ACCESS CONTROL METHOD
PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that w...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | HATANAKA EIJI |
description | PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&INPIT |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2007304835A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2007304835A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2007304835A3</originalsourceid><addsrcrecordid>eNrjZBB1dHZ2DQ5WcPb3Cwny91HwdQ3x8HfhYWBNS8wpTuWF0twMSm6uIc4euqkF-fGpxQWJyal5qSXxXgFGBgbmxgYmFsamjsZEKQIAzaQfRA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ACCESS CONTROL METHOD</title><source>esp@cenet</source><creator>HATANAKA EIJI</creator><creatorcontrib>HATANAKA EIJI</creatorcontrib><description>PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&INPIT</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20071122&DB=EPODOC&CC=JP&NR=2007304835A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76418</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20071122&DB=EPODOC&CC=JP&NR=2007304835A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HATANAKA EIJI</creatorcontrib><title>ACCESS CONTROL METHOD</title><description>PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&INPIT</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBB1dHZ2DQ5WcPb3Cwny91HwdQ3x8HfhYWBNS8wpTuWF0twMSm6uIc4euqkF-fGpxQWJyal5qSXxXgFGBgbmxgYmFsamjsZEKQIAzaQfRA</recordid><startdate>20071122</startdate><enddate>20071122</enddate><creator>HATANAKA EIJI</creator><scope>EVB</scope></search><sort><creationdate>20071122</creationdate><title>ACCESS CONTROL METHOD</title><author>HATANAKA EIJI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2007304835A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2007</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>HATANAKA EIJI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HATANAKA EIJI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ACCESS CONTROL METHOD</title><date>2007-11-22</date><risdate>2007</risdate><abstract>PROBLEM TO BE SOLVED: To solve the problem that since an access control list (ACL) is normally prepared and maintained manually, changes due to the addition/deletion and promotion/affiliation change of persons is hard to achieve even by using a tool or the like in newly preparing the ACL, and that when more strict restriction is performed by adding a time period or a place as the conditions of access control, man-hours for preparation/maintenance is increased. SOLUTION: This access control method includes adding information of available time period and available place to an ACL for setting access control information, and performing radio communication with an access point with a user ID card with a radio communication function carried by a user and an access point installed in the use place of the information equipment, so that the location of the current user can be detected. When the user performs access through a network to a file, the access control of the file is performed on the basis of not only a user ID/password but also location information/time information of the user of the pertinent user ID. COPYRIGHT: (C)2008,JPO&INPIT</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_JP2007304835A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | ACCESS CONTROL METHOD |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T05%3A54%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HATANAKA%20EIJI&rft.date=2007-11-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2007304835A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |