Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Role-based access control mechanism

A role and mechanism technology, applied in the field of role-based access control, can solve the problems of complex database resource management and authorization, difficulty in granting and granting access and permissions, etc., to reduce burden and cost, ensure security, and maximize flexibility. Effect

Inactive Publication Date: 2016-05-04
SHANGHAI ZANYUE SOFTWARE SERVICE CENT
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In large-scale database application systems, there are often a large number of tables and views, which makes the management and authorization of database resources very complicated.
It is very difficult for users to directly manage the access of resources in the database and the granting of permissions. It requires users to have a thorough understanding of the database structure and the use of SQL language. Once the application system structure or security requirements change, A large number of complex and cumbersome authorization changes are required, which is very prone to some unexpected security holes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role-based access control mechanism
  • Role-based access control mechanism
  • Role-based access control mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] exist figure 1 In , all entities and steps of the role-based access control model are represented. The role-based access control model sets a new entity-role between users and permissions. Roles serve as an intermediary to connect user collections and authority collections, and users access database resources indirectly through roles. The association between a role and permissions can be regarded as a set of permissions owned by the role, and the association with users can be regarded as a collection of several users with the same identity. A user can be assigned multiple roles, and a role can also be assigned multiple users. There is a many-to-many relationship between users and roles. Similarly, a role can have multiple permissions, and a permission can also be assigned to multiple different roles. There is also a many-to-many relationship between roles and permissions. A user who logs in to the database application system can judge the database resources he can ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a role-based access control mechanism, relates to the technical field of role-based access control, and especially relates to a mechanism of indirectly accessing database resources by means of packaging access permission in roles by a system application and endowing a user with a role. As an intermediary, the role links the user and an access, and the user can indirectly access the database resources through the role. Role authority distribution of an access control module is to distribute an operation authority of an application layer system function item to the role, and the role manipulates the database resources through a function item of an operating system. The embodiment of the invention provides a role-based access control mechanism, and a role-based access control scheme for the whole system in the application layer uniformly. The system application packages access permission in roles and endows the user with the role so that the user can indirectly access the database resources, therefore the burden and cost of authority management can be greatly reduced, and the authority management of the system achievesgreat flexibility.

Description

technical field [0001] The invention relates to the technical field of role-based access control, in particular to a system application encapsulating access authority to a role and assigning it to a user to indirectly access a database resource mechanism. Background technique [0002] Role-based access control (RBAC) is a new type of database permission management mechanism that has been studied the most and has the most mature thinking in recent years. It is considered to be an ideal candidate to replace traditional mandatory access control (MAC) and discretionary access control (DAC). . The basic idea of ​​role-based access control (RBAC) is to divide different roles according to different functional positions in the enterprise organization view, encapsulate the access rights of database resources in roles, and users access database resources indirectly by being assigned different roles . [0003] There are often a large number of tables and views in large database appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2141
Inventor 叶君玉
Owner SHANGHAI ZANYUE SOFTWARE SERVICE CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products