Supercharge Your Innovation With Domain-Expert AI Agents!

Relation-based access control method

An access control and relationship technology, applied in the field of network information security, can solve problems such as hidden security risks, poor scalability, and difficulty in applying distributed systems, and achieve the effect of improving the degree of automation and ensuring information security.

Inactive Publication Date: 2017-12-01
上海神计信息系统工程有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages are that one user can activate multiple roles at the same time, and the constraint granularity is relatively large, which may easily cause security risks caused by excessive user authority. in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relation-based access control method
  • Relation-based access control method
  • Relation-based access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The above-mentioned features and advantages of the present invention can be better understood after reading the detailed description of the embodiments of the present disclosure in conjunction with the following drawings. In the drawings, components are not necessarily drawn to scale, and components with similar related properties or characteristics may have the same or similar reference numerals.

[0054] figure 1It shows the flow of a preferred embodiment of the relation-based access control method of the present invention. See figure 1 , the following is a detailed description of each step of the method of this embodiment.

[0055] Step S1: The user initiates a resource request.

[0056] Step S2: Verify the resource request, and enter the next step after the verification is passed.

[0057] That is, user U accesses resource R to verify whether user U is a legal user of the system.

[0058] Step S3: Verify whether there is a relational table of the user in the ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a relation-based access control method, which improves the automation degree of access control in a collaboration platform network and enables authorization control to perform automatic decision-making based on a relation between a subject and an object. The technical scheme is that an access control system is driven to operate by using a relation, the subjective initiative and the system autonomy are given into full play, the information security of users is guaranteed, and requirements of complex application scenarios can be better satisfied. Improvements are performed on a traditional access control model according to application requirements of the current collaboration platform network, and corresponding access control strategies are formulated.

Description

technical field [0001] The invention relates to network information security, in particular to an access control method applied to user data security and privacy protection in a collaboration platform (Works) network. Background technique [0002] Access control technology emerged in the 1970s, initially to solve the management problem of authorized access to shared data on mainframes. According to the difference of access control policy types, early security policies are divided into two types: Discretionary Access Control (DAC) and Mandatory Access Control (Mandatory Access Control, MAC). Mid-term security policies include role-based access control (Role -BasedAccess Control, RBAC), RBAC maps users to roles, and uses permissions through roles. The model plans the user's behavior dynamically or statically by specifying different roles, the inheritance relationship of roles, the connection between roles and the corresponding permissions. As the basis of current access cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0407H04L63/0892H04L63/10
Inventor 王文路陶冠华章高磊涂笑洪琪
Owner 上海神计信息系统工程有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More