Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed access control method in multistage securities

A secure access control and distributed technology, applied in the field of network security, can solve the problems that have not found the same or similar literature reports

Inactive Publication Date: 2007-05-09
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] After searching the prior art, no literature reports identical or similar to the subject of the present invention have been found

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed access control method in multistage securities
  • Distributed access control method in multistage securities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The software and hardware environment that present embodiment implements adopting: server: more than Tomcat 5.0, JAVA environment, support JAAS, client hardware requirement: Windows 2000 / XP, above Pentium 2400Mhz, 256M internal memory, connect with the network of server; Client software: IE browser.

[0024] deploy:

[0025] ①. Build the identity authentication server of this trust domain in each trust domain, deploy it on Tomcat, and deploy an LDAP server in each trust domain, including the following databases:

[0026] a. User identity information database (PKI certificate information table, etc.)

[0027] b. Attribute certificate database (PMI certificate information table, intra-domain policy mapping table, inter-domain policy mapping table, role certificate table, role mapping table, etc.)

[0028] c. Resource information database (configurable resource information and corresponding permissions provided in this trust domain)

[0029] ②. Configure the two-way aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

PKI technique offers corresponding ID verification and info encryption mechanism. The resource description sign restricts the resource access under relative separate condition. The log module records the related user access info and system security info. The user uses his own ID card to log in the trust domain and gains the authentication server's trust. The user and the authentication server reach a bidirectional authentication connection. After verifying ID, the user may ask an access request against a certain resource. The final judgment corresponding to this request is depended on the judgment function of the user role attribution certification (AC), the domain strategy AC and the inter-domain strategy AC. At the same time, the related important system log records are stored into the database for future review. In this invention, the access situation in the system is log-recorded in real time. Thus the system security can be well analyzed.

Description

technical field [0001] The invention relates to a control method in the technical field of network security, in particular to a distributed multi-level security access control method. Background technique [0002] With the rapid development and general application of Internet and distributed object technology, more and more distributed systems appear. At the same time, due to the promotion of technologies such as e-commerce and supply chain, the collaboration between systems has become very common, which also makes the scale of distributed systems become larger and more complex. Who is allowed to use the entity in the distributed system, how to use it and who defines the usage rules, this is the access control problem in the distributed system. In order to make the distributed system play its role fully and safely, and cooperate safely between systems, an efficient access control method is the first step in its application. [0003] Access control refers to the different a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 杨树堂陆松年李建华雷融陈恭亮李骏
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products