Unlock instant, AI-driven research and patent intelligence for your innovation.

A Matching-Based Access Control Method

An access control and access token technology, applied in the field of matching-based access control, can solve the problems of low reliability, poor scalability, and failure to consider the hierarchical access content of the access control scheme

Active Publication Date: 2021-06-15
HANGZHOU DIANZI UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the access control scheme has the disadvantages of low reliability, poor scalability, no consideration of the hierarchical access content, and low access efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Matching-Based Access Control Method
  • A Matching-Based Access Control Method
  • A Matching-Based Access Control Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention will be further described below in conjunction with drawings and embodiments.

[0068] Such as figure 1 with 2 As shown, a matching-based access control method includes a content authority module, a user attribute module, an access token module and a matching module. Each module interactive step of this invention is as follows (as figure 1 ), the specific implementation of each module is as follows:

[0069] 1. Content authority module In this module, the content provider (content provider, CP) defines the permitted operation of the content, and calculates and classifies the content according to the defined permitted operation, so as to realize the multi-level resource set.

[0070] 1-3 Defining permission operations for content

[0071] In order to expound the specific operation of each resource, we introduce the atomic operation set (see Def.1).

[0072] Definition 1: Atomic Operation Set (AOp)

[0073] AOp={...,Modify,Execute,Delegate,Shar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a matching-based access control method, and the involved entities include a content provider, a content requester and a router. In the present invention, firstly, CQ initiates a request to CP through a trusted network; when CP receives the request, CP generates an access token for CQ by configuring and calculating user attributes and sends it to CQ; then, CQ can use the access token Request content; finally, CP realizes access token verification, access content matching and provisioning of CQ through access token module, content authority module and matching module. The invention uses a trusted channel for data transmission to ensure the security of the content, and the designed access token improves the access efficiency. According to the content authority and the attribute score of the requester, through the combination of coarse-grained and fine-grained matching methods, multiple Hierarchical and efficient access control.

Description

technical field [0001] The invention relates to the technical field of access control, in particular to a matching-based access control method. Background technique [0002] Access control refers to the means by which the system restricts the ability of the system to use data resources for user identities and the predefined policy groups to which they belong. It is usually used by system administrators to control users' access to network resources such as servers, directories, and files. Access control is an important basis for system confidentiality, integrity, availability, and legal use. It is one of the key strategies for network security prevention and resource protection. Authorized access. [0003] The current access control types mainly include discretionary access control, mandatory access control, role-based access control and attribute-based access control. However, the access control scheme has the disadvantages of low reliability, poor scalability, lack of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 吕秋云祁伊祯郑宁姜妍
Owner HANGZHOU DIANZI UNIV