Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Role-based access control system, method and computer program product

A computer program and access control technology, applied in computer security devices, computing, transmission systems, etc., can solve problems such as limited protection of individual resource instances, and achieve the effect of simplifying access control system management

Active Publication Date: 2006-04-26
INT BUSINESS MASCH CORP
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Individual resource instances have limited protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role-based access control system, method and computer program product
  • Role-based access control system, method and computer program product
  • Role-based access control system, method and computer program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] figure 1 Possible scenarios according to the IRBAC model are described. Each role within the IRBAC model has an associated role type. A role type is first a set of actions and models a specific way of interacting with a resource in terms of job responsibilities. For example, since editors are typically responsible for modifying resources and creating new resources, the Editor role type could include View, Edit, Add Child, and so on. Additionally, each role instance has an associated domain root resource. The naming convention for IRBAC role instances is "role@domain root resource". figure 1 A role instance of type "Administrator" is depicted, for example, tied to resource "Page 1", called "Administrator@Page 1". The set of permissions contained in a particular IRBAC role instance is defined by establishing the set of actions contained in the corresponding role type and the set of resources contained in the subtree rooted at the role's domain root Calculus, the so-c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a role-based access control system, including: a role definition system, used to define roles as permission sets on individual resources, and thus form role instances respectively; and a super role definition system, used to define a set of roles by Role instance grouping defines at least one super role into a super role, where one super role contains all permissions contained in the grouped resource instances. Furthermore, the invention relates to a suitable method, computer program and computer program product.

Description

technical field [0001] The present invention relates to a method and system for security authorization of networked computer resources, and in particular to a technique for providing access control to system resources. [0002] The invention also relates to a computer program product with a computer-readable medium and a computer program stored on the computer-readable medium with a program code adapted to implement the method when the computer program is run on a computer. Background technique [0003] Serving system functionality often includes so-called resource management, by which the server synchronizes and manages access to one or more resources, such as databases or database servers. Requests from clients are received, processed by the server system, and appropriate access to resources is made. Next, create a response to the client system and send it to the client system. This general model applies to many server paradigms, including online banking, order entry and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F1/00
CPCH04L63/105G06F21/6218
Inventor 迪特尔·比勒托马斯·赫里克唐纳德·N·琼斯
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products