Dynamic authorization method and system based on user context and strategy
A dynamic authorization and context technology, applied in transmission systems, electrical components, etc., can solve the problems that users cannot be changed, the RBAC model is difficult to apply, and affects all objects, etc., so as to improve work efficiency and user experience, and reduce authority query calculations Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] A dynamic authorization method based on user context and policies. When a user initiates a request to the client, the client collects user context information and verifies whether it has been authorized. If the user is not authorized, the client uploads the context information to the server; The above server verifies whether the user has the permission to access resources. If the user does not have permission, the user permission is dynamically calculated according to the context information. If the calculation result meets the set access authorization requirements, the resource access permission is granted to the user in real time.
[0042] The present invention is different from the traditional method of using static authority configuration to realize user and resource authorization, and the present invention is mainly oriented to a more convenient, safe and efficient authorization management method used in and device scenarios. Different from the traditional method of...
Embodiment 2
[0044] A dynamic authorization method based on user context and policies, such as figure 1 As shown, it mainly includes the following steps:
[0045] (1) When a user initiates a request, the client will automatically collect the user's instant context information, including login status, user device information, network location information, etc.;
[0046] (2) At the same time, the client first obtains the encrypted and stored pre-authorization information locally, and verifies whether the user has been authorized; if the user has been authorized, he can enter the next step of business behavior;
[0047] (3) The user has no local authorized information, and the request will be submitted to the server for permission verification. At the same time, the user's context information is also uploaded to the server synchronously. First, the permission dynamic group module of the server quickly retrieves whether the user has access to the resource authority; if the user has been autho...
Embodiment 3
[0056] A dynamic authorization method based on user context and policies, such as figure 1 As shown, it mainly includes the following steps:
[0057] (1) When a user initiates a request, the dynamic permission pre-module on the mobile terminal will automatically collect the user's immediate context information, including login status, user device information, network location information, etc.;
[0058] (2) The user will communicate and establish a connection with the smart lock that needs to be accessed. At this time, it will check whether the user has access rights to the smart lock; the method is that the dynamic permission pre-module first obtains the encrypted and stored pre-privilege information from the local, Verify whether the user has been authorized; if the user has been authorized, he can enter the next step of business behavior, such as unlocking; when performing the next step of operation, he can combine authentication methods that meet security requirements, suc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


