System and method for authorizing information flows

System and method for authorizing information flows

  • CN 101,331,494 B
  • Filed: 11/23/2006
  • Issued: 03/27/2013
  • Est. Priority Date: 12/15/2005
  • Status: Active Grant
First Claim
Patent Images

1. one kind is used for method that the information flow between the equipment of data disposal system is authorized, and described method comprises:

  • With to authorizing to the information flow of the second equipment from described the first equipment, wherein said information flow request comprises the identifier of described the second equipment from the stream request of the first equipment receiving information;

    Come the security information of the authority levels of described the first equipment of searching mark and the second equipment based on the described identifier of the identifier of described the first equipment and described the second equipment;

    The susceptibility of definite information object that will in described information flow, transmit;

    AndOnly come described information flow is authorized or refused based on the described authority levels of the described susceptibility of described information object and described the first and second equipment, and no matter the specific action to carrying out as the described information object of a described information flow part,Wherein said security information comprises the first tag set that is associated with the described identifier of described the first equipment and the second tag set that is associated with the described identifier of described the second equipment, and wherein said the first and second tag sets identify respectively the authority levels of described the first and second equipment, the susceptibility of described information object comprises the 3rd tag set that is associated with information objectWherein, only come described information flow is authorized or refused to comprise first, second, and third tag set is carried out at least one set theory operation based on the described authority levels of the described susceptibility of described information object and described the first and second equipment, and, authorize or refuse according to the result of described at least one set theory operation.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×