Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-domain authorized access control system for secure interoperability between different domains

A technology of authorized access and interoperability, applied in the field of cross-domain authorized access control system, which can solve the problem that the grammatical expressions of access control rules cannot recognize each other and so on.

Active Publication Date: 2022-04-01
上海欣兆阳信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Firstly, a user subject resource model based on semantic information is proposed, and the ontology is established by using OWL network ontology language. By constructing the ontology, the concept of the user subject resource model and the relationship between concepts are described, and the reasoning rules are defined by using the SWRL semantic rule language. Reasoning generates new semantic knowledge, realizes the dynamic change of subject’s access rights to resources in each domain according to the context of the access subject, and proposes an access control system that supports cross-domain authorization on the basis of the user subject resource model, which includes cross-domain authorization Regulatory service, media resource library, and inter-domain rule conversion system. The media resource library is used to store authorization information between domains, and is responsible for caching the access subject information of the source domain and the object object information of the target domain. The inter-domain rule conversion system mainly Transform the access control rules of each domain into media rules, and solve the problem that the access control rules between different domains cannot recognize each other in grammatical expression. The cross-domain authorization control service is mainly responsible for interactive communication with the source domain and target domain, and calling the target The access authority determination algorithm of the domain obtains the access control relationship between the cross-domain subject and the resource object, and the cross-domain authorization access control system proposed by the present invention is applied to the actual project. The experimental results show that the cross-domain authorization access control system can Meet the subject's cross-domain authorized access requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain authorized access control system for secure interoperability between different domains
  • Cross-domain authorized access control system for secure interoperability between different domains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solution of the cross-domain authorized access control system for inter-domain security interoperability provided by the present invention will be further described in conjunction with the accompanying drawings, so that those skilled in the art can better understand the present invention and implement it.

[0047] With the rapid development of distributed computing systems, the interoperability between different system architectures is becoming more and more frequent. More and more transactions require the subject to authorize cross-domain access to object objects in other domains. Since the subject and object objects are often located in the In two or more different domains, the heterogeneity of authorization access control schemes within different domains may be very large, making it extremely difficult for subjects to authorize access across domains. There are two main methods to solve the above problems in the prior art. The first method realizes cross-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a cross-domain authorization access control system for safe interoperability between different domains. The system can not only support the dynamic change of the subject's access authority to resources according to the context of the access subject within each domain, but also realize cross-domain access between different domains. Domain-authorized access meets the requirements for access control in an open and distributed computing Internet environment. With the rapid development of distributed computing, the interaction of each system becomes more and more frequent. The present invention solves the urgent problem of resource sharing between systems on the basis of ensuring that the resources of each system are not illegally accessed and used. , an important technology to ensure that resources are not illegally accessed and utilized through access control technology. In the current distributed environment, resource sharing between systems is realized. The subject of the source domain can access the resources of the target domain across domains, and the internal resources of each domain It is a requirement that the authorized access control scheme will not be interfered and influenced by other domains.

Description

technical field [0001] The invention relates to a cross-domain authorized access control system, in particular to a cross-domain authorized access control system for safe interoperability between different domains, and belongs to the technical field of cross-domain access control. Background technique [0002] With the rapid development of the Internet and computer technology, more and more organizations and systems have developed from being closed to the outside world to being interconnected and interoperable, and resource sharing among various organizations and systems has also become more frequent. However, resource sharing between system architectures may cause a series of problems such as information leakage. Therefore, it has always been a research focus in this field to ensure that resources are not illegally accessed while sharing resources. Access control technology is an important technology to ensure that information resources are not illegally accessed and used. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/08
Inventor 扆亮海刘文平
Owner 上海欣兆阳信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products