Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Role-based access control method based on three-member management and expansion

A technology of role access control and roles, which is applied in data processing applications, digital data authentication, office automation, etc., can solve the problems of low flexibility of role access control strategies, difficulty in implementation, and coarse control granularity, so as to reduce the complexity of authorization The effects of improving flexibility, improving authorization flexibility, and subdividing control granularity

Inactive Publication Date: 2016-12-14
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, many enterprises do not adopt any access control strategy, or most of the access control strategies adopted are based on traditional autonomous access control strategy, strong access control strategy or role access control strategy. With the development of the times and the advancement of information technology, information system With the continuous expansion of the scale and the continuous increase and change of the number of users, the independent access control strategy and the strong access control strategy have been difficult to meet the needs of modern information systems. At the same time, the role access control strategy has low flexibility, low scalability, and coarse control granularity. The problem
However, for some new strategies based on traditional access control strategies, such as task-oriented access control strategies, service-oriented workflow access control strategies, and usage control strategies, the scope of application is relatively narrow, and the implementation is difficult. Sex is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role-based access control method based on three-member management and expansion
  • Role-based access control method based on three-member management and expansion
  • Role-based access control method based on three-member management and expansion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to better understand the technical content of the present invention, specific embodiments are given together with the attached drawings for description as follows.

[0035] combine Figure 1-5 As shown, the role access control method based on three-person management and expansion proposed by the present invention enables the role access control strategy based on three-person management and expansion to be widely used in enterprise information systems, and through this strategy, users can be better assigned permissions , and at the same time, subdivided system roles can cooperate and restrict each other, which greatly avoids the abuse of permissions.

[0036] combine figure 1 , the role access control method based on three-person management and expansion includes the following steps:

[0037] Step 1. Establish a three-person management system in the information management system: a system administrator, a security administrator, and a security auditor, wherein...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a role-based access control (TMMERBAC) method based on three-member management and expansion. Roles are divided into ordinary roles and system roles, and the system roles are further divided into a system administrator, a security administrator and a security auditor for system management; department concept is introduced, the two authorization methods of user-department-role-authority and user-role-authority are adopted, the TMMERBAC strategy is applied to a specific project management system, and the advantages of the TMMERBAC strategy that authorization flexibility can be improved, authorization complexity can be reduced and control granularity can be divided are realized.

Description

technical field [0001] The present invention relates to the technical field of information confrontation / information security, in particular to a role access control method based on three-person management and expansion. Background technique [0002] With the rapid development of informatization, more and more enterprises use information systems to effectively manage enterprise information. At present, many enterprise information systems at home and abroad contain a lot of secret information about enterprises and employees. In order to effectively prevent illegal users from entering the system to access information resources and prevent legitimate users from accessing system resources without authorization, it is necessary to adopt information security. Access control technology limits the rights of users and criminals. [0003] At present, many enterprises do not adopt any access control strategy, or most of the access control strategies adopted are based on traditional au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06Q10/10
CPCG06F21/45G06Q10/10
Inventor 周良翁超
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products