Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

RBAC (Role-Based policies Access Control) accessing control model based on organization

A technology of access control and organization, applied in the direction of instruments, digital data authentication, electronic digital data processing, etc., can solve the problems of inconvenient management and organization of objects and related operations, inability to facilitate hierarchical authorization, and inability to meet dynamic needs, etc., to meet the requirements of the system Authorization requirements, the effect of eliminating unauthorized authorization issues

Inactive Publication Date: 2014-02-26
SHANDONG HI SPEED INFORMATION ENG
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is a policy-independent, non-autonomous access control model. Users can only passively accept permissions, but cannot actively grant permissions to others. Currently, the RBAC reference model is the most widely used model, but this model is used in complex organizations. There are deficiencies in the application system of institutions and a large number of users, mainly in the following aspects: (1) The traditional RBAC model cannot satisfy the situation that the authority is associated with the organization in the authority allocation and role allocation, and cannot satisfy the flexible and complex system Authorization requirements, there is a problem that the system administrator authorizes other organizational departments beyond authority, and there is a problem that it cannot conveniently and effectively support hierarchical authorization; (2) For complex systems, when there are many objects, it is inconvenient to manage and organize objects and related operations; ( 3) It is a static model and cannot meet the dynamic needs of special circumstances

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RBAC (Role-Based policies Access Control) accessing control model based on organization
  • RBAC (Role-Based policies Access Control) accessing control model based on organization
  • RBAC (Role-Based policies Access Control) accessing control model based on organization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions implemented by the present invention will be described clearly and completely in conjunction with the accompanying drawings of the present invention. The content of this description is only some examples of the present invention. In order to better describe the embodiments of the present invention, the following will combine figure 2 Go through the process of describing authorization.

[0029] figure 2 Suppose there are two departments under an organization-Department A and Department B. Department A has a user-user A, has two permissions-permission A and B (corresponding to operation A and operation B of object A respectively), and has two roles-role A and B (respectively has permission A and permission B) ; Department B has a user-user B, has two permissions-permissions C and D (corresponding to the operation C and operation D of object B), and has a role-role C (has permission C and permission D); at the same time the system The administrator...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an RBAC (Role-Based policies Access Control) accessing control model based on an organization. The RBAC accessing control model comprises users, organizations, roles, objects, operation, conversations and constraint, wherein an organization concept is introduced; each organization is a core and a basic element of the model; all the objects and roles are attached to one certain organization and have only one owner; one organization can own a plurality of users, a plurality of roles and a plurality of objects; the organizations have a leveled relation; the roles of one organization can be given to the other organization to use through authorization between the organizations. The RBAC accessing control model has the beneficial effects that a strict safety strategy can be applied and the authorization requirements of a flexible and complicated system are met; a hierarchical authorization problem and a problem of organizing and managing various object organizations in a complicated system are solved effectively; the RBAC accessing control model can be used for conveniently organizing and managing the objects; dynamic objects are introduced, so that the adaptability is enhanced.

Description

technical field [0001] The invention relates to the technical field of rights management of software development, in particular to an organization-based RBAC access control model. Background technique [0002] With the rapid development of information technology, especially the development of the Internet, and the continuous deepening of enterprise informatization, the information objects in the enterprise have shown exponential growth, and the sharing and reuse of cross-departments in the enterprise have become more and more extensive. Application security and data security It has been greatly challenged, and IT security issues have become increasingly prominent, and have been increasingly valued by relevant personnel. Although system security issues can be found and remedied through post-event audits, a better way is to control from the source and prevent accidents. Before it happens. [0003] There are two main models of early access control: discretionary access contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/6218G06F2221/2141G06F2221/2145
Inventor 常玉涛舒疆红窦文斌
Owner SHANDONG HI SPEED INFORMATION ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products