Certificate-based access control system and method

An access control and certificate technology, which is applied in the field of computer security, can solve problems such as hierarchical establishment of complex reasoning maps, and achieve the effects of access isolation, simplified management, and reduced burden

Active Publication Date: 2022-07-26
BEIJING UNIV OF TECH
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the above technical solution, the resource owner of the traditional authorization certificate model has solved the problem of efficiency burden caused by searching for the certificate issuing certificate, and solved the problem of complex reasoning and mapping brought about by the hierarchical establishment and control of subsequent delegation in the traditional delegation access control model. While realizing the separation of duties of the resource owner itself, it also realizes the access isolation between the resource owner and the certification authority, which reduces the burden on the resource owner and simplifies management.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-based access control system and method
  • Certificate-based access control system and method
  • Certificate-based access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022]In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

[0023] Below in conjunction with accompanying drawing, the present invention is described in further detail:

[0024] like figure 1 and figure 2 As shown, the present invention provides a certificate-based access control system and method. The system includes three types of entities and four modules. The three types of entities include re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificate-based access control system and method, wherein, in the access control system, an access rule module is formulated for resource owners to restrict access to resource users according to the openness of the resources they own; The scheme module is used for the resource owner and the certificate authority to establish a delegation scheme according to the authorization conditions of the certificate; the application access resource module is used for the resource user to request the resource owner to access the resource and return the access result to the resource user; the application certificate authorization module It is used for resource users to apply for a certificate from a certificate authority and return the certificate application result to the resource user. The technical solution of the present invention solves the problem of efficiency burden and complex reasoning and mapping, realizes the separation of responsibilities of the resource owner and also realizes the access isolation between the resource owner and the certificate authority, thereby reducing the burden of the resource owner , simplifying management.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a certificate-based access control system and a certificate-based access control method. Background technique [0002] As a means of information protection, access control is an important part of many distributed applications, and several centralized and distributed solutions have been proposed for such applications. Certificates are particularly suitable for distributed systems and are used in a variety of ways. For example, in the network environment, with the rapid development of electronic payment in China, the electronic payment binding function prevents unauthorized visitors from accessing or acquiring data resources. In real life, intelligent traffic control technology is becoming more and more intense. Without intelligent ticketing control, many people may experience ticket evasion and other situations, resulting in improper use of resources. With the continuo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33
CPCG06F21/33G06F2221/2141
Inventor 何泾沙李文欣朱娜斐蔡方博
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products