RBAC-based authority management system

A permission management and permission technology, applied in transmission systems, electrical components, etc., can solve the problems of inflexible data permission control, complicated permission configuration and management process, and increased user difficulty, so as to achieve flexible permission configuration and execution process. , The effect of simplifying the permission configuration process and improving the operation efficiency

Inactive Publication Date: 2017-05-10
柳州得实科技有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most RBAC-based authority management methods focus on the control of functional authority, and the implementation of data authority control is not flexible enough or too complicated, which leads to complex authority configuration and management processes and increases the difficulty of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RBAC-based authority management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0016] Such as figure 1 As shown, a RBAC-based authority management system includes a user unit, a session unit, a role unit, a data authority unit, a function authority unit and a data recording unit;

[0017] The user unit is respectively connected with the session unit and the role unit, transmits the session data of the user to the session unit, receives the role configuration sent by the role unit, and the user unit is used to log in the corresponding authority system of the authority management device, record the identity data, and send the session Data and receiving role configuration;

[0018] The session unit is connected to the role unit, receives the session data of the user unit, and sends activation ro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of authority management technology, and specifically relates to an RBAC-based authority management system. The RBAC-based authority management system comprises a user unit, a session unit, a role unit, a data authority unit, a function authority unit and a data recording unit, wherein the user unit is respectively connected with the session unit and the role unit, the session unit is connected with the role unit, and the role unit is respectively connected with the data authority unit and the function authority unit; and the data recording unit is connected with the session unit. Compared with the prior art, by adopting the RBAC-based authority management system disclosed by the invention, the logical separation between the user and the access authority as well as the authority separation between the functions and data can be achieved, the configuration and management of the authority can be simplified, and the use difficulties of the user can be reduced.

Description

technical field [0001] The invention relates to the technical field of authority management, in particular to an RBAC-based authority management system. Background technique [0002] IT information system is a complex human-computer interaction system, in which every specific link may be threatened by security. It is very important to build a robust authority management system to ensure the security of the information system. Access control is a defense against unauthorized use of resources. The basic goal is to limit the access rights of the access subject (user, process, service, etc.) to the access object (file, system, etc.), so that the computer system can be used within the legal scope. There are generally three types of access control strategies: autonomous access control methods, mandatory access control methods, and role-based access control methods (RBAC) (Role-Based Access Control, which refers to role-based access control). Among them, both the autonomous type...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/0892H04L67/14
Inventor 唐华
Owner 柳州得实科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products