Data access security control method and device based on control drive management

A security control and data access technology, applied in the field of information security, can solve problems such as the inability to assign permissions to users, and achieve good scalability

Active Publication Date: 2020-09-15
CHINA NAT ENVIRONMENTAL MONITORING CENT +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The core of access control is the user authorization strategy. At present, our commonly used authorization strategies include: access control list (ACL), role-based access control (RBAC), task-based or workflow-based access control (TBAC); in the data access control model Among them, the access control list (ACL) needs to maintain the access permission list of each resource; the role-based access control (RBAC) role is used as the assignment object of permissions, which cannot be done when assigning permissions to individual users; access based on tasks or workflows Control (TBAC) is not suitable for use alone in large systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access security control method and device based on control drive management
  • Data access security control method and device based on control drive management
  • Data access security control method and device based on control drive management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0018] In order to integrate multiple authorization strategies, this application provides a data access security control device based on control-driven management, which implements different permission control drivers according to access control authorization strategies, see figure 1 , the data access security control device 1 includes a rights manager 11, a driver manager 12 and at least one rights control driver 13; each rights control driver 13 runs a configurati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data access security control method and device based on control drive management, whichrelate to the technical field of information security. According to the main technicalscheme, the device comprises an authority manager, a drive manager and at least one authority control drive, wherein the authority controller is an interface of the access authority, sends the accessrequest to the drive manager, and receives an authority verification result returned by the drive manager; the drive manager provides an access interface for the authority control drive, searches thecorresponding authority control drive according to the access request, and integrates an authority verification result of the authority control drive; and the authority control drive searches an authority strategy according to the access request, and obtains an authority verification result according to the authority strategy. Data access security control is carried out by controlling drive management, authority control requirements for different authorization strategies are met, expansion can be carried out according to actual requirements to meet requirements of different users and differentsystems, and good expansibility is achieved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a data access security control method and device based on control-driven management. Background technique [0002] Data access security control is to authorize and control resources, so that users can use resources on the platform within the legal scope of the system. The core of access control is the user authorization strategy. At present, our commonly used authorization strategies include: access control list (ACL), role-based access control (RBAC), task-based or workflow-based access control (TBAC); in the data access control model Among them, the access control list (ACL) needs to maintain the access permission list of each resource; the role-based access control (RBAC) role is used as the assignment object of permissions, which cannot be done when assigning permissions to individual users; access based on tasks or workflows Control (TBAC) is not suit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/0807H04L63/105
Inventor 宫正宇程麟钧张迪王正王勇
Owner CHINA NAT ENVIRONMENTAL MONITORING CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products