A dynamic authorization method and system based on user context and policy
A technology of dynamic authorization and context, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems that users cannot be changed, the RBAC model is difficult to apply, and cannot be applied, so as to improve work efficiency and user experience, reduce The effect of permission query calculation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] A dynamic authorization method based on user context and policy, when a user initiates a request to a client, the client collects user context information and verifies whether it has been authorized, and if the user is not authorized, the client uploads the context information to the server; The above server verifies whether the user has the right to access the resource. If the user does not have the right, the user's right is dynamically calculated according to the context information. If the calculation result meets the set access authorization requirements, the user is granted the access right to the resource in real time.
[0042] The present invention is different from the traditional method of using static authority configuration to realize user and resource authorization, and the present invention is mainly oriented to a more convenient, safe and efficient authorization management method used in and equipment scenarios. Different from the traditional method of ass...
Embodiment 2
[0044] A dynamic authorization method based on user context and policies, such as figure 1 It mainly includes the following steps:
[0045] (1) When a user initiates a request, the client will automatically collect the user's real-time context information, including login status, user device information, network location information, etc.;
[0046] (2) At the same time, the client first obtains the locally encrypted and stored pre-authority information to verify whether the user has been authorized; if the user has been authorized, it can enter the next step of business behavior;
[0047] (3) The user has no authorized information locally, and the request will be submitted to the server for permission verification. At the same time, the user's context information is also uploaded to the server synchronously. First, the permission dynamic group module of the server quickly retrieves whether the user has access to the resource. Permission; if the user has been authorized, he ca...
Embodiment 3
[0056] A dynamic authorization method based on user context and policies, such as figure 1 It mainly includes the following steps:
[0057] (1) When a user initiates a request, the dynamic permission front-end module on the mobile terminal will automatically collect the user's real-time context information, including login status, user device information, network location information, etc.;
[0058] (2) The user will communicate and establish a connection with the smart lock that needs to be accessed. At this time, it will check whether the user has the access authority of the smart lock; the method is that the dynamic authority pre-module first obtains the encrypted and stored pre-authorization information from the local area, Verify whether the user has been authorized; if the user has been authorized, he can enter the next business action, such as unlocking; when the next operation is performed, the authentication method that meets the security requirements can be combined,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


