Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Context-aware-based security access control method for RFID system

A security access control and context technology, applied in the field of context-related security access control, can solve the problems of difficult to meet the flexible and high security requirements of the Internet of Things RFID system, achieve simple methods, prevent users from abusing permissions, and solve security problems. Effects of privacy concerns

Inactive Publication Date: 2014-02-05
SUN YAT SEN UNIV
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing RFID middleware system can only provide some basic and static security technologies, and it is difficult to meet the comprehensive, flexible and high security requirements of the IoT RFID system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Context-aware-based security access control method for RFID system
  • Context-aware-based security access control method for RFID system
  • Context-aware-based security access control method for RFID system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Such as figure 1 and figure 2 As shown, the context-based security access control method for RFID systems in the present invention is implemented based on a database, which includes a user set U, a user group set G, a role set R, a permission set P, an operation set OP and a context condition set Σ , wherein, the user set U, user group set G, role set R, authority set P, operation set OP and context condition set Σ are respectively composed of all users u, all user groups g, all roles r, all authority p, all operations op and all context conditions ∑ e In addition, each authority p is assigned one or more operations op, each role r is assigned one or more corresponding authority p according to the task of the role, and each user group g is assigned one or more ops according to the task of the user group For multiple corresponding roles r, the execution of each permission p is determined by the subset of contextual conditions ∑ e Defined, and the context condition su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a context-aware-based security access control method for an RFID system. The method is implemented based on a data base comprising a user set, a user group set, a role set, a permission set and an operation set. The method comprises an initialization step, a dynamic permission authorization review step and a user access control step composed of context condition review, precursor operation review and permission review. The method of the invention has context-aware computing power, and can be used to perceive user context information so as to adjust the action of the RFID system in an intelligent manner, satisfy flexible and complex application environment demands, effectively solve the RFID system security privacy problem in the Internet of things environment, and support the minimum authorization rule, the functional separation strategy and the dynamic veto authorization strategy.

Description

technical field [0001] The invention relates to a security access control method for an RFID system in the field of communication technology, in particular to a context-dependent security access control method applied to an RFID system. Background technique [0002] The Internet of Things has entered our field of vision with a high-profile attitude. It is called the third wave of the world's information industry after computers and the Internet. It is also regarded as the next economic growth point and the creator of the future society. Although the Internet of Things has extremely broad prospects, its existing problems cannot be ignored. Among them, the security problem of the RFID system, which is an important part of the Internet of Things, has become particularly prominent, and has become an important factor that seriously restricts the further development of the Internet of Things, and has become one of the key issues that need to be resolved urgently in the developmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/30
Inventor 蔡庆玲詹宜巨余松森杨健
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products