ACCESS CONTROL METHOD

PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that w...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: HATANAKA EIJI
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator HATANAKA EIJI
description PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&INPIT
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2007304835A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2007304835A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2007304835A3</originalsourceid><addsrcrecordid>eNrjZBB1dHZ2DQ5WcPb3Cwny91HwdQ3x8HfhYWBNS8wpTuWF0twMSm6uIc4euqkF-fGpxQWJyal5qSXxXgFGBgbmxgYmFsamjsZEKQIAzaQfRA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ACCESS CONTROL METHOD</title><source>esp@cenet</source><creator>HATANAKA EIJI</creator><creatorcontrib>HATANAKA EIJI</creatorcontrib><description>PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&amp;INPIT</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20071122&amp;DB=EPODOC&amp;CC=JP&amp;NR=2007304835A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76418</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20071122&amp;DB=EPODOC&amp;CC=JP&amp;NR=2007304835A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HATANAKA EIJI</creatorcontrib><title>ACCESS CONTROL METHOD</title><description>PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&amp;INPIT</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBB1dHZ2DQ5WcPb3Cwny91HwdQ3x8HfhYWBNS8wpTuWF0twMSm6uIc4euqkF-fGpxQWJyal5qSXxXgFGBgbmxgYmFsamjsZEKQIAzaQfRA</recordid><startdate>20071122</startdate><enddate>20071122</enddate><creator>HATANAKA EIJI</creator><scope>EVB</scope></search><sort><creationdate>20071122</creationdate><title>ACCESS CONTROL METHOD</title><author>HATANAKA EIJI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2007304835A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2007</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>HATANAKA EIJI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HATANAKA EIJI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ACCESS CONTROL METHOD</title><date>2007-11-22</date><risdate>2007</risdate><abstract>PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&amp;INPIT</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_JP2007304835A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title ACCESS CONTROL METHOD
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T05%3A54%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HATANAKA%20EIJI&rft.date=2007-11-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2007304835A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true