Unlock instant, AI-driven research and patent intelligence for your innovation.

A dynamic authorization method and system based on user context and policy

A technology of dynamic authorization and context, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems that users cannot be changed, the RBAC model is difficult to apply, and cannot be applied, so as to improve work efficiency and user experience, reduce The effect of permission query calculation

Active Publication Date: 2022-08-02
STATE GRID HEBEI ELECTRIC POWER CO LTD +2
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 4.MAC: (Mandatory Access Control) mandatory access control, all access control policies are formulated by the system administrator, and users cannot change them
This deficiency makes the RBAC model difficult to apply to entity systems that require a strict order of operations
[0010] 2) DAC: The biggest defect is that the authority control is relatively scattered, which is not easy to manage. For example, it is impossible to simply set a unified authority for a group of files and open it to a designated group of users
At the same time, this model has a large security risk. When a security crack occurs in a program, it will affect all objects that the user can access
This makes the DAC particularly vulnerable to Trojan horses
[0011] 3) ABAC: The ABAC permission control model requires complex calculations on resource attributes, and is not widely used because of its complexity. If the rules are a little more complicated or the design is chaotic, it will cause trouble for managers to maintain and trace. At the same time, if Permission judgment needs to be executed in real time, too many rules will lead to performance problems
[0012] 4) MAC: MAC was born to make up for the problem of over-dispersion of DAC authority control. MAC is very suitable for confidential institutions or other industries with a strong sense of hierarchy, but for similar commercial service systems, it cannot be applied because it is not flexible enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dynamic authorization method and system based on user context and policy
  • A dynamic authorization method and system based on user context and policy
  • A dynamic authorization method and system based on user context and policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] A dynamic authorization method based on user context and policy, when a user initiates a request to a client, the client collects user context information and verifies whether it has been authorized, and if the user is not authorized, the client uploads the context information to the server; The above server verifies whether the user has the right to access the resource. If the user does not have the right, the user's right is dynamically calculated according to the context information. If the calculation result meets the set access authorization requirements, the user is granted the access right to the resource in real time.

[0042] The present invention is different from the traditional method of using static authority configuration to realize user and resource authorization, and the present invention is mainly oriented to a more convenient, safe and efficient authorization management method used in and equipment scenarios. Different from the traditional method of ass...

Embodiment 2

[0044] A dynamic authorization method based on user context and policies, such as figure 1 It mainly includes the following steps:

[0045] (1) When a user initiates a request, the client will automatically collect the user's real-time context information, including login status, user device information, network location information, etc.;

[0046] (2) At the same time, the client first obtains the locally encrypted and stored pre-authority information to verify whether the user has been authorized; if the user has been authorized, it can enter the next step of business behavior;

[0047] (3) The user has no authorized information locally, and the request will be submitted to the server for permission verification. At the same time, the user's context information is also uploaded to the server synchronously. First, the permission dynamic group module of the server quickly retrieves whether the user has access to the resource. Permission; if the user has been authorized, he ca...

Embodiment 3

[0056] A dynamic authorization method based on user context and policies, such as figure 1 It mainly includes the following steps:

[0057] (1) When a user initiates a request, the dynamic permission front-end module on the mobile terminal will automatically collect the user's real-time context information, including login status, user device information, network location information, etc.;

[0058] (2) The user will communicate and establish a connection with the smart lock that needs to be accessed. At this time, it will check whether the user has the access authority of the smart lock; the method is that the dynamic authority pre-module first obtains the encrypted and stored pre-authorization information from the local area, Verify whether the user has been authorized; if the user has been authorized, he can enter the next business action, such as unlocking; when the next operation is performed, the authentication method that meets the security requirements can be combined,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic authorization method and system based on user context and strategy. The system includes a dynamic authorization pre-module, a dynamic authorization engine module, a dynamic authority group module, and a dynamic authority policy configuration module. When a user initiates a request to the client, the client collects the user context information and verifies whether it has been authorized. If the user is not authorized, the client uploads the context information to the server; the server verifies whether the user has the right to access resources, If the user has no authority, the user authority is dynamically calculated according to the context information. If the calculation result meets the set access authorization requirements, the user is granted the access authority to the resource in real time. The present invention is different from the traditional method of using static authority configuration to realize user and resource authorization, and the present invention is oriented to more convenient, safe and efficient authorization management in use and equipment scenarios.

Description

technical field [0001] The invention belongs to the technical field of dynamic authorization, and in particular relates to a dynamic authorization method and system based on user context and policies. Background technique [0002] With the rapid development and wide application of Internet technology, the scale of enterprises continues to expand, and the data of enterprise information resources is becoming more and more diversified. A major problem faced by the information management system. Therefore, the authority access control of information resources occupies an important position in the design and development of information systems. [0003] Authority management appears in almost any IT system, and user authorization is an indispensable part of IT system management. The traditional method is to configure the corresponding permissions uniformly by the administrator according to users, attributes, etc. The basic idea of ​​the main authorization implementation scheme a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/104H04L63/08H04L63/083H04L63/0861
Inventor 高丽芳杨会峰辛锐陈连栋王静张晓韬李江鑫李启蒙王智慧刘玮杨楠周文芳郭少勇王少影肖治华胡美慧
Owner STATE GRID HEBEI ELECTRIC POWER CO LTD