Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for role-based access control

An access control and role technology, applied in the field of role-based access control systems, can solve the problems of not considering role base, not considering role mutual exclusion, not considering user role inheritance, etc., to simplify authority management and assignment work, and avoid confusion , the effect of reducing workload

Inactive Publication Date: 2013-02-13
SHANGHAI DIANJI UNIV
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, the above-mentioned RBAC model has the following disadvantages: 1. It is generally applied to operating systems and database systems, but it is rarely used in specific application systems; 2. The problem of mutual exclusion of roles is not considered.
For example, two roles have different responsibilities and cannot be owned by one user at the same time. The cashier and accountant of the financial department are simple examples of mutually exclusive roles; 3. The limitation of the role base is not considered. The role base of the role of general manager is 1; 4. The inheritance of user roles is not considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for role-based access control
  • System and method for role-based access control
  • System and method for role-based access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0044] figure 2 It is a system architecture diagram of a role-based access control system in the present invention. Such as figure 2 As shown, a role-based access control system in the present invention includes a request initiator 20 , an access control execution mechanism 21 , an access control decision-making mechanism 22 and a target resource 23 .

[0045] The request initiator 20 i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for role-based access control. The system comprises a request initiator, an access control executing mechanism, an access control decision mechanism and a target resource, wherein the request initiator sends an access request to the access control executing mechanism, the access control executing mechanism transmits the request to the access control decision mechanism, the access request is transferred to the target resource according to the decision result of the access control decision mechanism, the access control decision mechanism obtains the role information of the request initiator according to a user information table and a role information table after receiving the decision requirement, the role of the request initiator is verified to have the right to execute the access request or not through checking the user role table and a role right table, the access request is judged, and the decision result is fed back to the access control executing mechanism. With the adoption of the system and the method, the right management and distribution work are simplified, so that a role-based access control mechanism in a software system is close to the practical conditions of an organization.

Description

technical field [0001] The present invention relates to an access control technology, in particular to a role-based access control system and method. Background technique [0002] Access control technology is mainly to verify the legitimacy of user access. Its main function is to control the use rights of system resources, such as controlling which classified information and operations legitimate users access. It plays a decisive role in restricting users' access to key resources, preventing illegal users from invading, or damage caused by legitimate users' inadvertent operations. [0003] Role-based access control technology is a relatively mature access control model at present. Its main idea is to associate access rights with roles, and associate users with access rights by assigning appropriate roles to users. figure 1 It is a schematic diagram of a typical RBAC model. The model is defined as follows: [0004] The model is defined as follows: [0005] U: User, R Rol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 郭煦
Owner SHANGHAI DIANJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products