Method for role-based access control model with precise access control strategy

An access control strategy and access control technology, applied in the field of security authorization

Active Publication Date: 2006-12-27
HANGYIN CONSUMER FINANCE CO LTD
View PDF0 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Aiming at the coarse-grained problem of existing models when accessing data objects, the present invention provides a method for a role-based access control model with a fine-grained access control strategy, which solves the problem of access control granularity in the standard role-based access control model. Coarse, it can only be accurate to the atomic granularity that a certain role performs a certain operation on a certain object, so that the granularity of access control can be divided more precisely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for role-based access control model with precise access control strategy
  • Method for role-based access control model with precise access control strategy
  • Method for role-based access control model with precise access control strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0110] Example 2 as figure 2 Shown: the user is usually a system user, and the object is usually a database table, but not limited to this, the user can be a program, and the object can also be a data file, an XML file, or any computer resource, and the operations are not limited to the listed ones. It can be expanded arbitrarily according to the actual application system needs.

[0111] For example, in the management information system, the functional items are divided into four categories according to the coarse-grained division: system management, code table management, data processing and report query. Generally, it corresponds to four types of roles, namely, roles related to system management, roles related to computer management, roles related to data processing and roles related to report query.

[0112] System management is used for adding, changing, reviewing, querying, system log monitoring, user locking and unlocking, etc. for users using the system. The roles in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for accessing control model based on identification, with accurate access control strategy, wherein the method comprises: accurate access control strategy and the projection function between function priority and accurate access control strategy; the control strategy is predefined operation dynamic strategy function, which comprises limit logic demanded by service logic on accurate control and the limit based on external condition and context information. The invention can fine the graininess of access control in the standard access control model.

Description

technical field [0001] The present invention relates to a method for security authorization of networked computer resources, and in particular to a technique for providing fine-grained access control to system resources. Background technique [0002] Access control policies represent authorization at the system security policy level. Use policies to authorize, authenticate, and assign roles to access subjects (users, processes), so that only legitimate access subjects can enjoy the services and resources provided by access objects (resource owners). At present, there are three widely recognized access control strategies: autonomous access control strategy DAC, mandatory access control strategy MAC and role-based access control strategy RBAC. These three access control strategies are produced in different eras and under different environmental requirements, and are suitable for different environments. In addition, there are multi-level strategies. The multi-level strategy ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/30
Inventor 石杰
Owner HANGYIN CONSUMER FINANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products