User permission control and transfer method and system in edge cloud scene

A technology of user permissions and transfer methods, applied in transmission systems, electrical components, digital data authentication, etc., can solve the problems of complicated permission control, user over-authority access, and high mobility of edge cloud users, so as to avoid complicated permission control. , the effect of preventing information leakage

Active Publication Date: 2019-10-01
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF13 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to prevent information leakage, user rights allocation follows the principle of minimization, resulting in more complex rights control
[0003] Moreover, edge cloud user access is highly mobile. If matching judgments cannot be made in a timely manner and user access rights are determined, users will not be able to perform cloud services in a timely manner. , or cannot achieve access within this authority
It also leads to the inability to access, which seriously affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User permission control and transfer method and system in edge cloud scene
  • User permission control and transfer method and system in edge cloud scene
  • User permission control and transfer method and system in edge cloud scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention provides a user authority control and transfer method in an edge cloud scenario, such as figure 1 As shown, the methods include:

[0060] S1, the terminal device acquires attribute information, integrates it to form an attribute set, and initiates an access request to the edge cloud system;

[0061] The attribute information is input by the user, and may also be preset by the terminal device based on the running process.

[0062] Attribute information can be subject attribute, resource attribute, environment attribute, permission attribute and so on.

[0063] Principal attributes are instructions that can operate on resources. The resource attribute can be access resource information to the edge cloud system or resource information that needs to be obtained.

[0064] The permission attribute can be an attribute of a series of actions such as opening, reading, writing, deleting, and querying resources such as files, documents, images, and videos. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user permission control and transfer method in an edge cloud scene, and the method comprises the steps: obtaining attribute information by terminal equipment, carrying out theintegration of the attribute information to form an attribute set, and initiating an access request to an edge cloud system; the edge cloud system judging the access permission of the terminal equipment, and carrying out access judgment based on the attribute set; and after the judgment is passed, the terminal equipment accessing the edge cloud system within an authorization permission range. Information leakage is prevented, and the problem of complicated authority control caused by high user mobility between edge clouds is avoided. Fine-grained access control of authority is realized, and the cloud system and the service are ensured to be correctly and safely used. In addition, an authority control layer is introduced to meet the requirements of small edge cloud authority control granularity, user authority transfer and the like, and edge cloud user authority control and transfer are achieved.

Description

technical field [0001] The invention relates to the field of security and confidentiality of cloud computing, in particular to a method and system for controlling and transferring user rights in an edge cloud scenario. Background technique [0002] In the edge cloud scenario, when a user logs in to a cloud terminal and accesses edge cloud resources / services, permission control is required to prevent malicious users from logging in to the edge cloud to perform illegal operations. In order to prevent information leakage, user rights allocation follows the principle of minimization, resulting in more complex rights control. [0003] Moreover, edge cloud user access is highly mobile. If matching judgments cannot be made in a timely manner and user access rights are determined, users will not be able to perform cloud services in a timely manner. , or cannot achieve access within this authority. It also leads to the inability to access, which seriously affects the user experienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/44G06F21/31
CPCG06F21/31G06F21/44H04L63/10H04L63/20
Inventor 赵瑞东孙晓妮元河清李若寒
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products