Supercharge Your Innovation With Domain-Expert AI Agents!

Access control method, device and system based on access control strategy

An access control strategy and access control technology, applied in transmission systems, electrical components, etc., can solve the problems of lack of high-level business subject access control management, lack of user access control restrictions, etc.

Inactive Publication Date: 2018-09-11
BANK OF CHINA
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 2) Since RBAC's access permission is set based on operations and objects, operations and objects are subordinate to specific business entities, lacking access control management of higher-level business entities
[0010] 3) Users belong to the enterprise, and the access control of the enterprise's own users needs to comply with the enterprise's access control for specific business entities. There is a lack of restrictions on user access control based on enterprise access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and system based on access control strategy
  • Access control method, device and system based on access control strategy
  • Access control method, device and system based on access control strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] According to the background technology, the existing RBAC technology has the following disadvantages:

[0044] 1) Since RBAC is access control based on user roles, it lacks the control and management of enterprise identity. When multiple enterprises jointly participate in the access of the same business subject, it is necessary to establish the unified management of enterprise identity types and specific business subjects. Different enterprise identitie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method, an access control device and an access control system based on an access control strategy. The method comprises the steps of receiving a service accessrequest of an enterprise; configuring an identity type for the enterprise according to a service access permission of the enterprise, wherein the identity type indicates multiple identities of the different enterprise for the same service body; generating an access permission set of the enterprise according to the permission of the identity type to the service, wherein the access permission set comprises permissions corresponding to responsibilities of the different identity types; and according to the access permission set of the enterprise, identity type, organizational structure, roles ofservice participants and responsibility corresponding to each role, using an access control strategy based on roles for determining users in the enterprise, the roles of the users and the access permissions of the roles, wherein the access permissions of the roles inherit from the access permission set of the enterprise. By using the method, the different enterprises can achieve different access controls on the same service body by using the different identities.

Description

technical field [0001] The present invention relates to service data access technology, in particular to an access control method, device and system based on access control strategy. Background technique [0002] Role-Based Access Control (RBAC) is a mature permission model that is widely used in practice. Traditional access control models mainly include discretionary access control and mandatory access control. In the traditional permission model, permissions are usually directly assigned to users. In RBAC, the concept of roles is added, and the management of permissions is simplified by associating users with roles and roles with permissions. In an organization, roles are created to accomplish various tasks, users are given roles according to their responsibilities, and users can be easily assigned from one role to another. Roles can be given new permissions according to new requirements, and permissions can also be withdrawn from roles as needed. [0003] RBAC support...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/102H04L63/105
Inventor 周利民
Owner BANK OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More