TW493122B - Computer security system - Google Patents

Computer security system Download PDF

Info

Publication number
TW493122B
TW493122B TW90105125A TW90105125A TW493122B TW 493122 B TW493122 B TW 493122B TW 90105125 A TW90105125 A TW 90105125A TW 90105125 A TW90105125 A TW 90105125A TW 493122 B TW493122 B TW 493122B
Authority
TW
Taiwan
Prior art keywords
access
asset
user
role
security
Prior art date
Application number
TW90105125A
Other languages
Chinese (zh)
Inventor
Daniel Brown
Fernando Zapata
Roger Frech
David Shelor
Original Assignee
I2 Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by I2 Technologies Inc filed Critical I2 Technologies Inc
Application granted granted Critical
Publication of TW493122B publication Critical patent/TW493122B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A security system for a computer system provides one or more security domains. Access to assets registered to the security system is controlled by rights and privileges. Rights are derived from roles, and each user is assigned one or more roles. Privileges are attached to assets, and an appropriate combination of rights and privileges is required before a user is granted the specified type of access to the asset.

Description

五、發明說明(1 ) 相關申請案的相互參照 本發明於西元2000年3月6 η & , 6日ί疋出美國臨時申請案第 60/1 87375號的利益。 發明背景 1 ·發明領.域: 本發明通常相關於電腦系統,並且更特別地是相關於安 全系統和用於控制與授權存取電腦系統的方法。 2 ·先前技藝説明: . 旦安全對於同意多重使用者存取的電腦系統是重要的考 里曰存取可;k外邵貫體限制區域、像是通常透過網際網 路可獲得的系、统,這特別爲眞實。當系統成爲更複雜並且 存取需要更廣泛分佈的資料時,安全系統傾向成爲更複 於不同企業透過分散電腦系統共享資料和程序的背景 中,該問題會產生。安全從多於一個位置、由多於一個: 來管理將成爲更重要·。進而由於不同公司以不同方二 來言業,意欲由不同企業使用的安全系統必須能有彈性並 且能夠容納不同安全的實作(implemenUti〇n)。 、 現有安全系統通常是不方便的,並且不具有所需要的彈 ^提供有彈性、可延伸、並允許多重管理者同時操作以 提供所需安全的電腦安全系統是需要的。像是允許管理者 相較於原始所提供,定義新增型態的安全並且供應安全給 新增型態的物件之系統是需要的。 發明概述 本紙張尺度適用中國國家標準 -4- (CNS)A4 規格(210 X 297 公釐 ) 五 發明說明( 根據本發明,一種用#人^ 禋用万“疋供-個或更多安全領域電脗玄 仏女王㈣。存取已於安全 以 限來控制。權力從角色行峰而山 己的八屋又根力與權 需要的。“的存取…權力和權限適當的結合是V. Explanation of the invention (1) Cross-reference of related applications The present invention was issued on the 6th of March 2000   the benefit of US Provisional Application No. 60/1 87375. BACKGROUND OF THE INVENTION 1. Field of Invention. Field: The present invention relates generally to computer systems, and more particularly to security systems and methods for controlling and authorizing access to computer systems. 2 · Previous technical descriptions:. Once security is important for a computer system that allows multiple users to access it, accessibility is restricted; k outside the restricted area, such as systems and systems usually available through the Internet, this Especially for real. This problem arises as systems become more complex and access requires more widely distributed data, and security systems tend to become more complex in the context of different companies sharing data and processes through decentralized computer systems. Security will be more important from more than one location: Furthermore, since different companies speak business in different ways, the security systems intended to be used by different enterprises must be flexible and able to accommodate different security implementations (implemenUti). Existing security systems are usually inconvenient and do not have the required bullets. It is necessary to provide a computer security system that is flexible, extensible, and allows multiple managers to operate simultaneously to provide the required security. For example, a system that allows managers to define new types of security and supply security to new types of objects compared to what was originally provided is needed. SUMMARY OF THE INVENTION The paper dimensions are applicable to the Chinese National Standard -4- (CNS) A4 specification (210 X 297 mm). 5 Description of the invention (According to the present invention, one use # 人 ^ 禋 用 万 "疋 Supply-one or more security fields Electric 脗 Xuan Zang Queen ㈣. Access has been controlled within the limits of security. Power from the peak of the role while Yamaha's Hachiya has the power and power needed. "Access ... The right combination of power and authority is

圖示簡述 本:明:特色、所相信的特徵於附加申請專 述。然而本發明本身,還有使用的較適模式、進 — 所伴隧圖式一併參讀時,可參考所于且邮 貫施例之後續詳述以能最佳地理解,其中: 下八月豆 圖1馬提供安全給電腦系統的系統區塊圖; 訂 圖2爲根據本發明,所顯示電腦安全系統結構圖. 圖#4a-b爲根據較適具體實施例,顯示領域 (domain relationship)圖; ’ ’、 ▲ 圖圖5爲顯示同意存取和授權給使用者之較適步驟之附 .圖6爲顯示於較適安全系、统内角色之使用的附圖;. 經濟部智慧財產局員工消費合作社印製 圖圖7爲顯示於較適具體實施例中權力和權限間關係的附 圖8和9爲根據較適具體實施例,顯示存取控制表列 (access control list,ACL)較適之使用; , 圖1 〇爲顯示權限雙向移轉之使用的附圖;及 圖11和12爲顯示較適使用者授權方法的區塊圖。Brief description of the illustrations: Ming: The characteristics and believed characteristics are described in the attached application. However, the present invention itself, as well as the more suitable mode and the associated tunnel pattern, can be best understood by referring to the subsequent detailed description of the present and post examples, where: Figure 1 is a block diagram of a system that provides security to a computer system. Figure 2 is a structural diagram of a computer security system displayed according to the present invention. Figures # 4a-b show a domain relationship according to a more specific embodiment. ) Figures; '', ▲ Figure 5 is a diagram showing the appropriate steps to consent to access and authorization to the user. Figure 6 is a diagram showing the use of roles in a more secure system and system; Printed by the property bureau employee consumer cooperative Figure 7 shows the relationship between power and authority in a more suitable embodiment Figures 8 and 9 show an access control list (ACL) ) Is more suitable for use; Figure 10 is a diagram showing the use of bidirectional transfer of authority; and Figures 11 and 12 are block diagrams showing a more suitable user authorization method.

本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) A7This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) A7

--~-----gZ 五、發明說明(3 ) 較適具體貫施例說明 那些熟知本相關技藝人士將了解下列描述可以輕易地於 许多不同底層系統上實作。所述系統説明一組用於同意使 用者存取於被保護系統上可獲得之各種檔案、可執行程 式、和其他系統資產之技術和方法的特別集合。所述安全 系、洗和方法不而要^疋供完整系統安全,但是可以由其他廣 泛可取得產品來補充以提供完整的安全。如熟知本相關普 通技藝人士將認知,以下描述指出在任何所想要系統上實 作的地方和如何實作。 圖1爲根據本發明較適具體實施例實作之安全系統的區 塊圖。圖1顯示較適系統的架構,以特別的焦點於安全的 服務上。第一主機(host machine) 1〇包括網頁伺服器應用 12和伺服小程式引擎(servlet engine) 14。位於伺服小程式 14中的應用邏輯(appiicati〇n丨ogic) 16對可爰用的安全應用 程式介面(Application Program Interface,API)進行程序内呼 叫(in-process call)。此安全服務與資料庫18通訊,其可以 爲透過JDBC鏈結(link) 20的Oracle資料庫。 經濟部智慧財產局員工消費合作社印製 弟一主機22包含所欲存取所在的應用2 4功能。應用2 4依 序倚賴安全服務26以存取控制資訊。於一具體實施例中, B0伺服器24爲C++引擎,並且使用稱爲DNA橋接器28 (bridge)的C0RBA伺服器與安全26通訊。DNA橋接器28負 責傳送原始允許權(permissibility)資料到B0伺服器24,其 然後處理眞正的執行(enforcement)。 所述安全模型位於領域29概念的中央處,如圖2所示。 -6- _本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐7 493122 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(4 ) 領域爲圍繞一組安全實體(security entity)之管理和存取控 制邊界。這些實體包含: 1 ·成員(member) 30,31,其爲已於該領域認證過的使用 者; 2 ·群組(group) 32,其爲一群用來方便管理的成員; 3 ·角色(role) 34,其代表成員可以擔任的責任; 4 ·註册資產36 (registered assets),其爲系統負責保護的資 源; . 5· ACL (Access control list,存取控制表列)38,其定義當 存取資產時,角色可以擁有的權限。 領域被用來對成員提供傳送箱(sandb〇x)。傳送箱控制於 一段期間内哪個成員可以對系統控制哪個資產。系統有許 多領域,其邵份或所有領域於任何給定時間點上可以使 用。領域可以對映到安全的外部實體,但是許多應用僅已 發現將領域對映到企業/公司的需要。 對於一段期間内,大多數的實體位於單_領域内,但是 存在一些具有跨越數個領域之可見度的特殊實體。這些其 中之一,全面安全管理者4〇 (universal security admmiStrat〇r,也稱爲超級使用者,,,super user”),爲允許 管理整個安全模型的一特殊成員,包含位於任何領域内所 有實體。其他特殊實體爲角色。安全使用角色來實作陳述 式(declarative)和程式型(pr〇grammatic)安全。於系統中有 兩種角色: 1.領域角色34 (d〇main r〇le),其僅有在單—領域内爲可見-~ ----- gZ V. Description of the invention (3) It is more suitable for specific examples. Those skilled in the art will understand that the following description can be easily implemented on many different underlying systems. The system describes a special set of techniques and methods for granting users access to various files, executables, and other system assets available on the protected system. The security system, washing method, and method are not limited to complete system security, but can be supplemented by other widely available products to provide complete security. As those skilled in the relevant art will recognize, the following description indicates where and how to implement on any desired system. FIG. 1 is a block diagram of a security system implemented according to a more suitable embodiment of the present invention. Figure 1 shows the architecture of a more suitable system with a particular focus on secure services. The first host machine 10 includes a web server application 12 and a servlet engine 14. The application logic (appiicatiónogic) located in the servo applet 14 makes an in-process call to an available secure application program interface (API). This security service communicates with database 18, which can be an Oracle database via a JDBC link 20. Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. The main unit 22 contains the functions of the application 2 to be accessed. Application 24 relies on security services 26 in order to access control information. In a specific embodiment, the B0 server 24 is a C ++ engine, and uses a CORBA server called a DNA bridge 28 (bridge) to communicate with the security 26. The DNA bridge 28 is responsible for transmitting the raw permissibility data to the B0 server 24, which then handles the enforcement. The security model is located at the center of the domain 29 concept, as shown in FIG. 2. -6- _ This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 mm 7 493122 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (4) The field is around a group of security entities (Security entity) management and access control boundaries. These entities include: 1 • members 30, 31, which are users who have been authenticated in the field; 2 • group 32, which is a group Members used to facilitate management; 3 · Roles 34, which represent the responsibilities that members can assume; 4 · Registered assets 36 (registered assets), which are the resources that the system is responsible for protecting;. 5 · ACL (Access control list, Access control list) 38, which defines the permissions that a role can have when accessing assets. The realm is used to provide members with sandboxes. The box controls which members can control the system over a period of time. Which asset. The system has many domains, and its domain or all domains can be used at any given point in time. Domains can be mapped to secure external entities, but many applications have only found general Mapping to the needs of the enterprise / company. For a period of time, most entities are located in a single domain, but there are some special entities with visibility across several domains. One of these, the comprehensive security manager 40 ( universal security admmiStrator, also known as super user "), is a special member that allows management of the entire security model, including all entities located in any domain. Other special entities are roles. Security uses roles to implement Declarative and programmatic security. There are two roles in the system: 1. Domain role 34 (d〇main role), which is visible only in the single-domain

(請先閱讀背面之注意事項 __· I I 本頁) 訂 --線-(Please read the notes on the back __ · I I page) Order --line-

五、發明說明(5 ) 的;和 2 ·全域角色42 (universal r〇ie),其跨越所有領域都爲可見 的。 全域角色4 2代表被數個協同領域(c〇Uab〇rating如⑽丨旧) 所共同接.受和了解的使用者權責。其存在,因而共用的應用 程式的工作流程對於其所有使用者是一致—且被了解的。 領域角色34位於其被定義所在領域之内才具有意義。 於連線期間初期使用者所向認證的領域宣告其可以使用 的角色。以下範例顯示: 1 ·;襄領域爲頂點電腦"(Acme Computers)和,,貝塔銀行 "(Beta Bank) 2 .痕成員爲’’jsmith,’ 3 ·遠全域角色爲”管理者”(Administrator)和,,採購者 (Purchaser) 4 ·讓對貝塔銀行的領域角色爲,,櫃員’,(Teller) 5 ·讓對頂點電腦的領域角色爲,,組合者”(Assembler) 6·讓jsmith被指定給兩個領域 經濟部智慧財產局員工消費合作社印製 7.讓j smith被指定給管理者、採購者、和櫃員等角色 如果jsmith登入頂點電腦領域,其主動角色集合包括: 管理者,採購者 如果jsmith登入貝塔銀行領域,其主動角色集合包括·· 管理者,採購者,櫃員 豸豆入到頂點電腦’成貝jsrnith不具有組合者角色,因 爲其未被授與該角色。 -8 - 本紙張尺度_適用中國國家標準(CNS)A4規格(21G X 297公爱了 493122 A75. Description of the invention (5); and 2. Universal role 42 (universal role), which is visible across all fields. The global role 4 2 represents the user rights and responsibilities shared by several collaborative areas (c〇Uab〇rating as old). It exists, so the workflow of a shared application is consistent—and understood—for all its users. The domain role 34 is meaningful only if it is within the domain in which it is defined. During the initial period of the connection, the user announces the roles he can use to the authentication domain. The following examples show: 1 · Xiang field is Acme Computers (Acme Computers) and Beta Bank (Beta Bank) 2. Trace members are "jsmith," 3 · Far global role is "manager" ( Administrator) and, Purchaser 4 · Let the field role of Beta Bank be, Teller ', (Teller) 5 · Let the field role of Vertex Computer be, Assembler 6 · Let jsmith Designated to be printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs of the two fields. 7. Let j smith be assigned to the roles of manager, purchaser, and teller. If jsmith logs into the vertex computer field, his active role set includes: manager, If jsmith logs into the field of beta bank, its active role set includes: · manager, purchaser, teller 豸 pea into the top computer 'Chengbei jsrnith does not have the role of combiner, because it has not been granted this role. -8 -This paper size_Applicable to China National Standard (CNS) A4 specification (21G X 297 public love 493122 A7

五、發明說明(6 ) 兩個領域可以藉由信賴關係(trust reiati〇nship)來結合 (join)。k賴關係決定權限如何從一個領域授權給另一個 領域。信賴可以是單向或是雙向,如圖3所示。例如,領 域ABC 50具有與領域DEF 54單向的信賴關係(ABC信賴 DEF) ’其意指ABC’s上資產的權限可從a,BC授權給DEF。 ABC 50具有與χγζ 52雙向的信賴關係,其意指abc,s上資 產的權限可以流到XYZ,且反向亦成立。 領域還可以擁有另一個領域,即負責其生成和消滅。如 圖4中所示,親子拓樸圖(parent-chiid topology)被用來代表 領域擁有權及於兩領域間缺少擁有權關係時,使用端對端 (peer-to-peer)拓樸圖。 信賴和擁有權觀念可以被結合。例如,一群領域可以再親 子拓樸圖中相連在一起,其每個連接也爲單向信賴。此意 指權限可從最頂層領域授權到較低層級的領域·。其還意指 每個領域產生位於其下方之領域。 於前段中所述模型可以用一個例子來顯示。假設客户對 其目綠(catalog)和種類(categ〇ry)使用此模型。客户產生下 屬領域並且然後讓每個下屬存取其目綠和種類的子集合。 其下屬依序產生分佈者領域並且讓分佈者存取目錄和種類 更夕的子集合。於需求產生時,支援額外的領域關係和拓 樸圖將被加入。 與一使用者結合之安全首長” SeCudty ρΓίη(:ίρΑ"包含領 域和角色-決定使用者可存取什麼。如^所示,於使用者 被認證後需要安全首長。認證建立使用者之識別,其 (請先閱讀背面之注意事項 I I · I I 本頁) 線· 經濟部智慧財產局員工消費合作社印製 -9- 493122 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(7 ) 可以被用來獲得使用者於企業領域中之涉入程度等相關資 訊(像是其所被僱用的公司和所登入的入門處(p〇rtal))。這 些’’企業首長”(business Pdncipais)後續被用來衍生對於該 成員應該生效的安全首長。該系統使用這些安全首長來決 定認證決.策。 、 如圖6中所指示,角色62可以直接授與成員63,或是其 可以將64授與給群組66。指定給該群組的任何成員將依序 接收由群組角色64所享用的權限。成員和角色間的關係將 於登入時動態地被確定。成員63可以被授與多重角色,但 是僅有其子集合可以於特定領域内是有用的。例如,如圖 6中的成員63被授與角色1 62和角色2 64,但是領域a 68僅 允許其使用角色1 62,然而領域b 70允許其使用角色i和 2 角色於領域内疋否有用取決於角色的型聲(即全域角 色或領域角色)。 如圖7所示,一成員已被授權的角色最終決定該成員可 以存取何種資產74。存取控制決策爲結合權力盥權限 成。 〃 1 ·權力76被附加到角色72和覆蓋於資產上的權限。例 如,全域安全管理者(超級使用者)4〇具有可以讓其管 理系統中任何資產的特殊權力,而無視於該資產上所 指定的權限。全域安全管理者爲由安全系統所定義權 力之一例,但是權力還可以被應用程式所定義。基於 特殊角色之控制工作流程的應用程式内隱地將全力附 加到該角色。 -1 0 - 家標準(CNS)A4規格咖X 297公釐) (請先閱讀背面之注意事項 丨•丨I 本頁) 訂· ;線_ π 122 A7 B7 經濟部智慧財產局員工消費合作社印製 $、發明說明(8 ) 2 ·權限78附加到資產74並且被用來同意對資產之精緻程 度的存取。 單一權限識別何種作業可以由何種角色於何種資產上進 行。將權限附加到資產74的機構爲存取控制表列(ACL) 80。ACL 80 包含一串存取控制項 82 (access control entry, ACE) ’其中母項包含一個領域識別器(domain identifier) 84、角色識別益(role identifier) 86、和一個或多個權限 88,如圖8所示。領域識別器84和角色識別器86爲可以結 合一個或更多成員的安全首長。ACE 82包含兩者,因爲對 角色的權限必須被領域所規範(如Admin可以能夠在一個領 域中進行某些作業,但是在不同領域内可能會被阻止進行 同樣的作業)。 權限允許領域/角色之結合已進行於該資產上的作業。如 圖9所示,基本作業包括了讀取(read)和寫入(write)。其他 作業可以獲得,但是這些取決於被管理資產的型態。 除了權限,領域/角色可以透過在ACL上特殊作業來同意 擁有權。ACL的擁有者於特定限定内被允許可修改: 1 ·如果領域/角色擁有在ACL上的作業,擁有領域/角色 首長結合的成員可以同意於不同領域内相同角色的作 例如,在圖9中,在領域ABC中的成員及具有角色F〇〇擁 有在ACL上的寫入作業。此成員有效地成爲ACL的管理者 並且因而被允許同意寫入作業給領域DEF中的角色Foo。 他也被允許同意領域DEF/角色Foo寫入作業的擁有權。 -11- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項 本頁)V. Description of the invention (6) The two fields can be joined by a trust relationship. Reliance determines how authority is delegated from one domain to another. Trust can be one-way or two-way, as shown in Figure 3. For example, domain ABC 50 has a one-way trust relationship with domain DEF 54 (ABC trust DEF) 'which means that the authority of assets on ABC's can be delegated from a, BC to DEF. ABC 50 has a two-way trust relationship with χγζ 52, which means that the rights of assets on abc, s can flow to XYZ, and the reverse is also true. A realm can also have another realm, which is responsible for its generation and destruction. As shown in Figure 4, a parent-chiid topology is used to represent domain ownership and when there is a lack of ownership between the two domains, a peer-to-peer topology is used. Trust and ownership can be combined. For example, a group of fields can be connected together in a parent-child topology graph, and each connection is also a one-way trust. This means that authority can be delegated from the top-level realm to the lower-level realm. It also means that each field produces a field below it. The model described in the previous paragraph can be shown using an example. Suppose a customer uses this model for his catalog and category. The customer generates subordinate fields and then gives each subordinate access to a subset of its green and species. Its subordinates in turn generate distributor domains and allow distributors to access directories and more recent subsets of categories. As demand arises, additional domain relationships and topology maps will be added. Security heads combined with a user "SeCudty ρΓίη (: ίρΑ " includes fields and roles-determine what users can access. As shown by ^, a security head is required after a user is authenticated. Authentication establishes the identity of the user, Its (please read the precautions on the back of the page II · II page) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs-9- 493122 A7 B7 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Can be used to obtain information about the user's level of involvement in the business sector (such as the company they are employed in and the portal they are logged in to). These "business leaders" (business Pdncipais) It is subsequently used to derive security heads that should be effective for that member. The system uses these security heads to determine authentication decisions. As indicated in Figure 6, role 62 can be directly granted to member 63, or it can be 64 Granted to group 66. Any member assigned to the group will receive the privileges enjoyed by group role 64 in sequence. The relationship between members and roles will be updated at login Determined. Member 63 can be granted multiple roles, but only its subset can be useful in a particular domain. For example, as shown in Figure 6, member 63 is granted role 1 62 and role 2 64, but domain a 68 only allows them to use roles 1 62, but domain b 70 allows them to use roles i and 2. Whether a role is useful in the domain depends on the role's voice (ie, global role or domain role). As shown in Figure 7, a member The authorized role ultimately decides what kind of asset 74 the member can access. The access control decision is made by combining authority and authority. 〃 1 · Authority 76 is attached to role 72 and authority over the asset. For example, global security Supervisors (super users) 40 have special powers that allow them to manage any asset in the system, regardless of the authority specified on the asset. The global security manager is an example of the power defined by the security system, but the power is still Can be defined by the application. The application based on the control workflow of the special role implicitly attaches full force to that role. -1 0-Home Standard (CNS) A4 Specification Coffee X 29 7mm) (Please read the precautions on the back of this page 丨 • 丨 I on this page) Order ·; Line _ π 122 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy ($ 8), Invention Description (8) 2 · Authority 78 additional To the asset 74 and is used to consent to access to the degree of refinement of the asset. A single authority identifies which jobs can be performed by which roles and on which assets. The authority that attaches permissions to the asset 74 is an access control list (ACL) 80. ACL 80 contains a series of access control entries 82 (ACE) 'where the parent entry contains a domain identifier 84, role identifier 86, and one or more permissions 88, such as Figure 8 shows. The realm recognizer 84 and the role recognizer 86 are security heads that can combine one or more members. ACE 82 includes both, because permissions to roles must be regulated by the domain (for example, Admin may be able to perform certain operations in one domain, but may be prevented from performing the same operations in different domains). Permissions allow a combination of realms / roles to work on that asset. As shown in Figure 9, the basic job includes read and write. Other jobs are available, but these depend on the type of asset being managed. In addition to permissions, realms / roles can agree to ownership through special operations on the ACL. The owner of the ACL is allowed to be modified within certain limits: 1 · If the domain / role has operations on the ACL, members who have the combined domain / role head can agree to work in the same role in different domains. For example, in Figure 9 A member in the field ABC and has the role F〇〇 has a write job on the ACL. This member effectively becomes the administrator of the ACL and is therefore allowed to agree to write jobs to the role Foo in the domain DEF. He was also allowed to agree to ownership of the domain DEF / role Foo write job. -11- This paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back page first)

JJ*CJJ * C

I A7 ------ —__R7 — _ 一 五、發明說明(9 ) ACL擁有權和管理爲於領域間權限被移轉的機制。於權 限的單向移轉中,角色的能力傾向減少進一步從”基地” (home)領域(即資產被產生的地方)移走。這是因爲管理者 可能未冒傳遞比其擁有更多的權限。至多,跨越所有領域 時,角色能力將保留一致,但是實際上這,是不可能的。 在權限雙向的移轉中,如圖丨〇所示,角色的能力將根據 詢問中資產來變動, 已註册資產爲安全系統負責保護的資源。已註册資產根 據他們貝產型態來分類,其決定資產應該如何被識別並且 何種作業可對其進行。基本資產型態的一種可能名列包括 價格群組(price group)、價格模式(Price template)、目錄、 類別、產品群組、和URL。此名列於開展訂單系統或類似 企業有用。新資產型態可以於開展時被定義,如下文所 述0 經濟部智慧財產局員工消費合作社印製 貧產型態定義形而上層次(meta-level)和實例層次 (instance-level)作業。形而上層次作業爲那些不需實例運 作的作業,例如生成作業可以對價格模式被觸發,但是不 能應用到實例,因爲實例尚未存在。實例作業,像是讀 取、寫入、和刪除,爲在外顯實例上進行的作業,像是刪 除價格模式,需要特定實例來刪除。 個別資產透過已知如moniker的名字來識別。Moniker爲 符合如被資產型態所定義預定格式的文數字字串。 Moniker天生可以是階層式,並且可以用固定的描述式來 足義。例如’型態URL的資產可以具有以下以做爲moniker: -12- >紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) 493122 A7 __—___B7 五、發明說明(10 ) /RhythmAuthor/Content/Pricing/CategoryList.jsp 上層資產將如下: /RhythmAuthor/Content/Pr icing 較週系統支援兩種認證模式:決策爲基礎(decisi〇n_based) 和賦名爲.基礎(entitlement-based)。兩個模1式間主要的〆異 爲被安全系統返還的資訊。於決策爲基礎的模式中,如圖 11所示,簡單是/否的回答被返還給用户端。決策爲基礎 認證可由下列順序所定義: ‘ 1 ·起始者90傳送需求到資源管理者92。需求包含資產、 在忒貝產上進行的作業、和起始者的首長(角色和領 域)〇 2 ·需求被位於資源管理者92内之存取強制功能94所攔 截。 3 ·存取強制功能94轉送需求資訊到存取決策功能96。 4 ·存取決策功能96提出對該需求是/否的判斷並且將此 決策返還給存取強制功能94。 5 ·存取強制功能94基於所提供的建議採取適當動作(例 如,允沣需求進行、重導、傳送錯誤訊息等)。僅於 起始者首長允許時,存取被允許到資產98。 經濟部智慧財產局員工消費合作社印製 (請先閱讀背面之注意事項寫本頁) 在賦名爲基礎的模式中,圖示於圖12,一組物件99被返 還、用户端。賦名爲基礎認證可由下列順序所定義: 1·起始者90傳送讀取需求到資源管理者92。此需求包含 查詢條件(query criteria)(如所有電腦週邊相關目綠)和 起始者之首長。 _— _13_ (CNS)A4 規格 χ 挪公爱) 493122 A7 B7 五、發明說明(11 ) 2 ·該需求被位於資源管理者92内之存取強制功能94所掏 截。 3 ·存取強制功能94轉送需求資訊到查詢修改功能1 〇〇。 閱 I 面 S $ 項 4·查詢修改功能1 〇 〇將安全相關標準加入需求並執行企 業查詢(business query)102。 5 .該查詢的結果被返還到存取強制功能94 ° 6 ·存取強制功能94採取適當動作(如將查詢結果返還終 起始者,重導,等)。 1 被返還的物件符合應用特定標準和某些安全特定標準。 查詢結果包含僅有該起始者有讀取存取權的物件,其可能 是那些被要球的子集合。 訂 較適具體實施例允許實作者定義新的資產型態。定義新 資產型態的步驟如下: 線 經濟部智慧財產局員工消費合作社印製 1 ·於SEC—ASSETJTYPE表格中產生一個新列(row)。對攔 NAME,DESCRIPTION,和FORMAT供應數値。後者必 須爲一個定義單一 moniker格式的有效固定描述式(即 被用來識別該資產的字串的命名格式)。此單獨 (uniqueness)的需求存在是因爲當對資產做一需求時, moniker被提供以做爲參數。爲了安全以將資產配合其 正確型態,moniker參數對每個命名格式來被比較。 只要正確配對出現,資產型態會被發現。例如, monikerMBLM:CM.Catalog.Catalog:[2FA4A958AA83 11D498 5A00508BD626C1]"不能被錯認爲用於URL資產型態的 moniker,因爲其將不符合URL格式'’(/[A-Za-zO- -14- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) A7 _______B7 _ 五、發明說明(12 ) 9/·—]+)([?] {〇,1} ·*),,〇 2 ·決定何種作業應該應用到新的資料型態。如果這些作 業未已存在於SEC_OPERATION表格中,進行並加入他 們。對襴NAME,DESCRIPTION,和 META—FLAG。 如果作業是實例層次,對最後欄位的,數値應該爲,,僞’, (false),如果作業是形而上層次,對最後攔位的數値 應該爲”眞n (true)。 3 .經由加入項到SEC—ASSET_OPERATION表格,將該作 業與新資產型態結合。此表格僅是一個鍵結表以便利 在資產型態和作業間多對多關係(many-to-many relationships) ° 上文描述宣述較適安全系統的機構和步驟。雖然所使用 的字眼相對地能自我解釋(self-explanatory),下列名單將 輔助熟悉本技藝人士了解該描述·· 存取決策功能(Access Decision Function,ADF):提出認證 決策(是/否)。ADF是安全系統的内部。 存取強制功能(Access Enforcement Function,AEF):反應認 ’證決策的過程。aef典型地控制工作流程並且可以是安全 系統的内部或外部。 經濟部智慧財產局員工消費合作社印製 存取賦名功能(Access Entitlement Function):執行查詢並 限制起始者.僅有具有讀取存取權那些物件的結果之過程。 主動首長集(Active Principal Set, APS):對一特別成員的 一群首長。APS在使用者被認證後動態地決定。 匿名使用者(Anonymous User):識別未被系統檢查的使用 -15- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 493122 Α7 Β7 五、發明說明(13 ) 者。匿名使用者被認爲不値得信賴。 貧產(Asset);可選做爲安全系統保護的資源。其爲眞正實 體檔案、應用軟體、物件、或資料集合。 資產型態(Asset Type):具有相似安全特徵的資源目錄。資 產型態與、一個或更多作業相結合,並且作.業與一個或更多 資產型態相結合)。 認證(Authentication):決定使用者識別的過程。認證確認 使用者是其所宣稱者,但是未說出任何關於在已註册資產 上進行的權力。 已認證使用者(Authenticated User):識別已被系統檢查過 的使用者。 授權(Authorization):確定使用者是否具有在已註册(被保 護)資產上進行作業的權力。授權可以在兩種模式發生·· 1·決策模式,起始者提出需求以進行在資產上的作業並 且是/否的回應已提出。 2·賦名模式,起始者提出讀取需求以進行在資產上的作 業,並且該資產過濾後的子集合被提供。過濾後的子 集合包含僅有那些起始者被允許讀取的資產。 經濟部智慧財產局員工消費合作社印製 !! · I I (請先閱讀背面之注意事項寫本頁) •線- 身分證明(Credential):使用者提供給系統以證明其識別的 項目。身分證明可以包含使用者知道(如密碼)或擁有(如數 位證明,digital certificate)的事物。 群組(Group): —組被命名具有類似特徵的成員。 起始者(Initiator):提出安全系統需求的用户端。起始者可 以是使用者或應用程式。 -16· 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 χ 297公釐) 493122 A7I A7 ------ —__ R7 — _ One V. Description of the invention (9) ACL ownership and management is a mechanism for transferring authority between domains. In a one-way transfer of authority, the character's ability to diminish is further removed from the "home" domain (where the asset is created). This is because managers may not pretend to have more permissions than they have. At the most, role abilities will remain consistent across all areas, but in reality this is not possible. In the two-way transfer of authority, as shown in Figure 丨, the role's capabilities will change based on the assets in question, and the registered assets are the resources protected by the security system. Registered assets are classified according to their shell type, which determines how assets should be identified and what operations can be performed on them. One possible list of basic asset types includes a price group, a price template, a catalog, a category, a product group, and a URL. This name is useful for developing order systems or similar businesses. New asset types can be defined at the time of development, as described below. 0 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. The definition of the poor production type is meta-level and instance-level. Metaphysical jobs are those that do not require instance operations. For example, a generation job can be triggered on a price model, but it cannot be applied to an instance because the instance does not yet exist. Instance jobs, such as read, write, and delete, are jobs performed on explicit instances, such as deleting price patterns, and require specific instances to delete. Individual assets are identified by names such as moniker. Moniker is an alphanumeric string that conforms to a predetermined format as defined by the asset type. Moniker can be hierarchical in nature, and can be defined by fixed descriptions. For example, the asset of the type URL can have the following as a moniker: -12- > Paper size applies Chinese National Standard (CNS) A4 specifications (210 X 297 public love) 493122 A7 ______B7 V. Description of the invention (10) /RhythmAuthor/Content/Pricing/CategoryList.jsp The upper-level asset will be as follows: / RhythmAuthor / Content / Pr icing The system supports two authentication modes: decision-based (decisi〇n_based) and entitlement-based. . The main difference between the two modes is the information returned by the security system. In the decision-based model, as shown in Fig. 11, a simple yes / no answer is returned to the client. Decision-based authentication can be defined by the following sequence: ‘1. The initiator 90 transmits a request to the resource manager 92. The requirements include assets, operations performed on the shellfish, and the head (role and field) of the initiator. 2 • The requirements are blocked by the access enforcement function 94 located in the resource manager 92. 3. The access force function 94 forwards the demand information to the access decision function 96. 4-The access decision function 96 makes a judgment as to whether the demand is yes / no and returns this decision to the access forcing function 94. 5 • Access Mandatory Function 94 Take appropriate action based on the suggestions provided (for example, allow demand to proceed, redirect, send error messages, etc.). Access is allowed to asset 98 only if the initiator's head permits. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs (please read the notes on the back to write this page) In the mode named as basic, the picture is shown in Figure 12, and a set of objects 99 are returned to the client. Named basic authentication can be defined by the following sequence: 1. The initiator 90 transmits the read request to the resource manager 92. This requirement includes query criteria (such as all related greens around the computer) and the head of the initiator. _— _13_ (CNS) A4 Specifications χ Nogongai) 493122 A7 B7 V. Description of the Invention (11) 2 · The requirement is cut by the access force function 94 located in the resource manager 92. 3 · Access forcible function 94 forwards demand information to query modification function 1 00. See item I $ S 4 Query modification function 1 〇 Add security related standards to requirements and execute business query 102. 5. The result of this query is returned to the access forcing function 94 ° 6 · The access forcing function 94 takes appropriate action (such as returning the query result to the end initiator, redirect, etc.). 1 The returned item complies with application-specific standards and certain safety-specific standards. The query result contains only objects that have read access to the initiator, which may be a subset of the balls that were requested. Modifying a more specific embodiment allows the author to define a new asset type. The steps to define a new asset type are as follows: Online Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 1 · Generate a new row in the SEC-ASSETJTYPE table. Supply data for NAME, DESCRIPTION, and FORMAT. The latter must be a valid fixed description that defines a single moniker format (ie the naming format of the string used to identify the asset). This uniqueness requirement exists because moniker is provided as a parameter when a requirement is made on an asset. For security to match assets to their correct form, moniker parameters are compared for each named format. As long as the correct pairing appears, the asset type will be discovered. For example, monikerMBLM: CM.Catalog.Catalog: [2FA4A958AA83 11D498 5A00508BD626C1] " cannot be mistaken for moniker for URL asset type because it will not conform to the URL format '' (/ [A-Za-zO-- 14- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) A7 _______B7 _ V. Description of the invention (12) 9 / · —] +) ([?] {〇, 1} · *) , 〇2 · Decide what kind of assignment should be applied to the new data type. If these jobs do not already exist in the SEC_OPERATION table, proceed and join them. Confront NAME, DESCRIPTION, and META-FLAG. If the assignment is at the instance level, for the last field, the number should be, pseudo ', (false). If the assignment is a metaphysical level, the number for the last block should be "眞 n (true). 3. Via Add an item to the SEC-ASSET_OPERATION table to combine the operation with the new asset type. This table is only a bond table to facilitate many-to-many relationships between asset types and operations ° Above Describe the mechanisms and procedures for declaring a more suitable security system. Although the words used are relatively self-explanatory, the following list will assist those skilled in the art to understand the description. Access Decision Function (Access Decision Function, ADF): Propose authentication decision (yes / no). ADF is internal to the security system. Access Enforcement Function (AEF): A process that reflects authentication decisions. Aef typically controls the workflow and can be a security system Internal or external. Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, the Access Entitlement Function: executes queries and restricts starters. There is a process of reading the results of those objects with access. Active Principal Set (APS): A group of heads of a particular member. APS is dynamically determined after the user is authenticated. Anonymous User ): Identifies use that has not been systematically checked. -15- This paper size applies Chinese National Standard (CNS) A4 (210 X 297 mm) 493122 Α7 Β7 5. Invention Description (13). Anonymous users are considered not to Trust. Assets; Assets that can be selected as security system protection. They are real physical files, application software, objects, or data collections. Asset Type: Resources with similar security characteristics Directory. The asset type is combined with one or more operations, and the operation is combined with one or more asset types.) Authentication: The process of determining user identification. Authentication confirms that the user is where he is. The claimant, but did not say anything about the rights to perform on the registered assets. Authenticated User: Identifies a user that has been checked by the system. Authorization ( Authorization): Determine whether the user has the right to perform operations on the registered (protected) assets. Authorization can occur in two modes: 1. Decision mode, the initiator proposes requirements to perform operations on the assets and is A no / no response has been proposed. 2. The nomenclature mode, the initiator proposes a read request to perform operations on the asset, and a filtered subset of the asset is provided. The filtered sub-collection contains assets that only those starters are allowed to read. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs !! · I I (Please read the notes on the back to write this page) • Line-Credential: The item provided by the user to the system to prove its identification. Identification can include things that the user knows (such as a password) or possesses (such as a digital certificate). Group: —Groups are named members with similar characteristics. Initiator: A client that proposes a security system requirement. The initiator can be a user or an application. -16 · The size of this paper is applicable to China National Standard (CNS) A4 (21 × 297 mm) 493122 A7

五、發明說明(Μ ) 成興(Member):與被認證過使用者結合的帳號(Acc〇unt)。 成員只剛好與一個人員結合(從檔案管理,profile management),並且一個人員與零個或—個成員相結合。 作業(Operation):可以在資產上進行的動作或程序。一個 作業只特·定對一個資產型態。 , 政策(Policy): —組描述各種使用者存取位於應用程式内資 源的規則。政策定義具有對一個或更多資產進行特定作業 的權力之首長。 . 首長(Principal):系統使用進行授權決策的名字或識別 器。首長爲政策的必須元件。首長可以與零個或更多成員 相結合,並且成員可以與零個或更多首長相結合。於首長 和成員間的結合被動態地決定。 首長取得(Principal Acquisition): —個或更多首長被綁住 以形成主動首長集的程序。首長取得於認證之後發生。 首長型態(Principal Type):具有類似特徵首長類別。於相 同型態首長間的每個首長必須是獨一無二。首長型態爲: 角色,公司,入門處。 已註册資產(Registered Asset):受安全系統保護之眞正系 統資源的邏輯表現。 授權需求(Authorization Request):起始者進行安全系統的 查詢,包含資產,作業,及主動首長集。 角色(Role):使用者的功能或能力的抽象表現。 使用者(User):與應用程式互動的人員或實體。 使用者註册(User Registration):使用者供應有關自己的資 -17- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---I---------裝·-- (請先閱讀背面之注意事項寫本頁) 訂: --線· 經濟部智慧財產局員工消費合作社印製 493122 經濟部智慧財產局員工消費合作社印製 五、發明說明(15) =並且因而成馬可能有較多存取位於應用程式内資源 程。使用者註册程序的產品爲人員和成員(帳號)。、匕 上述系統允許整個安全系統簡單的群㈣理。因 的移轉,各種管理的層次可以下傳到線。例如,單 使用者可以指足具有各種程度管理授權的,其他管理者, 而各種管理功能可以分散在數個管理者之間。每個管理者 可以依其所想要,代表所有或部分其管理權。 遂有,因爲權限雙向移轉是被允許的,在不同公司之 同層、’及言理者可以合作還有效地管理結合過的系統。這 許管理者同意權限給那些領域,或領域的部分,其爲= 所負貝或所热悉的。於此方法中,單一超級使用者不必 擔起所有最終安全責任。 Q爲4户可以定義額外資源型態,和被應用到其上的 外型態安全,此系統比大多可獲得安全系統更有彈性。 與能夠將分開領域對待在一起的能力、及與一個領域内阳 別安全相結合時,一個眞正一般且有彈性安全系統才被提 供〇 於本發明已被特別地顯示並且參考較適具體實施例來描 述時,熟知本技藝人士將了解各種形式上和詳細内容的各 種改史都可於此做出’而不需偏離本發明的精神和範圍。 相 允 們 要 額 當 個 ·!! -裝 i I (請先閲讀背面之注意事項wm寫本頁) --線· -18- 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 x 297公釐)V. Description of the Invention (M) Cheng Hing (Member): an account (AccOunt) combined with an authenticated user. Members are just combined with one person (from profile management), and one person is combined with zero or one member. Operation: An action or procedure that can be performed on an asset. An assignment is only specific to one asset type. Policy: —Group describes the rules for various users to access resources located in the application. A policy defines a head with the authority to perform specific operations on one or more assets. Principal: The name or identifier used by the system to make authorization decisions. Heads are an essential element of policy. Heads can be combined with zero or more members, and members can be combined with zero or more heads. The combination of heads and members is dynamically determined. Principal Acquisition: A procedure in which one or more heads are tied to form an active set of heads. Leadership takes place after certification. Principal Type: Principal types with similar characteristics. Each head must be unique among the same type of heads. The director types are: role, company, entry. Registered Asset: A logical representation of the resources of a system that is protected by a security system. Authorization Request: The initiator performs a query of the security system, including assets, operations, and active director sets. Role: The abstract expression of a user's function or ability. User: The person or entity interacting with the application. User Registration: Users provide their own information. 17- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) --- I --------- Equipment ·-(Please read the notes on the back to write this page first) Order: --Line Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 493122 Printed by the Employee Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs = And as a result, Chengma may have more access to resources located in the app. The products of the user registration program are personnel and members (accounts). The above system allows simple group management of the entire security system. Due to the transfer, various management levels can be transferred to the line. For example, a single user can refer to other managers with various levels of management authorization, and various management functions can be distributed among several managers. Each manager can represent all or part of his management rights as he wants. Therefore, because the two-way transfer of authority is allowed, at the same level in different companies, ’and reasoners can cooperate and effectively manage the combined system. This allows the manager to agree on the rights to those areas, or parts of areas, which are equal to what they are responsible for or what they know. In this approach, a single superuser does not have to assume all ultimate security responsibilities. For Q, 4 households can define additional resource types and apply security to them. This system is more flexible than most available security systems. When combined with the ability to treat separate domains together, and with security within a domain, a normal and resilient security system is provided. The present invention has been specifically shown and referenced for specific implementation In the description of examples, those skilled in the art will understand that various modified histories in various forms and details can be made here without departing from the spirit and scope of the present invention. Let ’s make it a lot !!-Install i I (please read the precautions on the back to write this page) --line · -18- This paper size is applicable to China National Standard (CNS) A4 (21〇x 297 mm)

Claims (1)

493122 __g| _ 六、申請專利範圍 ι_ 一種用於電腦系統之安全系統,包含: 數個位於電腦系統内的資產; 數個註册使用該電腦系統的成員; 數個定義使用者權力的角色,每個成員具有至少一個 角色;. ^ 數個相對應該資產的存取控制表列,每個控制表列定 義至少一個根據成員角色,用於存取資產的權限;及 至少一個領域,每個領域具有該資產的子集合和相對 應的存取控制表列,及該成員的子集合; 其中當該成員具有相對應該資產權限的角色時,該成 員被允許存取位於領域内所需求的資產。 2·如申請專利範圍第1項之系統,其中對每個資產的權限 包括可在该資產上進行的動作,並且當由成員所需求的 存取包括進行動作形成存取控制表列時,其中存取被允 3·如申凊專利範圍第1項之系、统,其中權限包括讀取權 限。 4. 如申請專利範圍第i項之系統’其中權限包括修 限。 經濟部智慧財產局員工消費合作社印製 • — III — — — — — — — —— .—— (請先閱讀背面之注意事項再me本頁) -線· 5. 如申請專利範圍第【項之系統,其中權限包 限。 .^ 6. 如申請專利範圍第之系統,其中系統包括 領域。 7. -種提供對-電腦系統内資產之安全存取之方法,包含 本紙張尺錢用巾關家 -19- 493122 A8 B8 C8 _____ D8____ 六、申請專利範圍 以下步驟: 當使用者試圖存取位於領域内的資產時,決定至少一 個角色給該使用者; 將相對應指定給該使用者的角色的權力與相對應該資 產權限妁表列相比較; , 如果所試圖存取允許給指定給該使用者的角色,允許 該使用者存取該資產。 8. 如申請專利範圍第7項之方法,其中所需求的存取爲從 讀取,修改,或刪除等型態之一種。 9. 如申請專利範圍第7項之方法,進而包含以下步驟: 於使用者試圖存取任何資產之前,認證使用者的識 別,並且指定至少一個角色給該使用者。 (請先閲讀背面之注意事項 再 本頁) 裝 訂· 經濟部智慧財產局員工消費合作社印製 2T /V 格 規 4 )A S) N (C 準 標 家 國 國 中 用 適 度¾¾ 釐 公 7 29493122 __g | _ VI. Patent application scope ι_ A security system for computer systems, including: several assets located in the computer system; several members registered to use the computer system; several roles defining user rights, each Each member has at least one role; ^ several access control list columns corresponding to the asset, each control table column defines at least one permission to access the asset according to the member role; and at least one domain, each domain has The sub-collection of the asset and the corresponding access control list, and the sub-collection of the member; wherein when the member has a role corresponding to the asset authority, the member is allowed to access the assets required in the domain. 2. The system of item 1 in the scope of patent application, wherein the authority to each asset includes actions that can be performed on the asset, and when the access required by members includes performing actions to form an access control list, where Access is permitted 3. If the system and system of item 1 of the patent scope are applied, the authority includes read authority. 4. If the system of item i of the scope of patent application is applied, the authority includes amendments. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs • — III — — — — — — — — (Please read the notes on the back before me page)-Line · 5. If the scope of the patent application [item [item] System, where permissions are limited. . ^ 6. If the system of the scope of patent application, the system includes the field. 7.-A method to provide safe access to assets in the computer system, including the paper towel and money towel Guanjia-19- 493122 A8 B8 C8 _____ D8____ 6. Application for patent scope The following steps: When the user tries to access When an asset is located in the realm, determine at least one role for the user; compare the power of the role assigned to the user with the corresponding asset permissions list; if the access attempted is allowed to be assigned to the user The role of the user, allowing the user to access the asset. 8. The method of claim 7 in which the required access is one of reading, modifying, or deleting. 9. The method of claim 7 in the scope of patent application, further comprising the following steps: before the user attempts to access any asset, authenticate the user's identification and assign at least one role to the user. (Please read the precautions on the back first, then this page) Binding · Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 2T / V Standard 4) A S) N (C Standards Appropriate Standards for National and Intermediate Use Moderate ¾ ¾ cm 7 29
TW90105125A 2000-03-06 2001-03-28 Computer security system TW493122B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US18737500P 2000-03-06 2000-03-06

Publications (1)

Publication Number Publication Date
TW493122B true TW493122B (en) 2002-07-01

Family

ID=22688720

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90105125A TW493122B (en) 2000-03-06 2001-03-28 Computer security system

Country Status (1)

Country Link
TW (1) TW493122B (en)

Similar Documents

Publication Publication Date Title
US7013485B2 (en) Computer security system
US7827598B2 (en) Grouped access control list actions
US8990896B2 (en) Extensible mechanism for securing objects using claims
US20040010591A1 (en) Employing wrapper profiles
JP2008524751A (en) Consumer Internet authentication service
JP5422753B1 (en) Policy management system, ID provider system, and policy evaluation apparatus
CN107204978B (en) A kind of access control method and device based on multi-tenant cloud environment
US20070033079A1 (en) Method and system for secured execution of an activity in a workflow process
CN101321064A (en) Information system access control method and apparatus based on digital certificate technique
US9912642B1 (en) Authorization path secured electronic storage system
US10650387B2 (en) User access to a registry of business entity definitions
US7013388B2 (en) Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system
CN111274569A (en) Research, development, operation and maintenance integrated system for unified login authentication and login authentication method thereof
CA3216881A1 (en) Trusted custody chain for verifiable claims
JP4805615B2 (en) Access control method
US7660770B2 (en) System and method for providing a secure contact management system
US8019992B2 (en) Method for granting user privileges in electronic commerce security domains
JP2010244272A (en) Method, system and program for managing individual attribute information
JP4723930B2 (en) Compound access authorization method and apparatus
TW493122B (en) Computer security system
Rech et al. A decentralized service-platform towards cross-domain entitlement handling
JP7332027B2 (en) USER INFORMATION MANAGEMENT SYSTEM, USER INFORMATION MANAGEMENT METHOD, USER AGENT AND PROGRAM
JP5150128B2 (en) Trace system, trace method, and computer program
Huawei Technologies Co., Ltd. Database Security Fundamentals
Ludwig et al. MIERA: Method for inter-enterprise role-based authorization

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees