A Matching-Based Access Control Method
An access control and access token technology, applied in the field of matching-based access control, can solve the problems of low reliability, poor scalability, and failure to consider the hierarchical access content of the access control scheme
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] The present invention will be further described below in conjunction with drawings and embodiments.
[0068] Such as figure 1 with 2 As shown, a matching-based access control method includes a content authority module, a user attribute module, an access token module and a matching module. Each module interactive step of this invention is as follows (as figure 1 ), the specific implementation of each module is as follows:
[0069] 1. Content authority module In this module, the content provider (content provider, CP) defines the permitted operation of the content, and calculates and classifies the content according to the defined permitted operation, so as to realize the multi-level resource set.
[0070] 1-3 Defining permission operations for content
[0071] In order to expound the specific operation of each resource, we introduce the atomic operation set (see Def.1).
[0072] Definition 1: Atomic Operation Set (AOp)
[0073] AOp={...,Modify,Execute,Delegate,Shar...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


