Process access control method and device based on access control list
An access control list and access control technology, which is applied in the field of data security and can solve the problems of lack of resistance to attacks and process control that cannot access data.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0027] refer to Figure 1 to Figure 3 , an embodiment of the present invention provides a process access control method based on an access control list, which sequentially includes authorization S 1 , certification S 2 , License S 3 and Audit S 4 four processes.
[0028] authorized 1 : First read the access rule list set by the user R={r 1 ,r 2 ,r 3 ,...,r n}; rule r in list k Described for controlled data D k , a specific program P k Access permission for the rule r k The composition includes T k 、D k ,P k ,P Shell k ,P Children k ; For each access rule r in the rule list R k , Calculation related program P k , script runner P Shell k , subroutine P Children k The MD5 characteristic value S of , set up the characteristic value list PS={[P 1 ,S 1 ],[P 2 ,S 2 ],[P 3 ,S 3 ],...,[P n ,S n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



