[go: up one dir, main page]

CN100490387C - Token-based fine granularity access control system and method for application server - Google Patents

Token-based fine granularity access control system and method for application server Download PDF

Info

Publication number
CN100490387C
CN100490387C CNB2004101034711A CN200410103471A CN100490387C CN 100490387 C CN100490387 C CN 100490387C CN B2004101034711 A CNB2004101034711 A CN B2004101034711A CN 200410103471 A CN200410103471 A CN 200410103471A CN 100490387 C CN100490387 C CN 100490387C
Authority
CN
China
Prior art keywords
token
access
access control
security
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004101034711A
Other languages
Chinese (zh)
Other versions
CN1633084A (en
Inventor
杨放春
邹华
李立
苏森
孙其博
徐鹏
龙湘明
李静林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CNB2004101034711A priority Critical patent/CN100490387C/en
Publication of CN1633084A publication Critical patent/CN1633084A/en
Application granted granted Critical
Publication of CN100490387C publication Critical patent/CN100490387C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

一种用于应用服务器的基于令牌的细粒度访问控制系统及方法,该系统包括:需要访问应用服务器中资源和/或能力的业务单元,由保证安全的代码组成的业务代理单元,由各种文件资源、网络资源、数据库资源和其它资源和/或能力组成的系统资源/能力单元,由顺序连接的访问控制检查器、系统安全控制器和安全策略管理器组成的访问控制单元,以及由检查结果缓存表、访问权限令牌表、主体令牌表、令牌索引表和其他安全控制表组成的控制访问的令牌与数据存储单元,各部件相互配合完成基于令牌的细粒度访问控制。该方法不仅能够有效控制各种访问操作,提高应用服务器的安全性;而且,效率高,在对系统进行安全保护的同时,尽量减少其对系统正常处理操作的影响。

Figure 200410103471

A token-based fine-grained access control system and method for an application server, the system includes: a business unit that needs to access resources and/or capabilities in the application server, a business agent unit composed of codes that ensure security, and each A system resource/capability unit consisting of various file resources, network resources, database resources and other resources and/or capabilities, an access control unit consisting of sequentially connected access control checkers, system security controllers, and security policy managers, and a Check result cache table, access token table, subject token table, token index table and other security control tables are composed of access control token and data storage unit, each component cooperates to complete token-based fine-grained access control . The method can not only effectively control various access operations and improve the security of the application server; moreover, it has high efficiency and minimizes its influence on the normal processing operation of the system while protecting the system security.

Figure 200410103471

Description

用于应用服务器的基于令牌的细粒度访问控制系统及方法 Token-based fine-grained access control system and method for application server

技术领域 technical field

本发明涉及一种用于应用服务器的基于令牌的细粒度访问控制系统及其实现方法,属于网络通信技术领域。The invention relates to a token-based fine-grained access control system for an application server and an implementation method thereof, belonging to the technical field of network communication.

背景技术 Background technique

下一代网络是一种采用分层、开放的体系结构,以分组交换技术为基础、可同时支持语音、视频、数据、文本和图像等多媒体业务的新型融合网络。下一代网络的主要技术优势是各个网络实体之间采用开放的协议或API接口,有利于打破传统电信网封闭的格局,实现多种异构网络间的融合。The next-generation network is a new type of integrated network that adopts a layered and open architecture, is based on packet switching technology, and can simultaneously support multimedia services such as voice, video, data, text, and images. The main technical advantage of the next generation network is the use of open protocols or API interfaces between various network entities, which is conducive to breaking the closed pattern of traditional telecommunication networks and realizing the integration of various heterogeneous networks.

应用服务器是一种面向下一代网络的业务提供系统,其主要功能是:提供业务逻辑执行环境。业务运行在业务执行环境中,业务执行环境运行在计算机平台上。在本发明中,业务表示一个为客户提供服务的应用程序,这里的客户是人,或者是其它程序。一个业务能够提供的服务包括网上定票、查询股票信息、查询业务的计费信息、建立多方多媒体会议、提供移动用户位置信息等。The application server is a service provision system oriented to the next generation network, and its main function is to provide a business logic execution environment. The business runs in the business execution environment, and the business execution environment runs on the computer platform. In the present invention, business means an application program that provides services for customers, where the customers are people or other programs. The services that a service can provide include booking tickets online, querying stock information, querying service billing information, establishing multi-party multimedia conferences, and providing mobile user location information.

随着网络技术的发展和网上应用的日益增加,越来越多的业务和交易通过计算机网络进行,随之而来的泄密、黑客等信息安全问题对电子商务和电子政务的影响日益凸现,当前信息系统的安全已经成为业界和用户关注的热点。With the development of network technology and the increasing number of online applications, more and more businesses and transactions are conducted through computer networks, and the ensuing information security issues such as leaks and hackers have increasingly prominent impacts on e-commerce and e-government affairs. The security of information systems has become a hot spot in the industry and users.

信息安全技术包括有:密码技术、身份认证、访问控制、入侵检测、风险分析与评估等诸多方面。在实际应用中,这些安全技术相互支持与协作,各自解决信息安全问题的某一方面。但是,目前,人们关注的重点是密码技术、身份认证、入侵检测等,访问控制技术没有得应有的重视。事实上,访问控制技术是信息安全系统中一个不可或缺的安全措施,是应用服务器安全保护措施中的重要组成部分,对保护主机硬件系统和应用软件系统的安全都有重要意义。Information security technology includes: encryption technology, identity authentication, access control, intrusion detection, risk analysis and evaluation, and many other aspects. In practical applications, these security technologies support and cooperate with each other, each solving a certain aspect of information security issues. However, at present, the focus of people's attention is on cryptography, identity authentication, intrusion detection, etc. Access control technology has not received due attention. In fact, access control technology is an indispensable security measure in the information security system, an important part of the application server security protection measures, and it is of great significance to protect the security of the host hardware system and application software system.

访问控制技术起源于70年代,当时主要用于管理大型主机系统上共享数据的授权访问。随着计算机技术和应用的发展,特别是网络应用的发展,该技术的思想和方法迅速应用于信息系统的各个领域。在30年的发展过程中,先后出现了多种重要的访问控制技术,其基本目标都是防止非法用户进入系统和合法用户对系统资源的非法使用。为此,访问控制通常以用户身份认证为前提,并在此基础上实施各种访问控制策略来控制和规范合法用户在系统中的行为。Access control technology originated in the 1970s, when it was mainly used to manage authorized access to shared data on mainframe systems. With the development of computer technology and applications, especially the development of network applications, the ideas and methods of this technology are rapidly applied to various fields of information systems. In the course of 30 years of development, a variety of important access control technologies have emerged successively, the basic goal of which is to prevent illegal users from entering the system and legal users from illegally using system resources. For this reason, access control is usually based on the premise of user identity authentication, and on this basis, various access control strategies are implemented to control and regulate the behavior of legitimate users in the system.

访问控制系统通常包括:主体(subject):发出访问或存取操作要求的主动方;客体(object):主体调用的程序或欲存取的数据对象;安全访问策略:决定主体访问客体的一套规则。Access control systems usually include: subject: the active party that issues access or access operation requirements; object: the program invoked by the subject or the data object to be accessed; security access policy: a set of rules that determine the subject’s access to the object rule.

目前,被广泛接受的主流访问控制技术主要有自主访问控制、强制访问控制和基于角色的访问控制三种,下面分别介绍之。At present, the widely accepted mainstream access control technologies mainly include three types: discretionary access control, mandatory access control and role-based access control, which are introduced respectively below.

自主访问控制(DAC,Discretionary Access Control)基本思想是:系统中的主体可以自主地将其拥有的对客体的访问权限全部或部分地授予其它主体。其实现方法一般是建立系统访问控制矩阵。传统的自主访问控制安全保护能力有限。尽管DAC已经在许多系统中得以实现(例如UNIX),然而DAC的一个致命弱点是:授予的访问权可以传递。一旦访问权被传递出去将难以控制,访问权的管理相当困难,会带来严重的安全问题;而且,无论使用哪一种形式的DAC,所带来的系统开销都是相当昂贵、难以支付,再者,效率相当低劣,很难满足大型应用、特别是网络应用的需要。The basic idea of discretionary access control (DAC, Discretionary Access Control) is that subjects in the system can grant all or part of their access rights to objects to other subjects autonomously. Its implementation method is generally to establish a system access control matrix. Traditional autonomous access control security protection capabilities are limited. Although DAC has been implemented in many systems (such as UNIX), one of the Achilles' heels of DAC is that the granted access rights can be passed. Once the access rights are passed on, it will be difficult to control, and the management of access rights will be quite difficult, which will bring serious security problems; moreover, no matter which form of DAC is used, the system overhead will be quite expensive and difficult to pay. Furthermore, the efficiency is quite low, and it is difficult to meet the needs of large-scale applications, especially network applications.

强制访问控制(MAC,Mandatory Access Control)源于对信息机密性的要求和防止特洛伊木马之类的攻击,MAC通过无法回避的存取限制来阻止直接或间接的非法入侵。系统中的主/客体都由安全管理员(SO,Security Officer)被强制分配一个固定的安全属性,该安全属性决定一个主体是否能够访问某个客体,用户或用户进程不能改变自身或其它主/客体的安全属性。强制访问控制系统中的每个主体都被授予一个安全证书,每个客体则被指定为一定的敏感级别。访问控制的两个关键规则是:不向上读和不向下写,即信息流只能从低安全级向高安全级流动,任何违反非循环信息流的行为都是被禁止的。Mandatory Access Control (MAC, Mandatory Access Control) originates from the requirements for information confidentiality and the prevention of attacks such as Trojan horses. MAC prevents direct or indirect illegal intrusion through unavoidable access restrictions. The subject/object in the system is forced to assign a fixed security attribute by the Security Officer (SO, Security Officer), which determines whether a subject can access a certain object, and the user or user process cannot change itself or other host/object. The security attributes of the object. Each subject in the mandatory access control system is granted a security certificate, and each object is assigned a certain sensitivity level. The two key rules of access control are: no upward reading and no downward writing, that is, information flow can only flow from low security level to high security level, and any violation of acyclic information flow is prohibited.

MAC起初主要用于军方的应用中,并且常与DAC结合使用,主体只有通过了DAC与MAC的检查后,才能访问某个客体。由于MAC对客体施加了更严格的访问控制,因而可以防止特洛伊木马之类的程序偷窃受保护的信息,同时MAC对用户意外泄漏机密信息的可能性也有预防能力。但是,如果用户恶意泄漏信息,仍然可能无能为力;而且,由于MAC增加了不能回避的访问限制,影响系统的灵活性,尤其是对细粒度的访问控制,MAC不能满足要求。另一方面,虽然MAC作为一种多级访问控制系统,增强了信息的机密性,但不能实施完整性控制;由于网上信息更需要完整性,影响了MAC的网上应用。MAC is mainly used in military applications at first, and it is often used in combination with DAC. The subject can only access an object after passing the inspection of DAC and MAC. Because MAC imposes stricter access control on the object, it can prevent programs such as Trojan horses from stealing protected information, and at the same time, MAC also has the ability to prevent the possibility of users accidentally leaking confidential information. However, if the user leaks information maliciously, there may still be nothing he can do; moreover, because MAC adds unavoidable access restrictions, which affects the flexibility of the system, especially for fine-grained access control, MAC cannot meet the requirements. On the other hand, although MAC, as a multi-level access control system, enhances the confidentiality of information, it cannot implement integrity control; because online information requires more integrity, it affects the online application of MAC.

随着网络的迅速发展,尤其是Intranet的兴起,对访问控制服务的质量提出更高要求,上述两种访问控制技术很难满足这些要求。DAC将赋予或取消访问权限的一部分权利留给用户个人,使得管理员很难确定用户拥有的访问权限能够访问哪些资源,不利于实现统一的全局访问控制。而MAC过于偏重保密,对系统连续工作能力、授权的可管理性等其他方面考虑不足。因此,90年代以后出现一种基于角色的访问控制(RBAC,Role-Based Access Control)技术。With the rapid development of networks, especially the rise of Intranet, higher requirements are placed on the quality of access control services, and the above two access control technologies are difficult to meet these requirements. DAC leaves part of the right to grant or cancel access rights to individual users, making it difficult for administrators to determine which resources users can access with access rights, which is not conducive to the realization of unified global access control. However, MAC puts too much emphasis on confidentiality, and does not consider other aspects such as the continuous working ability of the system and the manageability of authorization. Therefore, a role-based access control (RBAC, Role-Based Access Control) technology emerged after the 1990s.

在RBAC中,引入了角色的重要概念。所谓“角色”是一个或一群用户在组织内可执行的操作的集合。RBAC的基本思想是:授权给用户的访问权限,通常由用户在一个组织中担当的角色来确定。例如,一个银行包含的角色有出纳员、会计师和贷款员等。由于他们的职能不同,所拥有的访问权限显然也各不相同。RBAC根据用户在组织内担任的角色进行访问授权与控制。也就是说,传统的访问控制直接将访问主体和客体相联系,而RBAC在中间加入了角色,通过角色沟通主体与客体。在RBAC中,虽然用户标识对于身份认证和审计记录十分有用,但真正决定访问权限的是该用户对应的角色标识。RBAC对访问权限的授权由管理员进行统一管理,而且,授权规定是强加给用户的,用户只能被动接受,不能自主决定。用户也不能自主地将访问权限传给他人。这是一种非自主型访问控制。目前,虽然RBAC已经在某些系统中开始得到应用,但是,RBAC仍然处于发展阶段,尚未出现成熟的产品,如何应用仍然是一个相当复杂的问题。In RBAC, the important concept of roles is introduced. The so-called "role" is a collection of operations that a user or a group of users can perform in an organization. The basic idea of RBAC is: the access rights authorized to a user are usually determined by the role the user plays in an organization. For example, a bank contains roles such as teller, accountant, and loan officer. Because of their different functions, they obviously have different access rights. RBAC performs access authorization and control based on the roles that users play in the organization. That is to say, traditional access control directly links the access subject and object, while RBAC adds roles in the middle, and communicates the subject and object through roles. In RBAC, although user identification is very useful for identity authentication and audit records, what really determines access rights is the corresponding role identification of the user. RBAC's authorization of access rights is managed by the administrator in a unified manner. Moreover, authorization regulations are imposed on users, and users can only passively accept them and cannot make independent decisions. Nor can users voluntarily pass on access rights to others. This is a non-discretionary type of access control. At present, although RBAC has begun to be applied in some systems, RBAC is still in the development stage, and mature products have not yet appeared, so how to apply it is still a rather complicated problem.

发明内容 Contents of the invention

有鉴于此,本发明的目的是提供一种用于应用服务器的基于令牌的细粒度访问控制系统,该系统能够合理、高效地对访问进行控制,提高应用服务器的安全性。In view of this, the purpose of the present invention is to provide a token-based fine-grained access control system for application servers, which can reasonably and efficiently control access and improve the security of application servers.

本发明的另一目的是提供一种用于应用服务器的访问控制方法,该方法不仅能够对各种访问操作进行有效控制,提高系统安全性;而且,工作效率高,在对系统进行安全保护的同时,尽量减少其对系统正常处理操作的影响。Another object of the present invention is to provide an access control method for an application server. This method can not only effectively control various access operations and improve system security; At the same time, minimize its impact on the normal processing operation of the system.

为了达到上述目的,本发明提供了一种用于应用服务器的基于令牌的细粒度访问控制系统,该系统包括有:In order to achieve the above object, the present invention provides a token-based fine-grained access control system for application servers, the system includes:

业务单元,由为客户提供服务的应用程序组成,该业务单元需要访问应用服务器中的资源和/或能力;A business unit, consisting of an application program providing services to customers, which requires access to resources and/or capabilities in the application server;

资源/能力单元,由至少包括各种文件资源、网络资源、数据库资源与其它资源和/或能力组成;其特征在于:该系统还包括有:The resource/capability unit consists of at least various file resources, network resources, database resources and other resources and/or capabilities; it is characterized in that: the system also includes:

业务代理单元,由保证安全的代码组成,分别与业务单元、资源/能力单元和访问控制单元进行通信连接,用于代理业务访问资源/能力单元;The business proxy unit is composed of security-guaranteed codes, which communicate with the business unit, the resource/capability unit and the access control unit respectively, and are used to access the resource/capability unit for business on behalf of the business;

访问控制单元,由顺序连接的访问控制检查器、系统安全控制器和安全策略管理器组成,用于在主体访问客体时进行基于令牌的细粒度访问控制;其中访问控制检查器接收到业务代理的访问请求时,先在检查结果缓存表中检索该访问请求的访问控制检查结果;如果在检查结果缓存表中检索到与该请求对应的检查结果记录,则将检索到的检查结果记录直接返回给业务代理;如果在检查结果缓存表中没有检索到与该访问请求对应的检查结果记录,则将访问请求传送给系统安全控制器,由系统安全控制器验证该主体是否拥有执行本次客体操作的令牌和给出验证结果,并将验证结果返回给业务代理和将本次检查结果更新到检查结果缓存表中;安全策略管理器用于执行系统的安全访问控制策略,并定时清除检查结果缓存表;The access control unit consists of sequentially connected access control inspectors, system security controllers, and security policy managers for token-based fine-grained access control when the subject accesses objects; where the access control inspector receives the business agent For an access request, first retrieve the access control inspection result of the access request in the inspection result cache table; if the inspection result record corresponding to the request is retrieved in the inspection result cache table, the retrieved inspection result record will be returned directly to the business agent; if the check result record corresponding to the access request is not retrieved in the check result cache table, the access request is sent to the system security controller, and the system security controller verifies whether the subject has the right to execute the object operation The token and the verification result are given, and the verification result is returned to the business agent and the inspection result is updated to the inspection result cache table; the security policy manager is used to implement the security access control policy of the system, and periodically clear the inspection result cache surface;

控制访问的令牌与数据存储单元,包括有:缓存本系统的访问控制结果的检查结果缓存表、保存访问每个客体的不同权限所对应的令牌的访问权限令牌表、保存主体所拥有的令牌列表的主体令牌表、保存持有令牌的主体标识列表的令牌索引表,以及至少包括系统安全策略定义的其他安全控制表,其中检查结果缓存表同时连接访问控制单元中的三个部件,访问权限令牌表、主体令牌表、令牌索引表和其他安全控制表都只与访问控制单元中的系统安全控制器和安全策略管理器构成通信连接,用于配合访问控制单元完成基于令牌的细粒度访问控制。The access control token and data storage unit include: a check result cache table for caching the access control results of the system, an access token table for storing the tokens corresponding to different permissions for accessing each object, and a table for storing the objects owned by the subject. The subject token table of the token list, the token index table of the subject identification list holding the token, and at least other security control tables including the definition of the system security policy, wherein the check result cache table is connected to the access control unit at the same time The three parts, the access token table, the subject token table, the token index table and other security control tables, only form a communication connection with the system security controller and security policy manager in the access control unit, and are used to cooperate with access control The unit completes token-based fine-grained access control.

所述控制访问的令牌与数据存储单元中的令牌和数据的描述方式包括扩展标记语言XML或其它高级程序语言设计的数据结构、或数据库表单;所述令牌和数据的存储形式包括内存、或文件、或数据库;存储方式是集中式和/或分布式。The description mode of the token and the data in the token and the data storage unit of the control access includes the data structure designed by the extended markup language XML or other high-level programming language, or the database form; the storage form of the token and the data includes the internal memory , or files, or databases; storage is centralized and/or distributed.

所述令牌是主体访问客体所必需的凭证,即只有当主体具备对特定客体进行特定访问所需的令牌,访问才能够成功;否则,该访问会被系统拒绝;所述令牌的分配、保存和检查都由系统统一管理。The token is a necessary certificate for the subject to access the object, that is, only when the subject has the token required for specific access to the specific object, the access can be successful; otherwise, the access will be rejected by the system; the distribution of the token , saving and checking are all managed by the system.

所述令牌格式包括令牌标识和系统证书两部分,其中令牌标识是系统统一分配的、用于唯一标识该令牌的字符串;系统证书是系统签署的安全证书,该证书格式采用X.509标准,或可被基于公钥的软件共享的其它格式;所述X.509是规定公钥证书的格式及相关验证算法的公钥基础结构标准(PKI,public keyinfrastructure),证书内的系统签名由该系统特定算法生成。The token format includes two parts: a token identifier and a system certificate, wherein the token identifier is a character string uniformly assigned by the system to uniquely identify the token; the system certificate is a security certificate signed by the system, and the certificate format adopts X .509 standard, or other formats that can be shared by public key-based software; the X.509 is a public key infrastructure standard (PKI, public key infrastructure) that specifies the format of public key certificates and related verification algorithms, and the system in the certificate The signature is generated by this system specific algorithm.

所述细粒度是访问控制的粒度性能,体现在主、客体两个方面:该系统的访问控制令牌是按照每个客体的每个权限分别发放的,以实现客体访问的细粒度控制;该系统对于主体的控制可以从业务级细化精确到对象的方法级,实现主体访问的细粒度控制。The fine-grainedness is the granularity performance of access control, which is reflected in two aspects: the subject and the object: the access control token of the system is issued according to each authority of each object, so as to realize the fine-grained control of object access; The system's control over the subject can be refined from the business level to the method level of the object to achieve fine-grained control of subject access.

所述系统安全控制器为该系统访问控制的核心控制器,用于提供最终的安全访问合法性的检查验证功能,以及至少包括根据访问控制检查结果、更新检查结果缓存表和管理系统关键数据的其它安全性能的维护执行功能;The system security controller is the core controller of the system access control, which is used to provide the final security access legality check and verification function, and at least includes the functions of updating the check result cache table and managing the key data of the system according to the access control check result. Maintenance execution functions for other safety features;

所述安全策略管理器用于执行系统的安全访问控制策略,并定时清除检查结果缓存表;所述安全访问控制策略由系统动态配置并存贮在其它安全控制表中。The security policy manager is used to execute the security access control policy of the system, and periodically clear the check result cache table; the security access control policy is dynamically configured by the system and stored in other security control tables.

本发明的另一目的是这样实现的:一种用于应用服务器的基于令牌的细粒度访问控制方法,其特征在于:包括下述操作步骤:Another object of the present invention is achieved in this way: a token-based fine-grained access control method for application servers, characterized in that: comprising the following steps:

A、在业务加载时,应用服务器与业务进行访问控制能力的协商,并根据协商结果,为本次协商涉及到的所有权限创建新的令牌列表,调用令牌生成算法创建新的令牌;然后根据协商结果及新的令牌列表,对该业务的主体令牌表和系统令牌进行初始化,所述主体令牌表记录了该业务的所有主体拥有的令牌;再根据协商结果及令牌列表,更新访问权限令牌表,所述权限令牌表记录了对客体进行访问所需要的令牌;A. When the business is loaded, the application server negotiates the access control capability with the business, and according to the negotiation result, creates a new token list for all permissions involved in this negotiation, and calls the token generation algorithm to create a new token; Then, according to the negotiation result and the new token list, initialize the subject token table and the system token of the service, and the subject token table records the tokens owned by all subjects of the service; then according to the negotiation result and the order card list, and update the access token table, which records the tokens needed to access the object;

B、在业务访问系统资源和/或能力时,业务首先将访问资源和/或能力的请求发送给业务代理,业务代理再将访问请求发送给访问控制检查器,验证该请求的合法性;访问控制检查器先对检查结果缓存表进行检索,如果检索到与本次访问请求对应的检查结果记录,就将该检查结果返回给业务代理,否则将该访问请求发送给系统安全控制器再次进行检查;系统安全控制器先检查访问权限令牌表,查询执行该访问操作需要何种令牌;然后系统安全控制器检查主体令牌表,查看该访问请求的主体是否具有执行该访问操作所需令牌;如果具有该令牌,则检查结果为允许访问,如果不具有该令牌,则检查结果为拒绝访问,然后系统安全控制器将检查结果更新到检查结果缓存表中,并将验证结果返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理;如果检查结果为允许访问,则业务代理执行该访问操作,并将执行结果返回给业务;如果检查结果为不允许访问,则业务代理拒绝该访问请求,并将拒绝响应返回给业务;B. When a business accesses system resources and/or capabilities, the business first sends a request to access resources and/or capabilities to the business agent, and the business agent then sends the access request to the access control checker to verify the legitimacy of the request; access The control checker first retrieves the check result cache table, if it retrieves the check result record corresponding to this access request, it returns the check result to the service agent, otherwise it sends the access request to the system security controller to check again ; The system security controller first checks the access token table, and inquires what kind of token is required to perform the access operation; If you have the token, the check result is to allow access, if you do not have the token, the check result is to deny access, then the system security controller will update the check result to the check result cache table, and return the verification result To the access control checker, the access control checker returns the result to the business agent; if the check result is to allow access, the business agent executes the access operation and returns the execution result to the business; if the check result is not to allow access, Then the service agent rejects the access request, and returns a rejection response to the service;

C、在系统安全控制器对访问进行检查之后、或检查结果缓存表满时、或检查结果缓存表保存的检查结果过期时、或业务终止时,分别对检查结果缓存表进行更新。C. After the system security controller checks the access, or when the check result cache table is full, or when the check result stored in the check result cache table expires, or when the service is terminated, respectively update the check result cache table.

所述步骤A初始化系统令牌的操作进一步包括下述步骤:The operation of initializing the system token in step A further includes the following steps:

业务每次更新时,根据更新后的业务重复执行所述步骤A的各项操作,对该业务相关联的系统令牌进行更新;或Each time the business is updated, the operations of Step A are repeated according to the updated business, and the system token associated with the business is updated; or

业务终止时,系统安全控制器更新并清除检查结果缓存表、访问权限令牌表、主体令牌表、令牌索引表和其它安全控制表中与该业务相关的记录。When the service is terminated, the system security controller updates and clears the check result cache table, access token table, subject token table, token index table and other records related to the service in the security control table.

所述步骤A中所述令牌生成算法包括下列步骤:The token generating algorithm described in the step A comprises the following steps:

A1、已有的令牌采用原令牌标识,新创建的令牌采用能够保证所分配的标识具有唯一性的算法自动分配令牌标识;A1. Existing tokens use the original token ID, and newly created tokens are automatically assigned token IDs using an algorithm that can ensure the uniqueness of the assigned ID;

A2、创建令牌摘要消息,该令牌摘要消息由顺序排列的令牌标识、客体标识、权限描述、拥有该令牌的所有主体标识的各个字符段组成;A2. Create a token digest message, which is composed of token identifiers, object identifiers, permission descriptions, and each character field of all subject identifiers that own the token in sequence;

A3、对令牌摘要消息进行散列,并采用包括但不限于信息-摘要算法MD5(message-digest algorithm 5)或安全散列算法SHA(Secure Hash Algorithm)对令牌摘要消息进行运算;A3. Hash the token digest message, and use including but not limited to information-digest algorithm MD5 (message-digest algorithm 5) or secure hash algorithm SHA (Secure Hash Algorithm) to calculate the token digest message;

A4、用系统密钥对散列运算结果进行加密,产生系统签名;A4. Use the system key to encrypt the result of the hash operation to generate a system signature;

A5、按照系统证书的规定格式,用系统签名和系统相关信息创建系统证书;A5. Create a system certificate with the system signature and system-related information in accordance with the specified format of the system certificate;

A6、按照系统规定的令牌格式,用令牌标识和生成的系统证书创建令牌。A6. Create a token with the token ID and the generated system certificate according to the token format specified by the system.

所述步骤B基于令牌对访问进行细粒度控制的操作进一步包括下述步骤:The step B of performing fine-grained control on access based on the token further includes the following steps:

B1、业务将访问资源和/或能力的请求发送给业务代理,以便由业务代理代表业务对资源和/或能力进行访问;B1. The service sends a resource and/or capability access request to the service agent, so that the service agent can access the resource and/or capability on behalf of the service;

B2、业务代理将访问请求发送给访问控制检查器,验证该请求的合法性;B2. The service agent sends the access request to the access control checker to verify the legitimacy of the request;

B3、访问控制检查器对检查结果缓存表进行检索,再根据检索结果采取相应操作;B3. The access control checker retrieves the inspection result cache table, and then takes corresponding operations according to the retrieval results;

B4、如果在检查结果缓存表命中,即检索到与本次访问请求对应的检查结果记录,就将该检查结果返回给业务代理,跳转到步骤B6;B4. If the check result cache table hits, that is, the check result record corresponding to the current access request is retrieved, the check result is returned to the service agent, and jumps to step B6;

B5、如果在检查结果缓存表没有命中,即没有找到与本次访问请求对应的检查结果记录,就将该访问请求发送给系统安全控制器再次进行检查,并由系统安全控制器将其检查结果经访问控制检查器返回给业务代理;B5. If there is no hit in the check result cache table, that is, the check result record corresponding to the access request is not found, the access request is sent to the system security controller to check again, and the check result is recorded by the system security controller Returned to the business agent via the access control checker;

B6、业务代理根据检查结果进行相应操作:如果检查结果为允许访问,则业务代理执行该访问操作,并将执行结果返回给业务;如果检查结果为不允许访问,则业务代理拒绝该访问请求,并将拒绝响应返回给业务。B6. The business agent performs corresponding operations according to the inspection result: if the inspection result is to allow access, the business agent executes the access operation and returns the execution result to the business; if the inspection result is not allowed to access, the business agent rejects the access request, And return a rejection response to the business.

所述步骤B5中系统安全控制器对访问请求再次进行检查的操作进一步包括下述步骤:The operation of the system security controller checking the access request again in the step B5 further includes the following steps:

B51、系统安全控制器检查访问权限令牌表,查询执行该访问操作需要何种令牌;B51. The system security controller checks the access token table, and inquires what kind of token is required to perform the access operation;

B52、系统安全控制器检查主体令牌表,查看该访问请求的主体是否具有步骤B51检索出来的执行该访问操作所需令牌,再根据检索结果采取相应的后续操作;B52. The system security controller checks the subject token table, checks whether the subject of the access request has the token required for performing the access operation retrieved in step B51, and then takes corresponding follow-up operations according to the retrieval result;

B53、如果具有该令牌,即令牌匹配,则检查结果为允许访问,系统安全控制器将允许访问的检查结果更新到检查结果缓存表中,并将验证成功的消息返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理;B53. If there is the token, that is, the token matches, then the check result is to allow access, and the system security controller updates the check result of the allow access to the check result cache table, and returns a message of successful verification to the access control checker , and the access control checker returns the result to the business agent;

B54、如果不具有该令牌,即令牌不匹配,则检查结果为拒绝访问,系统安全控制器将拒绝访问的检查结果更新到检查结果缓存表中;并将验证失败的消息返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理。B54. If you do not have the token, that is, the token does not match, the check result is access denial, and the system security controller updates the check result of access denial to the check result cache table; and returns the message of verification failure to the access control Inspector, the access control inspector returns the result to the business agent.

所述步骤C对检查结果缓存表进行更新的操作进一步包括下述步骤:The operation of updating the inspection result cache table in step C further includes the following steps:

C1、系统安全控制器将每次检查的结果更新到检查结果缓存表中,并打上当前时间戳;C1. The system security controller updates the result of each inspection into the inspection result cache table, and stamps it with the current time stamp;

C2、当检查结果缓存表存储的内容满时,由安全策略管理器根据系统安全策略删除检查结果缓存表中缓存的检查结果记录;C2. When the content stored in the inspection result cache table is full, the security policy manager deletes the inspection result records cached in the inspection result cache table according to the system security policy;

C3、安全策略管理器根据系统安全管理策略,定时清除检查结果缓存表中缓存的过期检查结果记录;C3. The security policy manager periodically clears the expired check result records cached in the check result cache table according to the system security management policy;

C4、当一个业务被终止时,系统安全控制器将检查结果缓存表中所有与该业务相关的检查结果全部清除。C4. When a service is terminated, the system security controller clears all check results related to the service in the check result cache table.

本发明的优点和效果是:Advantage and effect of the present invention are:

(1)在应用服务器的访问控制系统中设置了用于代表业务访问资源和/或能力的业务代理。在应用服务器中,业务可由第三方编写,而业务代理则是应用服务器自身提供的。通过业务代理的引入,对资源进行访问控制以及实际的资源访问操作都是由保证安全的实体——业务代理来完成,提高了系统的安全性。(1) A service agent for accessing resources and/or capabilities on behalf of a service is set in the access control system of the application server. In the application server, the service can be written by a third party, while the service agent is provided by the application server itself. Through the introduction of business agent, access control to resources and actual resource access operations are all done by the entity that guarantees security——business agent, which improves the security of the system.

(2)在应用服务器的访问控制系统中还设置了分别独立完成对访问请求进行审核检查的访问控制检查器和系统安全控制器,业务代理只需要根据访问控制检查器返回的检查结果来进行操作。因此,实现了访问请求的安全检查和访问操作本身的分离,提高了系统的安全性和可维护性。(2) In the access control system of the application server, an access control checker and a system security controller that independently audit and check the access request are also set up, and the business agent only needs to operate according to the check result returned by the access control checker . Therefore, the separation of the security check of the access request and the access operation itself is realized, and the security and maintainability of the system are improved.

(3)本发明系统设置了用于保存访问控制检查结果的检查结果缓存表,并且,查询该检查结果缓存表的操作简单、高效,大大提高了该访问控制系统的判断效率。该系统还设置了用于执行系统动态配置的安全策略管理器,而安全策略的动态可配置性,提高了系统的灵活性。(3) The system of the present invention is provided with an inspection result cache table for storing access control inspection results, and the operation of querying the inspection result cache table is simple and efficient, which greatly improves the judgment efficiency of the access control system. The system is also provided with a security policy manager for performing dynamic configuration of the system, and the dynamic configurability of the security policy improves the flexibility of the system.

(4)本发明采用基于令牌对访问进行细粒度控制的方法。令牌的引入,首先满足了控制访问的要求,提高了系统的安全性;其次,令牌可以大大减少该访问控制系统本身的空间要求。(4) The present invention adopts a token-based method for fine-grained access control. The introduction of the token first meets the requirements of access control and improves the security of the system; secondly, the token can greatly reduce the space requirement of the access control system itself.

(5)本发明采用的对检查结果缓存表进行定时更新的机制,实现了检查结果缓存表的动态及时更新,提高了检查结果缓存表的命中率,进而提高安全访问检索操作的速度;还能够保证检查结果缓存表中数据的真实可靠性,确保系统的安全。(5) The mechanism that the present invention adopts regularly updates the inspection result cache table, realizes the dynamic and timely update of the inspection result cache table, improves the hit rate of the inspection result cache table, and then improves the speed of safe access retrieval operation; Ensure the authenticity and reliability of the data in the check result cache table to ensure the security of the system.

附图说明 Description of drawings

图1是本发明访问控制系统的结构组成示意图。Fig. 1 is a schematic diagram of the structural composition of the access control system of the present invention.

图2是本发明的令牌格式示意图。Fig. 2 is a schematic diagram of the token format of the present invention.

图3是本发明访问控制方法操作流程方框图。Fig. 3 is a block diagram of the operation flow of the access control method of the present invention.

图4是本发明的令牌生成算法流程方框图。Fig. 4 is a flow block diagram of the token generation algorithm of the present invention.

图5是本发明的基于令牌对访问进行细粒度控制方法操作流程方框图。Fig. 5 is a block diagram of the operation flow of the token-based fine-grained access control method of the present invention.

图6是本发明中的系统安全控制器对访问请求进行检查,并将检查结果返回给访问控制检查器的操作流程方框图。Fig. 6 is a block diagram of the operation flow of the system security controller checking the access request and returning the checking result to the access control checker in the present invention.

图7是本发明基于令牌对访问进行细粒度控制过程中的消息交互图。Fig. 7 is a message interaction diagram in the fine-grained access control process based on tokens in the present invention.

具体实施方式 Detailed ways

为使本发明的目的、技术方案和优点更加清楚,下面结合附图对本发明作进一步的详细描述。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

本发明是一种用于应用服务器的基于令牌的细粒度访问控制系统及其实现方法。该访问控制系统和方法必须满足下一代网络中应用服务器对于访问控制的下述要求:首先,应用服务器是下一代网络中的业务执行平台,访问控制系统必须对应用服务器中任何主体对客体的每一次访问都能够进行有效控制,从而保证系统的安全性;并且,希望应用服务器能够提供细粒度的访问控制能力。另外,应用服务器要向用户提供从企业级到电信级的服务,因此,要求该访问控制系统的控制访问的各项操作必须有较高的工作效率,以便尽量减少系统正常处理各项业务的效率和满足用户需求。最后,该访问控制系统必须确保自身的安全和工作可靠。The present invention is a token-based fine-grained access control system for application servers and its implementation method. The access control system and method must meet the following requirements of the application server in the next generation network for access control: first, the application server is the service execution platform in the next generation network, and the access control system must control every subject to object in the application server. An access can be effectively controlled to ensure the security of the system; moreover, it is hoped that the application server can provide fine-grained access control capabilities. In addition, the application server must provide users with services ranging from enterprise level to telecommunication level. Therefore, each operation of the access control system must have high work efficiency, so as to minimize the efficiency of the system in normal processing of various businesses. and meet user needs. Finally, the access control system must ensure its own safety and reliability.

参见图1,本发明是一种用于应用服务器的基于令牌的细粒度访问控制系统,该系统包括有:Referring to Fig. 1, the present invention is a token-based fine-grained access control system for application servers, the system includes:

由为客户提供服务的应用程序组成的业务单元101,该业务单元101需要访问应用服务器中的资源和/或能力;A business unit 101 composed of an application program that provides services to customers, and the business unit 101 needs to access resources and/or capabilities in the application server;

由保证安全的代码组成的业务代理单元102,用于代理业务访问资源/能力单元,该业务代理单元102分别与业务单元101、资源/能力单元130和访问控制单元110进行通信连接;A service proxy unit 102 composed of codes that guarantee security is used to proxy service access to resource/capability units, and the service proxy unit 102 communicates with the service unit 101, the resource/capability unit 130 and the access control unit 110 respectively;

由至少包括各种文件资源、网络资源、数据库资源与其它资源和/或能力组成的系统资源/能力单元130;A system resource/capability unit 130 consisting of at least various file resources, network resources, database resources and other resources and/or capabilities;

由顺序连接的访问控制检查器、系统安全控制器和安全策略管理器组成的访问控制单元110,用于在主体访问客体时进行基于令牌的细粒度访问控制;An access control unit 110 composed of sequentially connected access control checker, system security controller and security policy manager is used for token-based fine-grained access control when the subject accesses the object;

由缓存本系统的访问控制结果、以提高访问控制效率的检查结果缓存表、保存访问每个客体的不同权限所对应的令牌的访问权限令牌表、保存主体所拥有的令牌列表的主体令牌表、保存持有令牌的主体标识列表的令牌索引表,以及至少包括系统安全策略定义的其他安全控制表组成的控制访问的令牌与数据存储单元120,用于配合访问控制单元完成基于令牌的细粒度访问控制;其中检查结果缓存表同时连接访问控制单元中的三个部件,访问权限令牌表、主体令牌表、令牌索引表和其他安全控制表都只与访问控制单元中的系统安全控制器和安全策略管理器构成通信连接。该令牌与数据存储单元120中的令牌和数据的描述方式包括但不限于扩展标记语言XML或其它高级程序语言设计的数据结构、或数据库表单;令牌和数据的存储形式至少包括内存、或文件、或数据库;存储方式是集中式和/或分布式。The access control results of the system are cached, the check result cache table to improve access control efficiency, the access authority token table that stores the tokens corresponding to the different permissions to access each object, and the subject that stores the token list owned by the subject The access control token and data storage unit 120 composed of a token table, a token index table storing a list of subject identifiers holding tokens, and at least including other security control tables defined by system security policies is used to cooperate with the access control unit Complete token-based fine-grained access control; the inspection result cache table is connected to the three components in the access control unit at the same time, and the access token table, subject token table, token index table and other security control tables are only related to the access The system security controller and the security policy manager in the control unit form a communication connection. The token and data description in the token and data storage unit 120 include, but are not limited to, data structures designed in Extended Markup Language XML or other advanced programming languages, or database forms; the storage forms of tokens and data include at least memory, Or files, or databases; storage is centralized and/or distributed.

访问控制单元110是该系统的控制核心,下面介绍三个组件的功能及操作:The access control unit 110 is the control core of the system, and the functions and operations of the three components are introduced below:

用于接收并检查业务代理的访问请求的访问控制检查器,首先根据检查结果缓存表检查该访问请求的合法性:如果在检查结果缓存表中检索到与该访问请求对应的检查结果记录,则该检查结果记录表明该次访问是否合法,并将检索到的检查结果记录直接返回给业务代理;如果在检查结果缓存表中没有检索到与该访问请求对应的检查结果记录,则将访问请求转发给系统安全控制器继续进行检查,并将系统安全控制器的验证结果返回给业务代理;同时将本次检查结果更新到检查结果缓存表中。The access control checker for receiving and checking the access request of the service agent first checks the legitimacy of the access request according to the check result cache table: if the check result record corresponding to the access request is retrieved in the check result cache table, then The inspection result record indicates whether the access is legal, and the retrieved inspection result record is directly returned to the service agent; if the inspection result record corresponding to the access request is not retrieved in the inspection result cache table, the access request is forwarded The system security controller continues to check, and returns the verification result of the system security controller to the service agent; at the same time, the check result is updated into the check result cache table.

作为系统访问控制核心的系统安全控制器能够提供安全访问合法性的最终检查结果,并维护执行系统的其它安全功能;也就是说,当访问控制检查器从检查结果缓存表中检索不到该访问请求所对应的检查结果记录时,将由系统安全控制器来最终决定该次访问是否合法;系统安全控制器还能够根据访问控制检查结果来及时更新检查结果缓存表,以及管理系统关键数据等。The system security controller, as the core of system access control, can provide the final inspection result of the legality of security access and maintain other security functions of the execution system; that is, when the access control checker cannot retrieve the access from the check result cache table When requesting the corresponding inspection result record, the system security controller will finally decide whether the access is legal; the system security controller can also update the inspection result cache table in time according to the access control inspection results, and manage system key data, etc.

安全策略管理器,用于执行系统保存在其它安全控制表中、并进行动态配置的安全访问控制策略,以及定时清除检查结果缓存表等。The security policy manager is used to implement the security access control policy stored in other security control tables and dynamically configured by the system, and clear the cache table of inspection results at regular intervals.

本发明是基于令牌的访问控制系统,所谓令牌是主体对客体进行访问所必需的一种凭证,主体只有具备对特定客体进行特定访问所需的令牌,访问才能够成功,否则,该访问会被系统拒绝。The present invention is a token-based access control system. The so-called token is a credential necessary for the subject to access the object. Only when the subject has the token required for specific access to a specific object can the access succeed. Otherwise, the Access will be denied by the system.

参见图2,本发明令牌的格式是特定的:由令牌标识(Token ID)和系统证书两部分组成。其中令牌标识是系统统一分配的、用于唯一标识该令牌的字符串;系统证书是系统签署的安全证书(Certificate),采用可被其它基于公钥的软件共享的X.509或其它证书格式,证书内的系统签名由该系统特定算法生成。Referring to Fig. 2, the format of token of the present invention is specific: it is made up of two parts of token identification (Token ID) and system certificate. The token identifier is a string assigned by the system to uniquely identify the token; the system certificate is a security certificate (Certificate) signed by the system, using X.509 or other certificates that can be shared by other public key-based software format, the system signature within the certificate is generated by that system-specific algorithm.

本发明的细粒度的访问控制特性主要体现在两方面:第一,该系统的访问控制令牌是按每个客体的每个权限分别发放的,实现了客体访问的细粒度控制;第二,该系统对于主体的控制可以从业务级细化精确到对象的方法级,实现了主体访问的细粒度控制。The fine-grained access control feature of the present invention is mainly reflected in two aspects: first, the access control token of the system is issued separately according to each authority of each object, realizing the fine-grained control of object access; second, The system's control over the subject can be refined from the business level to the method level of the object, realizing the fine-grained control of subject access.

参见图3,本发明用于应用服务器的基于令牌的细粒度访问控制方法包括三个操作步骤:Referring to Fig. 3, the token-based fine-grained access control method for an application server in the present invention includes three steps:

A、在业务加载、或更新、或终止时,先对系统令牌进行初始化;A. When the service is loaded, or updated, or terminated, first initialize the system token;

B、在业务访问系统资源和/或能力的过程中,基于令牌对访问进行安全检查控制;B. In the process of business accessing system resources and/or capabilities, security checks and controls are performed on access based on tokens;

C、在系统安全控制器对访问进行检查之后、或检查结果缓存表满时、或检查结果缓存表保存的检查结果过期时、或业务终止时,分别对检查结果缓存表进行更新。C. After the system security controller checks the access, or when the check result cache table is full, or when the check result stored in the check result cache table expires, or when the service is terminated, respectively update the check result cache table.

下面结合附图具体描述这三个步骤。These three steps are described in detail below in conjunction with the accompanying drawings.

其中步骤A初始化系统令牌的操作进一步包括下述步骤:The operation of initializing the system token in step A further includes the following steps:

A1、应用服务器与业务进行访问控制能力的协商;A1. Negotiation of access control capabilities between the application server and the business;

A2、根据协商结果,为本次协商涉及到的所有权限创建新的令牌列表,调用令牌生成算法创建新的令牌;参见图4,具体说明令牌生成算法的操作步骤:A2. According to the negotiation results, create a new token list for all the permissions involved in this negotiation, and call the token generation algorithm to create new tokens; see Figure 4, specifically explain the operation steps of the token generation algorithm:

(A21)已有的令牌采用原令牌标识,新创建的令牌系统采用能够保证所分配的标识唯一性的算法自动分配令牌标识;(A21) Existing tokens use the original token ID, and the newly created token system uses an algorithm that can guarantee the uniqueness of the assigned ID to automatically assign token IDs;

(A22)创建令牌摘要消息,该令牌摘要消息由顺序排列的令牌标识、客体标识、权限描述、拥有该令牌的所有主体标识的各个字符段组成;(A22) Create a token digest message, which is composed of token identifiers, object identifiers, authority descriptions, and each character field of all subject identifiers that have the token in sequence;

(A23)对令牌摘要消息进行散列,系统采用MD5或SHA或其它散列算法对令牌摘要消息进行运算;(A23) Hashing the token summary message, the system uses MD5 or SHA or other hash algorithms to perform operations on the token summary message;

(A24)用系统密钥对散列运算结果进行加密,产生系统签名;(A24) Encrypt the hash operation result with the system key to generate a system signature;

(A25)按照系统证书的规定格式,用系统签名和系统相关信息创建系统证书;(A25) Create a system certificate with the system signature and system-related information in accordance with the specified format of the system certificate;

(A26)按照系统规定的令牌格式,用令牌标识和生成的系统证书创建令牌。(A26) Create a token with the token identifier and the generated system certificate according to the token format specified by the system.

A3、根据协商结果及产生的新的令牌列表,对该业务的主体令牌表进行初始化,所述主体令牌表记录了该业务的所有主体拥有的令牌;A3. According to the negotiation result and the generated new token list, initialize the subject token table of the service, and the subject token table records the tokens owned by all subjects of the service;

A4、根据协商结果及产生的令牌列表,在令牌索引表中插入或更新令牌索引数据,以便将持有各个令牌的主体标识记录到每个令牌对应的记录中去;并根据令牌索引表中记录的主体标识找到该标识对应的主体令牌表,然后更新已拥有该令牌的业务的主体令牌表;A4. According to the negotiation result and the generated token list, insert or update the token index data in the token index table, so that the identity of the subject holding each token is recorded in the record corresponding to each token; and according to Find the subject token table corresponding to the subject ID recorded in the token index table, and then update the subject token table of the business that already owns the token;

A5、根据协商结果及产生的令牌列表,更新访问权限令牌表,该权限令牌表记录了对客体进行访问所需要的令牌;A5. According to the negotiation result and the generated token list, update the access token table, which records the tokens required to access the object;

A6、业务每次更新时,根据更新后的业务重复执行上述步骤A1~A5的操作,对该业务相关联的系统令牌进行更新;A6. When the business is updated each time, the operations of the above steps A1 to A5 are repeated according to the updated business, and the system token associated with the business is updated;

A7、业务终止时,系统安全控制器更新并清除检查结果缓存表、访问权限令牌表、主体令牌表、令牌索引表和其它安全控制表中与该业务相关的记录。A7. When the service is terminated, the system security controller updates and clears the check result cache table, access token table, subject token table, token index table and other records related to the service in the security control table.

参见图5,具体说明步骤B基于令牌对访问进行细粒度控制的操作步骤:Referring to Figure 5, specifically explain the operation steps of Step B for fine-grained control of access based on tokens:

B1、业务将访问资源和/或能力的请求发送给业务代理,以便由业务代理代表业务对资源和/或能力进行访问;B1. The service sends a resource and/or capability access request to the service agent, so that the service agent can access the resource and/or capability on behalf of the service;

B2、业务代理将访问请求发送给访问控制检查器,以验证该请求的合法性;B2. The service agent sends the access request to the access control checker to verify the legitimacy of the request;

B3、访问控制检查器对检查结果缓存表进行检索,再根据检索结果采取相应操作;B3. The access control checker retrieves the inspection result cache table, and then takes corresponding operations according to the retrieval results;

B4、如果在检查结果缓存表命中,即检索到与本次访问请求对应的检查结果记录,就将该检查结果返回给业务代理,跳转到步骤B6;B4. If the check result cache table hits, that is, the check result record corresponding to the current access request is retrieved, the check result is returned to the service agent, and jumps to step B6;

B5、如果在检查结果缓存表没有命中,即没有找到与本次访问请求对应的检查结果记录,就将该访问请求发送给系统安全控制器再次进行检查,并由系统安全控制器将其检查结果经访问控制检查器返回给业务代理;B5. If there is no hit in the check result cache table, that is, the check result record corresponding to the access request is not found, the access request is sent to the system security controller to check again, and the check result is recorded by the system security controller Returned to the business agent via the access control checker;

B6、业务代理根据检查结果进行相应操作:如果检查结果为允许访问,则业务代理执行该访问操作,并将执行结果返回给业务;如果检查结果为不允许访问,则业务代理拒绝该访问请求,并将拒绝响应返回给业务。B6. The business agent performs corresponding operations according to the inspection result: if the inspection result is to allow access, the business agent executes the access operation and returns the execution result to the business; if the inspection result is not allowed to access, the business agent rejects the access request, And return a rejection response to the business.

参见图6,具体说明上述步骤B5中系统安全控制器对访问请求再次进行检查的操作:Referring to Fig. 6, specifically explain the operation of the system security controller checking the access request again in the above step B5:

(B51)系统安全控制器检查访问权限令牌表,查询执行该访问操作需要何种令牌;(B51) The system security controller checks the access token table, and inquires what kind of token is needed to perform the access operation;

(B52)系统安全控制器检查主体令牌表,查看该访问请求的主体是否具有步骤B51检索出来的执行该访问操作所需令牌,再根据检索结果采取相应操作;(B52) The system security controller checks the subject token table, checks whether the subject of the access request has the required token for performing the access operation retrieved in step B51, and then takes corresponding operations according to the retrieval result;

(B53)如果具有该令牌,即令牌匹配,则检查结果为允许访问,系统安全控制器将允许访问的检查结果更新到检查结果缓存表中,并将验证成功的消息返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理;(B53) If have this token, i.e. token match, then inspection result is to allow access, and system security controller updates the inspection result that allows access in the inspection result cache table, and the message of verification success is returned to access control inspection , the access control checker returns the result to the business agent;

(B54)如果不具有该令牌,即令牌不匹配,则检查结果为拒绝访问,系统安全控制器将拒绝访问的检查结果更新到检查结果缓存表中;并将验证失败的消息返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理。(B54) If do not have this token, promptly token does not match, then inspection result is denial of access, system security controller updates the inspection result of denial of access in the inspection result cache table; And the message of verification failure is returned to access The control checker, and the access control checker returns the result to the business agent.

图7是采用消息交互图的形式对本发明系统基于令牌的细粒度访问控制的处理过程进行了说明,图中各个步骤的含义和图5及图6是一致的,不再赘述。Fig. 7 illustrates the processing process of token-based fine-grained access control in the system of the present invention in the form of a message interaction diagram. The meaning of each step in the diagram is consistent with that in Fig. 5 and Fig. 6 , and will not be repeated here.

本发明的步骤C对检查结果缓存表进行更新的操作包括下述步骤:Step C of the present invention updates the inspection result cache table and includes the following steps:

C1、系统安全控制器将每次检查的结果更新到检查结果缓存表中,并打上当前时间戳;C1. The system security controller updates the result of each inspection into the inspection result cache table, and stamps it with the current time stamp;

C2、当检查结果缓存表存储的内容满时,由安全策略管理器根据系统安全策略删除检查结果缓存表中缓存的检查结果记录;C2. When the content stored in the inspection result cache table is full, the security policy manager deletes the inspection result records cached in the inspection result cache table according to the system security policy;

C3、安全策略管理器根据系统安全管理策略,定时清除检查结果缓存表中缓存的过期检查结果记录;C3. The security policy manager periodically clears the expired check result records cached in the check result cache table according to the system security management policy;

C4、当一个业务被终止时,系统安全控制器将检查结果缓存表中所有与该业务相关的检查结果全部清除。C4. When a service is terminated, the system security controller clears all check results related to the service in the check result cache table.

Claims (12)

1、一种用于应用服务器的基于令牌的细粒度访问控制系统,包括有:1. A token-based fine-grained access control system for application servers, including: 业务单元,由为客户提供服务的应用程序组成,该业务单元需要访问应用服务器中的资源和/或能力;A business unit, consisting of an application program providing services to customers, which requires access to resources and/or capabilities in the application server; 资源/能力单元,由至少包括各种文件资源、网络资源、数据库资源与其它资源和/或能力组成;其特征在于:该系统还包括有:The resource/capability unit consists of at least various file resources, network resources, database resources and other resources and/or capabilities; it is characterized in that: the system also includes: 业务代理单元,由保证安全的代码组成,分别与业务单元、资源/能力单元和访问控制单元进行通信连接,用于代理业务访问资源/能力单元;The business proxy unit is composed of security-guaranteed codes, which communicate with the business unit, the resource/capability unit and the access control unit respectively, and are used to access the resource/capability unit for business on behalf of the business; 访问控制单元,由顺序连接的访问控制检查器、系统安全控制器和安全策略管理器组成,用于在主体访问客体时进行基于令牌的细粒度访问控制;其中访问控制检查器接收到业务代理的访问请求时,先在检查结果缓存表中检索该访问请求的访问控制检查结果;如果在检查结果缓存表中检索到与该请求对应的检查结果记录,则将检索到的检查结果记录直接返回给业务代理;如果在检查结果缓存表中没有检索到与该访问请求对应的检查结果记录,则将访问请求传送给系统安全控制器,由系统安全控制器验证该主体是否拥有执行本次客体操作的令牌和给出验证结果,并将验证结果返回给业务代理和将本次检查结果更新到检查结果缓存表中;安全策略管理器用于执行系统的安全访问控制策略,并定时清除检查结果缓存表;The access control unit consists of sequentially connected access control inspectors, system security controllers, and security policy managers for token-based fine-grained access control when the subject accesses objects; where the access control inspector receives the business agent For an access request, first retrieve the access control inspection result of the access request in the inspection result cache table; if the inspection result record corresponding to the request is retrieved in the inspection result cache table, the retrieved inspection result record will be returned directly to the business agent; if the check result record corresponding to the access request is not retrieved in the check result cache table, the access request is sent to the system security controller, and the system security controller verifies whether the subject has the right to execute the object operation The token and the verification result are given, and the verification result is returned to the business agent and the inspection result is updated to the inspection result cache table; the security policy manager is used to implement the security access control policy of the system, and periodically clear the inspection result cache surface; 控制访问的令牌与数据存储单元,包括有:缓存本系统的访问控制结果的检查结果缓存表、保存访问每个客体的不同权限所对应的令牌的访问权限令牌表、保存主体所拥有的令牌列表的主体令牌表、保存持有令牌的主体标识列表的令牌索引表,以及至少包括系统安全策略定义的其他安全控制表,其中检查结果缓存表同时连接访问控制单元中的三个部件,访问权限令牌表、主体令牌表、令牌索引表和其他安全控制表都只与访问控制单元中的系统安全控制器和安全策略管理器构成通信连接,用于配合访问控制单元完成基于令牌的细粒度访问控制。The access control token and data storage unit include: a check result cache table for caching the access control results of the system, an access token table for storing the tokens corresponding to different permissions for accessing each object, and a table for storing the objects owned by the subject. The subject token table of the token list, the token index table of the subject identification list holding the token, and at least other security control tables including the definition of the system security policy, wherein the check result cache table is connected to the access control unit at the same time The three parts, the access token table, the subject token table, the token index table and other security control tables, only form a communication connection with the system security controller and security policy manager in the access control unit, and are used to cooperate with access control The unit completes token-based fine-grained access control. 2、根据权利要求1所述的访问控制系统,其特征在于:所述控制访问的令牌与数据存储单元中的令牌和数据的描述方式包括扩展标记语言XML或其它高级程序语言设计的数据结构、或数据库表单;所述令牌和数据的存储形式包括内存、或文件、或数据库;存储方式是集中式和/或分布式。2. The access control system according to claim 1, characterized in that: the token for controlling access and the description of the token and data in the data storage unit include extended markup language XML or data designed by other high-level programming languages structure, or database form; the storage form of the token and data includes memory, or file, or database; the storage method is centralized and/or distributed. 3、根据权利要求1或2所述的访问控制系统,其特征在于:所述令牌是主体访问客体所必需的凭证,即只有当主体具备对特定客体进行特定访问所需的令牌,访问才能够成功;否则,该访问会被系统拒绝;所述令牌的分配、保存和检查都由系统统一管理。3. The access control system according to claim 1 or 2, characterized in that: the token is a credential necessary for the subject to access the object, that is, only when the subject has the token required for specific access to a specific object, the access Otherwise, the access will be rejected by the system; the allocation, storage and checking of the token are all managed by the system. 4、根据权利要求1或2所述的访问控制系统,其特征在于:所述令牌格式包括令牌标识和系统证书两部分,其中令牌标识是系统统一分配的、用于唯一标识该令牌的字符串;系统证书是系统签署的安全证书,该证书格式采用X.509标准,或可被基于公钥的软件共享的其它格式;所述X.509是规定公钥证书的格式及相关验证算法的公钥体系基础结构标准,证书内的系统签名由该系统特定算法生成。4. The access control system according to claim 1 or 2, characterized in that: the token format includes two parts: a token identifier and a system certificate, wherein the token identifier is uniformly assigned by the system and is used to uniquely identify the token The character string of the brand; the system certificate is a security certificate signed by the system, and the format of the certificate adopts the X.509 standard, or other formats that can be shared by software based on the public key; the X.509 specifies the format of the public key certificate and related A public key infrastructure standard that verifies the algorithm by which the system's signature within the certificate was generated. 5、根据权利要求1所述的访问控制系统,其特征在于:所述细粒度是访问控制的粒度性能,体现在主、客体两个方面:该系统的访问控制令牌是按照每个客体的每个权限分别发放的,以实现客体访问的细粒度控制;该系统对于主体的控制可以从业务级细化精确到对象的方法级,实现主体访问的细粒度控制。5. The access control system according to claim 1, characterized in that: the fine-grainedness is the granularity performance of access control, which is reflected in two aspects of subject and object: the access control token of the system is based on each object Each permission is issued separately to achieve fine-grained control of object access; the system's control over the subject can be refined from the business level to the method level of the object to achieve fine-grained control of subject access. 6、根据权利要求1所述的访问控制系统,其特征在于:所述系统安全控制器为该系统访问控制的核心控制器,用于提供最终的安全访问合法性的检查验证功能,以及至少包括根据访问控制检查结果、更新检查结果缓存表和管理系统关键数据的其它安全性能的维护执行功能;6. The access control system according to claim 1, characterized in that: the system security controller is the core controller of the system access control, which is used to provide the final inspection and verification function of the legality of security access, and at least includes According to the access control inspection results, update the inspection result cache table and other security functions of the management system key data maintenance execution function; 所述安全策略管理器用于执行系统的安全访问控制策略,并定时清除检查结果缓存表;所述安全访问控制策略由系统动态配置并存贮在其它安全控制表中。The security policy manager is used to execute the security access control policy of the system, and periodically clear the check result cache table; the security access control policy is dynamically configured by the system and stored in other security control tables. 7、一种用于应用服务器的基于令牌的细粒度访问控制方法,其特征在于:包括下述操作步骤:7. A token-based fine-grained access control method for an application server, characterized in that it includes the following steps: A、在业务加载时,应用服务器与业务进行访问控制能力的协商,并根据协商结果,为本次协商涉及到的所有权限创建新的令牌列表,调用令牌生成算法创建新的令牌;然后根据协商结果及新的令牌列表,对该业务的主体令牌表和系统令牌进行初始化,所述主体令牌表记录了该业务的所有主体拥有的令牌;再根据协商结果及令牌列表,更新访问权限令牌表,所述权限令牌表记录了对客体进行访问所需要的令牌;A. When the business is loaded, the application server negotiates the access control capability with the business, and according to the negotiation result, creates a new token list for all permissions involved in this negotiation, and calls the token generation algorithm to create a new token; Then, according to the negotiation result and the new token list, initialize the subject token table and the system token of the service, and the subject token table records the tokens owned by all subjects of the service; then according to the negotiation result and the order card list, and update the access token table, which records the tokens needed to access the object; B、在业务访问系统资源和/或能力时,业务首先将访问资源和/或能力的请求发送给业务代理,业务代理再将访问请求发送给访问控制检查器,验证该请求的合法性;访问控制检查器先对检查结果缓存表进行检索,如果检索到与本次访问请求对应的检查结果记录,就将该检查结果返回给业务代理,否则将该访问请求发送给系统安全控制器再次进行检查;系统安全控制器先检查访问权限令牌表,查询执行该访问操作需要何种令牌;然后系统安全控制器检查主体令牌表,查看该访问请求的主体是否具有执行该访问操作所需令牌;如果具有该令牌,则检查结果为允许访问,如果不具有该令牌,则检查结果为拒绝访问,然后系统安全控制器将检查结果更新到检查结果缓存表中,并将验证结果返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理;如果检查结果为允许访问,则业务代理执行该访问操作,并将执行结果返回给业务;如果检查结果为不允许访问,则业务代理拒绝该访问请求,并将拒绝响应返回给业务;B. When a business accesses system resources and/or capabilities, the business first sends a request to access resources and/or capabilities to the business agent, and the business agent then sends the access request to the access control checker to verify the legitimacy of the request; access The control checker first retrieves the check result cache table, if it retrieves the check result record corresponding to this access request, it returns the check result to the service agent, otherwise it sends the access request to the system security controller to check again ; The system security controller first checks the access token table, and inquires what kind of token is required to perform the access operation; If you have the token, the check result is to allow access, if you do not have the token, the check result is to deny access, then the system security controller will update the check result to the check result cache table, and return the verification result To the access control checker, the access control checker returns the result to the business agent; if the check result is to allow access, the business agent executes the access operation and returns the execution result to the business; if the check result is not to allow access, Then the service agent rejects the access request, and returns a rejection response to the service; C、在系统安全控制器对访问进行检查之后、或检查结果缓存表满时、或检查结果缓存表保存的检查结果过期时、或业务终止时,分别对检查结果缓存表进行更新。C. After the system security controller checks the access, or when the check result cache table is full, or when the check result stored in the check result cache table expires, or when the service is terminated, respectively update the check result cache table. 8、根据权利要求7所述的访问控制方法,其特征在于:所述步骤A初始化系统令牌的操作进一步包括下述步骤:8. The access control method according to claim 7, characterized in that: the operation of initializing the system token in step A further includes the following steps: 业务每次更新时,根据更新后的业务重复执行所述步骤A的各项操作,对该业务相关联的系统令牌进行更新;或Each time the business is updated, the operations of Step A are repeated according to the updated business, and the system token associated with the business is updated; or 业务终止时,系统安全控制器更新并清除检查结果缓存表、访问权限令牌表、主体令牌表、令牌索引表和其它安全控制表中与该业务相关的记录。When the service is terminated, the system security controller updates and clears the check result cache table, access token table, subject token table, token index table and other records related to the service in the security control table. 9、根据权利要求7所述的访问控制方法,其特征在于:所述步骤A中所述令牌生成算法包括下列步骤:9. The access control method according to claim 7, characterized in that: said token generation algorithm in said step A comprises the following steps: A1、已有的令牌采用原令牌标识,新创建的令牌采用能够保证所分配的标识具有唯一性的算法自动分配令牌标识;A1. Existing tokens use the original token ID, and newly created tokens are automatically assigned token IDs using an algorithm that can ensure the uniqueness of the assigned ID; A2、创建令牌摘要消息,该令牌摘要消息由顺序排列的令牌标识、客体标识、权限描述、拥有该令牌的所有主体标识的各个字符段组成;A2. Create a token digest message, which is composed of token identifiers, object identifiers, permission descriptions, and each character field of all subject identifiers that own the token in sequence; A3、对令牌摘要消息进行散列,并采用包括但不限于信息-摘要算法MD5或安全散列算法SHA对令牌摘要消息进行运算;A3. Hash the token summary message, and use information-digest algorithm MD5 or secure hash algorithm SHA to calculate the token summary message; A4、用系统密钥对散列运算结果进行加密,产生系统签名;A4. Use the system key to encrypt the result of the hash operation to generate a system signature; A5、按照系统证书的规定格式,用系统签名和系统相关信息创建系统证书;A5. Create a system certificate with the system signature and system-related information in accordance with the specified format of the system certificate; A6、按照系统规定的令牌格式,用令牌标识和生成的系统证书创建令牌。A6. Create a token with the token ID and the generated system certificate according to the token format specified by the system. 10、根据权利要求7所述的访问控制方法,其特征在于:所述步骤B基于令牌对访问进行细粒度控制的操作进一步包括下述步骤:10. The access control method according to claim 7, characterized in that: the step B of performing fine-grained control on access based on tokens further includes the following steps: B1、业务将访问资源和/或能力的请求发送给业务代理,以便由业务代理代表业务对资源和/或能力进行访问;B1. The service sends a resource and/or capability access request to the service agent, so that the service agent can access the resource and/or capability on behalf of the service; B2、业务代理将访问请求发送给访问控制检查器,验证该请求的合法性;B2. The service agent sends the access request to the access control checker to verify the legitimacy of the request; B3、访问控制检查器对检查结果缓存表进行检索,再根据检索结果采取相应操作;B3. The access control checker retrieves the inspection result cache table, and then takes corresponding operations according to the retrieval result; B4、如果在检查结果缓存表命中,即检索到与本次访问请求对应的检查结果记录,就将该检查结果返回给业务代理,跳转到步骤B6;B4. If the check result cache table hits, that is, the check result record corresponding to the current access request is retrieved, the check result is returned to the service agent, and jumps to step B6; B5、如果在检查结果缓存表没有命中,即没有找到与本次访问请求对应的检查结果记录,就将该访问请求发送给系统安全控制器再次进行检查,并由系统安全控制器将其检查结果经访问控制检查器返回给业务代理;B5. If there is no hit in the check result cache table, that is, the check result record corresponding to the access request is not found, the access request is sent to the system security controller to check again, and the check result is recorded by the system security controller Returned to the business agent via the access control checker; B6、业务代理根据检查结果进行相应操作:如果检查结果为允许访问,则业务代理执行该访问操作,并将执行结果返回给业务;如果检查结果为不允许访问,则业务代理拒绝该访问请求,并将拒绝响应返回给业务。B6. The business agent performs corresponding operations according to the inspection result: if the inspection result is to allow access, the business agent executes the access operation and returns the execution result to the business; if the inspection result is not allowed to access, the business agent rejects the access request, And return a rejection response to the business. 11、根据权利要求10所述的访问控制方法,其特征在于:所述步骤B5中系统安全控制器对访问请求再次进行检查的操作进一步包括下述步骤:11. The access control method according to claim 10, characterized in that: the operation of the system security controller checking the access request again in the step B5 further includes the following steps: B51、系统安全控制器检查访问权限令牌表,查询执行该访问操作需要何种令牌;B51. The system security controller checks the access token table, and inquires what kind of token is required to perform the access operation; B52、系统安全控制器检查主体令牌表,查看该访问请求的主体是否具有步骤B51检索出来的执行该访问操作所需令牌,再根据检索结果采取相应的后续操作;B52. The system security controller checks the subject token table, checks whether the subject of the access request has the token required for performing the access operation retrieved in step B51, and then takes corresponding follow-up operations according to the retrieval result; B53、如果具有该令牌,即令牌匹配,则检查结果为允许访问,系统安全控制器将允许访问的检查结果更新到检查结果缓存表中,并将验证成功的消息返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理;B53. If there is the token, that is, the token matches, then the check result is to allow access, and the system security controller updates the check result of the allow access to the check result cache table, and returns a message of successful verification to the access control checker , and the access control checker returns the result to the business agent; B54、如果不具有该令牌,即令牌不匹配,则检查结果为拒绝访问,系统安全控制器将拒绝访问的检查结果更新到检查结果缓存表中;并将验证失败的消息返回给访问控制检查器,访问控制检查器再将该结果返回给业务代理。B54. If you do not have the token, that is, the token does not match, the check result is access denial, and the system security controller updates the check result of access denial to the check result cache table; and returns the message of verification failure to the access control Inspector, the access control inspector returns the result to the business agent. 12、根据权利要求7所述的访问控制方法,其特征在于:所述步骤C对检查结果缓存表进行更新的操作进一步包括下述步骤:12. The access control method according to claim 7, characterized in that: the operation of updating the inspection result cache table in the step C further includes the following steps: C1、系统安全控制器将每次检查的结果更新到检查结果缓存表中,并打上当前时间戳;C1. The system security controller updates the result of each inspection into the inspection result cache table, and stamps it with the current time stamp; C2、当检查结果缓存表存储的内容满时,由安全策略管理器根据系统安全策略删除检查结果缓存表中缓存的检查结果记录;C2. When the content stored in the inspection result cache table is full, the security policy manager deletes the inspection result records cached in the inspection result cache table according to the system security policy; C3、安全策略管理器根据系统安全管理策略,定时清除检查结果缓存表中缓存的过期检查结果记录;C3. The security policy manager periodically clears the expired check result records cached in the check result cache table according to the system security management policy; C4、当一个业务被终止时,系统安全控制器将检查结果缓存表中所有与该业务相关的检查结果全部清除。C4. When a service is terminated, the system security controller clears all check results related to the service in the check result cache table.
CNB2004101034711A 2004-12-28 2004-12-28 Token-based fine granularity access control system and method for application server Expired - Fee Related CN100490387C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004101034711A CN100490387C (en) 2004-12-28 2004-12-28 Token-based fine granularity access control system and method for application server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004101034711A CN100490387C (en) 2004-12-28 2004-12-28 Token-based fine granularity access control system and method for application server

Publications (2)

Publication Number Publication Date
CN1633084A CN1633084A (en) 2005-06-29
CN100490387C true CN100490387C (en) 2009-05-20

Family

ID=34848180

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004101034711A Expired - Fee Related CN100490387C (en) 2004-12-28 2004-12-28 Token-based fine granularity access control system and method for application server

Country Status (1)

Country Link
CN (1) CN100490387C (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5391858B2 (en) * 2009-06-17 2014-01-15 富士ゼロックス株式会社 Program and information processing apparatus
US9038168B2 (en) * 2009-11-20 2015-05-19 Microsoft Technology Licensing, Llc Controlling resource access based on resource properties
CN102387172A (en) * 2010-08-30 2012-03-21 国际商业机器公司 Method and device for providing or obtaining contents of network resources for mobile equipment
US9118686B2 (en) * 2011-09-06 2015-08-25 Microsoft Technology Licensing, Llc Per process networking capabilities
US8990561B2 (en) 2011-09-09 2015-03-24 Microsoft Technology Licensing, Llc Pervasive package identifiers
US9773102B2 (en) 2011-09-09 2017-09-26 Microsoft Technology Licensing, Llc Selective file access for applications
US9800688B2 (en) 2011-09-12 2017-10-24 Microsoft Technology Licensing, Llc Platform-enabled proximity service
US9043886B2 (en) * 2011-09-29 2015-05-26 Oracle International Corporation Relying party platform/framework for access management infrastructures
CN103095482B (en) * 2011-11-07 2015-10-21 上海宝信软件股份有限公司 Program development maintenance system
US10356204B2 (en) 2012-12-13 2019-07-16 Microsoft Technology Licensing, Llc Application based hardware identifiers
CN103078926B (en) * 2012-12-28 2016-03-30 华为技术有限公司 The file access method of distributed memory system and device and system
US9858247B2 (en) 2013-05-20 2018-01-02 Microsoft Technology Licensing, Llc Runtime resolution of content references
US10394605B2 (en) * 2014-07-25 2019-08-27 Ab Initio Technology Llc Mutable chronologies for accommodation of randomly occurring event delays
CN104320427A (en) * 2014-09-22 2015-01-28 国家电网公司 Distributed group communication method for relay protection system multi-agent
CN104573553A (en) * 2014-12-30 2015-04-29 中国航天科工集团第二研究院七O六所 Xen-oriented memory sharing security isolation method for virtual machines
CN104753953A (en) * 2015-04-13 2015-07-01 成都双奥阳科技有限公司 Access control system
CN107315948B (en) * 2016-04-26 2020-09-01 阿里巴巴集团控股有限公司 Data calling method and device
CN109408241B (en) * 2018-10-31 2021-05-11 百度在线网络技术(北京)有限公司 Load balancing method, device, equipment and storage medium
CN109639674A (en) * 2018-12-11 2019-04-16 广州猎萌网络科技有限公司 An access security control method
CN109451069B (en) * 2018-12-29 2021-01-29 江苏鼎峰信息技术有限公司 Network data file library storage and query method based on distributed storage
CN110362535B (en) * 2019-07-12 2022-05-31 中国农业银行股份有限公司 File management method, device and system
CN110489996B (en) * 2019-07-31 2021-04-13 山东三未信安信息科技有限公司 Database data security management method and system
CN110598445B (en) * 2019-09-12 2022-05-20 金蝶蝶金云计算有限公司 Database access control method, system and related equipment
CN113420312B (en) * 2021-07-08 2022-04-26 山东浪潮超高清视频产业有限公司 Method for dynamically controlling API interface access
CN117499122A (en) * 2023-11-13 2024-02-02 易保网络技术(上海)有限公司 Data access method, system, electronic device, storage medium and program product

Also Published As

Publication number Publication date
CN1633084A (en) 2005-06-29

Similar Documents

Publication Publication Date Title
CN100490387C (en) Token-based fine granularity access control system and method for application server
AU2019206006B2 (en) System and method for biometric protocol standards
US10055561B2 (en) Identity risk score generation and implementation
CN106534199B (en) Distributed system authentication and rights management platform based on XACML and SAML in big data environment
CN116708037B (en) Cloud platform access right control method and system
CN101997876B (en) Attribute-based access control model and cross domain access method thereof
Ghaffari et al. Authentication and access control based on distributed ledger technology: A survey
CN106888084B (en) Quantum fort machine system and authentication method thereof
Namasudra et al. A new table based protocol for data accessing in cloud computing.
CN111064718B (en) Dynamic authorization method and system based on user context and policy
US8095969B2 (en) Security assertion revocation
CN103220141B (en) A kind of protecting sensitive data method and system based on group key strategy
CN105978855B (en) Personal information safety protection system and method under a kind of system of real name
US20140208409A1 (en) Access to data stored in a cloud
US20080066158A1 (en) Authorization Decisions with Principal Attributes
CN112187800B (en) Attribute-based access control method with anonymous access capability
CN102571874B (en) On-line audit method and device in distributed system
CN115422526B (en) Role authority management method, device and storage medium
CN1633085A (en) An access control method based on mapping between non-hierarchical roles
CN116800541A (en) Classified and hierarchical access control and access method for flight operation data
CN106301791A (en) Method and system for realizing unified user authentication authorization based on big data platform
CN113901507B (en) Multi-party resource processing method and privacy computing system
CN118246519A (en) A system for federated learning
CN117294489A (en) Self-adaptive dynamic access control method and system based on authorization policy
CN117195177A (en) Unified user management system and method for big data platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090520

Termination date: 20121228