subjects and multiple objects in the network. Network access control includes three elements: subject, object and control strategy.

[0036] (1) Subject S (Subject). Refers to a specific request to access a resource. It is the initiator of an action, but not necessarily the executor of the action. It may be a user, or a process, service, or device started by the user.

[0037] (2) Object O (Object). Refers to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved network access control method and a device. The method comprises the steps of verifying one or more policies out of a network access subject policy, a network access object policy and a content filtering policy; and generating the access operating authorization based on the above verification result. The network access subject policy comprises at least one or more factors out of the subject attribute, the subject authorization policy, the subject filtering policy and the conflict resolution policy. The network access object policy comprises at least one or more factors out of the object attribute and the object authorization policy. The content filtering policy comprises at least one or more factors out of the subject filtering policy and the object filtering policy. According to the embodiments of the network access control method and the device in the invention, the relation between users, the relation between a user and an object, the relation between objects and the attribute-based access control are integrated. Therefore, the method and the device are better in flexibility and implementation feasibility.

Description

technical field [0001] The invention relates to the Internet field, in particular to an improved network access control method and device. Background technique [0002] The high degree of decentralization, dynamics and fine-grained authorization of social network access control require the social network access model to have strong access control expression capabilities. In existing research, methods using traditional models are mostly limited to static access. The control mode is difficult to meet the expressive and dynamic requirements of social network access control. The access control model proposed by Wilfred uses the level of trust between users to determine whether the requester is allowed to access data, which has limited expressive power; the rule-based model proposed by Carminati et al. (Trustlevel) for access authorization, access authorization is expressed in the form of rules, and its authorization expression is still limited to these three types of relationsh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/105H04L63/20
Inventor 马莉钟勇霍颖瑜
Owner FOSHAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products