Attribute based access control method and system

An attribute and attribute value technology, applied in the field of attribute-based access control methods and systems, can solve the problems of difficult management, large granularity, inflexible access control, etc., and achieve the effect of good adaptability

Inactive Publication Date: 2017-05-31
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the above defects or improvement needs of the prior art, the present invention provides an attribute-based access control method and system, the purpose of which is to provide an efficient access control method for the continuously growing decentralized Internet resources, so that The resource access control is unified and consistent, thus solving the technical problems of inflexibility, large granularity and difficult management of traditional access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute based access control method and system
  • Attribute based access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0063] figure 1 Shown is a schematic flowchart of an attribute-based access control method disclosed in an embodiment of the present invention, wherein, in figure 1 The method shown includes the following steps:

[0064] (1) The data provider judges whether the user to be accessed is an authenticated user, and if not, redirects the access request of the user to be accessed to the service provi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute based access control method and system. The method is implemented through steps as follows: granting and revocation of subject attribute information and a specific subject; collection of environmental attribute information; creation of a strategy; implementation of the strategy; acquisition of running state attributes; determination of a unified data demand response mode of all parts. Access control is realized through control of subjective and objective attribute information and the environmental attribute information, and a series of problems of poor safety, large authority management difficulty, extension difficulty and the like of traditional access control can be solved, so that efficient access control is realized.

Description

technical field [0001] The invention belongs to the technical field of access control, and more specifically relates to an attribute-based access control method and system. Background technique [0002] Access control technology is mainly used to protect data shared on large systems and prevent access by unauthorized and illegal users. With the development of information technology, especially the rapid development of the Internet, access control technology has also been greatly developed. [0003] According to different authorization methods, access control methods can be divided into: discretionary access control (Discretionary Access Control, DAC), mandatory access control (Mandatory Access Control, MAC) and role-based access control (Role-Based Access Control, RBAC). Autonomous access control is managed by the owner of the object, and the owner himself decides whether to grant his object access right or part of the access right to other subjects. Selectively share his ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/105
Inventor 路松峰付四凯慕少琼
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products