Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system and method for automatically constructing access control policies for high-level information systems

An access control strategy and information system technology, applied in the field of access control of network systems, can solve problems such as inability to "write" operations, failure of users to access resources, and operation failures

Active Publication Date: 2022-07-12
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in an FTP-based application system, according to regulations, a user does not have the ability to "write" a file. When a user logs in through an FTP client to access the file, the "write" operation to the file is not allowed. , but when the user directly logs in to the operating system, he can "write" the file, resulting in omissions in access control
[0005] 2) Conflicts in access control
[0006] That is, the user is allowed to perform access control at a higher level, but not allowed at a lower level, resulting in failure of user access to resources
For example, in the office system, according to regulations, a certain user has the ability to "approve" a certain official document. In the access control policy of the office application system, the user is assigned the ability to "approve". At the operating system level, "approval" The operation may be transformed into multiple operations on operating system resources, but one of the multiple operations is prohibited, resulting in the failure of the "approval" operation, and the phenomenon of access control conflicts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for automatically constructing access control policies for high-level information systems
  • A system and method for automatically constructing access control policies for high-level information systems
  • A system and method for automatically constructing access control policies for high-level information systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make it easy to understand the technical means, creation features, achieved goals and effects of the present invention, the present invention will be further described below with reference to the specific figures.

[0042] Aiming at the problem that the existing access control system is not perfect and cannot provide access control correlation, integrity and consistency, this example builds a high-level information system access control strategy automation construction platform (ie system) to effectively solve access control omissions and conflicts.

[0043] see figure 1 , which shows the composition example of the high-level information system access control policy automation construction platform given in this example.

[0044] As can be seen from the figure, the high-level information system access control policy automation construction platform 100 is mainly composed of an information resource collection module 110, an access control mechanism hierarchi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for automatically constructing an access control strategy of a high-level information system. The scheme is based on an information resource collection module, an access control mechanism hierarchical division module, a subject-object and relationship sorting module, a high-level demand step-by-step essence module, and an automatic strategy The generation module, the information resource collection module collects information resources for the software and hardware products in the entire network system; the access control mechanism hierarchical division module divides the access control mechanism hierarchically; the subject object and its relationship sorting module analyzes the entire network system, Sort out the subject, object and their relationship structure; the high-level requirements are gradually refined by the essence module, the essence of business access requirements and operation and maintenance management access requirements; the policy automatic generation module generates access control policies for each access control mechanism level. This solution enables network system users to perform accurate access control on users no matter what level they access from in the process of accessing resources.

Description

technical field [0001] The invention relates to a network security level protection technology, in particular to an access control technology of a network system. Background technique [0002] At present, the access control points in the entire network system are independent and have no relationship with each other, which leads to the phenomenon of "no correlation, no integrity and no consistency" in the access control process of users accessing resources. This phenomenon is mainly It is reflected in the following two aspects: [0003] 1) Missing access control [0004] That is, users are not allowed to access at a higher level, but are allowed to access at a lower level, so that the user's access control to resources can be bypassed. For example, in an FTP-based application system, according to regulations, a user does not have the ability to "write" a file. When a user logs in through an FTP client to access, the "write" operation to the file is not allowed. , but when ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/205H04L63/105
Inventor 陶源李末岩胡巍
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products