CN100449450C - Method and system for protecting electronic data objects from unauthorized access - Google Patents
Method and system for protecting electronic data objects from unauthorized access Download PDFInfo
- Publication number
- CN100449450C CN100449450C CNB2004100397120A CN200410039712A CN100449450C CN 100449450 C CN100449450 C CN 100449450C CN B2004100397120 A CNB2004100397120 A CN B2004100397120A CN 200410039712 A CN200410039712 A CN 200410039712A CN 100449450 C CN100449450 C CN 100449450C
- Authority
- CN
- China
- Prior art keywords
- access
- data object
- data
- identification
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012545 processing Methods 0.000 claims abstract description 42
- 230000008901 benefit Effects 0.000 abstract description 5
- 230000000717 retained effect Effects 0.000 abstract 1
- 238000013475 authorization Methods 0.000 description 31
- 230000015654 memory Effects 0.000 description 15
- 230000006870 function Effects 0.000 description 11
- 230000008859 change Effects 0.000 description 6
- 238000011160 research Methods 0.000 description 6
- 230000001419 dependent effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 238000001341 grazing-angle X-ray diffraction Methods 0.000 description 3
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000001225 therapeutic effect Effects 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
本发明涉及一种保护电子数据对象免受非授权访问的方法和数据处理系统。该方法包括步骤:a)根据电子数据对象的内容产生电子数据对象标识(56,57),b)根据数据对象标识确定访问权限(63),c)根据访问权限允许对电子数据对象的访问(65)。所述数据处理系统具有可以访问电子数据对象的数据处理装置(1)和访问控制模块(7)。通过访问控制模块(7)按照数据对象的内容产生数据对象标识,并根据数据对象标识确定访问权限。访问权限包括如“读”、“写”和“执行”等的标准权限。本发明的优点在于,用于建立数据对象标识的信息可以存储在数据对象本身,并例如在对数据对象拷贝或发送时得到保持,由此保证访问权限的不变。
The invention relates to a method and a data processing system for protecting electronic data objects from unauthorized access. The method comprises the steps of: a) generating an electronic data object identifier (56, 57) according to the content of the electronic data object, b) determining an access right according to the data object identifier (63), c) allowing access to the electronic data object according to the access right ( 65). The data processing system has a data processing device (1) capable of accessing electronic data objects and an access control module (7). The data object identification is generated according to the content of the data object through the access control module (7), and the access right is determined according to the data object identification. Access rights include standard rights such as "read", "write" and "execute". The advantage of the present invention is that the information for establishing the data object identification can be stored in the data object itself and retained, for example, when the data object is copied or transmitted, thereby ensuring that the access rights remain unchanged.
Description
技术领域 technical field
本发明涉及一种用于保护电子数据对象免受非授权访问的方法和实施该方法的数据处理系统,以及一种其上存储有用于在数据处理装置实施该方法的信息的存储介质。The invention relates to a method for protecting electronic data objects from unauthorized access, to a data processing system implementing the method, and to a storage medium on which information for implementing the method at a data processing device is stored.
背景技术 Background technique
电子数据对象的日益增长的应用要求越来越多的用于保护电子数据对象免受非授权访问的智能机制。在此,数据对象例如可以是用于存储或放置信息的单个的文件、综合成的文件系统或者文件结构。对数据对象的保护在由多人使用的并且可以从其上调用保密信息的工作场所尤其重要。除了其它之外,这种信息出现在医疗工作环境,在试验室、研究、开发等环境或者进行人口统计的工作环境。基本上,尤其是关于个人的信息需要特殊的保护措施。The increasing use of electronic data objects requires more and more intelligent mechanisms for protecting electronic data objects from unauthorized access. In this case, a data object can be, for example, an individual file, an integrated file system or a file structure for storing or storing information. The protection of data objects is especially important in workplaces that are used by multiple people and from which confidential information can be called up. Such information occurs in, among others, medical work environments, in laboratories, research, development, etc. or work environments where demographics are performed. Basically, especially personal information requires special protection measures.
公知的保护机制是基于对数据对象的加密。但是,对数据对象的加密和解密尤其是在规模大的数据对象时要花费多的时间,因此在必须是工作方式合理化和经济的工作环境内是不实用的。此外,对于加密系统的足够可靠的密码的相应操作也构成了一种引人注目的花费。尤其是对于加密系统的变动只可以直接对数据存量本身进行,而对于数据对象(例如数据载体或者移动工作站)的其它拷贝是不够的。Known protection mechanisms are based on encryption of data objects. However, the encryption and decryption of data objects takes a lot of time especially for large-scale data objects, so it is not practical in a work environment that requires a rational and economical work style. Furthermore, the corresponding operation of sufficiently reliable ciphers for the encryption system constitutes a significant outlay. In particular, changes to the encryption system can only be carried out directly on the data storage itself, and other copies of the data object (for example a data carrier or a mobile workstation) are not sufficient.
另外,基于加密的对数据对象的保护不提供对删除数据对象的保护,并且不允许有区别的分配访问权限,例如对读、写或者删除访问的区分。尤其是,在非对称加密方法中在加密时就必须已经知道全部接收者,因为必须考虑每个接收者的公钥。In addition, encryption-based protection of data objects does not provide protection against deletion of data objects and does not allow differentiated assignment of access rights, such as distinctions for read, write or delete access. In particular, in the case of asymmetric encryption methods, all recipients must already be known during the encryption, since the public key of each recipient must be taken into account.
公知的还有在操作系统层上对数据对象的保护,其中,依据在操作系统上登录的用户的权限预先给定对数据访问的范围。数据访问权限的范围通过所谓的访问控制列表(ACL)确定,该列表通过操作系统分配给文件系统中的每个数据对象。在每个数据对象的ACL中列出对各操作系统专用的依赖于用户的访问权限。Also known is the protection of data objects at the operating system level, wherein the scope of access to the data is predetermined as a function of the authorizations of the user logged on to the operating system. The scope of data access rights is determined by so-called access control lists (ACLs), which are assigned to each data object in the file system by the operating system. List user-dependent access rights specific to each operating system in the ACL of each data object.
但是,迄今为止ACL是操作系统或者文件系统的组成部分,而不是仅仅在文件系统内与数据对象拷贝时一同拷贝(即继承)的数据对象,而其在被拷贝到各文件系统外时是得不到的。这点由于ACL的针对操作系统的作用方式是不可能的。此外,在文件系统内多次拷贝时出现的对于数据对象访问权限的变更同样不能集中地进行,因为其不能自动地转移到对数据对象的拷贝。However, so far the ACL is an integral part of the operating system or the file system, rather than just a data object that is copied (ie inherited) with the data object when it is copied in the file system, and it is obtained when it is copied out of each file system. less than. This is not possible due to the way ACLs work against the operating system. Furthermore, changes to the access rights for data objects that occur during multiple copies within the file system cannot be carried out centrally, since they cannot be automatically transferred to the copy of the data objects.
此外,例如在门诊环境中的医疗系统或者在人员或财务管理系统中优选的是将特定的功能不仅限制给特定的用户,而且还与要处理的数据相关。这样可以例如在门诊环境中将对患者隐私数据的全部的访问权限仅为主治医生设立可以读取的特例,而对于所有其它患者的数据允许所有的医生访问。另外,可以将例如实验报告的数据类型区别对待,对于这种报告原则上仅实验室人员应该有处理权限,而其它的医院人员仅需要阅读的权限。在其它例如银行或者人力管理的工作环境中类似的区分同样也是有意义的。Furthermore, for example in medical systems in outpatient settings or in personnel or financial management systems it is preferred not only to restrict specific functions to specific users but also in relation to the data to be processed. In this way, for example, in an outpatient environment, full access rights to the patient's private data can only be read by the attending doctor as a special case, while all other patient data are allowed to be accessed by all doctors. In addition, data types such as laboratory reports can be treated differently. In principle, only laboratory personnel should have processing authority for such reports, while other hospital personnel only need to read authority. Similar distinctions also make sense in other work environments such as banking or human resources management.
通常,对用户根据依赖于用户和当前系统或域(domain)得到“创建”、“读取”、“更新”和“删除”权限(即对应于标准权限)的组合。称之为“执行”权限的功能性权限根据数据类型或者数据内容仅在应用程序内由应用程序本身给出。“执行”权限确定是否允许执行一种特定的功能,例如图像处理措施、对一数据组的评价、对电子患者病历的诊断等。对用户的标准权限的分配是独立于对功能性“执行”权限的数据相关的分配的。对功能性“执行”权限的数据相关的分配又是依赖于应用的,并因此可能以不希望的方式通过在不同的域的不同的应用被区别对待的。Typically, a user is given a combination of "create", "read", "update" and "delete" permissions (ie corresponding to the standard permissions) depending on the user and the current system or domain. The functional right called "execute" right is given only within the application by the application itself, depending on the type of data or the content of the data. The "execute" right determines whether execution of a specific function is permitted, eg image processing measures, evaluation of a data set, diagnosis of electronic patient records, etc. The assignment of standard rights to users is independent of the data-dependent assignment of functional "execute" rights. The data-related assignment of the functional "execute" authorization is again application-dependent and can therefore be treated differently by different applications in different domains in an undesired manner.
常规的用于访问权限控制的一个特殊问题在于对数据对象的拷贝,例如通过电子邮件发送或者可携带存储器载体传输,该拷贝出现在数量上和范围上都在不可控制的范围内。由此,使得不可能对与内容关联的或者一致的拷贝或修改的拷贝事后集中地对访问权限进行变动。常规的控制机制由此不能对所有数据对象进行,因为数据对象的数目以及出现的地点是不知道的。A particular problem with conventional methods for access control is the copying of data objects, for example by e-mail or transmission on a portable memory carrier, which takes place in an uncontrollable number and extent. As a result, it is rendered impossible to subsequently modify the access rights centrally for the content-associated or identical copy or modified copy. Conventional control mechanisms cannot thus be performed on all data objects, since the number and location of occurrence of data objects is not known.
发明内容Contents of the invention
本发明要解决的技术问题是,提供一种方法和一种数据处理系统,用于赋予为了存储信息而存放的电子数据对象的访问权限,该访问权限的赋予使得可以从中心位置出发对包括所有拷贝在内的数据对象的访问权限进行变动。The technical problem to be solved by the present invention is to provide a method and a data processing system for granting access rights to electronic data objects stored for information storage. The access rights of the data objects included in the copy are changed.
本发明是通过一种方法、一种数据处理系统以及一种存储介质解决上述技术问题的。The present invention solves the above technical problems through a method, a data processing system and a storage medium.
本发明的基本思路在于,提供一种用于保护为了存储信息而存放的电子数据对象免受非授权访问的方法,其中,在第一步骤中根据所述电子数据对象的内容产生一个电子数据对象标识,在下一个步骤中根据所述数据对象标识确定访问权限,而在最后一个步骤中根据所述访问权限允许对电子数据对象的访问。在此,数据对象被理解为文件或由一个文件或多个文件构成的对象或者一文件结构或目录结构。在此,访问权限既可以理解为标准权限又可以理解为功能性的“执行”权限。也就是通过可以自由定义的访问权限补充标准权限。The basic idea of the invention is to provide a method for protecting an electronic data object stored for information storage against unauthorized access, wherein in a first step an electronic data object is generated from the content of said electronic data object In the next step, the access authority is determined according to the data object identifier, and in the last step, access to the electronic data object is allowed according to the access authority. A data object is understood here to mean a file or an object consisting of one or more files or a file structure or directory structure. Access rights are here understood both as standard rights and as functional "execute" rights. This means that the standard rights are supplemented by freely definable access rights.
这种思路的基本要素在于,使用依赖于该数据对象内容的电子数据对象标识。由此,可以从数据对象自身出发确定访问权限。对于确定访问权限重要的数据对象的内容因为其本身也属于内容因此在拷贝时同样被复制,即得到继承,由此使得对数据对象的每个拷贝同样包含用于确定访问权限所需的信息。访问权限和据以允许访问权限的数据对象标识之间的分配,例如可以以表格的形式存放在中心位置并可以改变,使得对这种分配的变动自动地对所有数据对象的拷贝有效。由此,可以使访问权限独立于或者甚至在不知道拷贝的数量和位置的条件下随时由中心位置进行改动。在此,访问权限包括所有对于数据对象有效的标准权限和“执行”权限。An essential element of this approach is the use of an electronic data object identification that is dependent on the content of the data object. In this way, access rights can be determined starting from the data object itself. The content of the data object which is important for determining the access right is also copied, ie inherited, since it is itself part of the content, so that each copy of the data object also contains the information required for determining the access right. The assignment between access rights and data object identifiers by which access rights are granted can be stored centrally, for example in the form of a table, and can be changed, so that changes to this assignment are automatically effective for all copies of the data objects. In this way, access rights can be changed at any time from a central location independently or even without knowledge of the number and location of the copies. Access rights here include all standard rights and "execute" rights valid for the data object.
本发明的另一基本思路在于,提供一种数据处理系统,其具有一个可以访问电子数据对象的数据处理装置和一个访问控制模块,通过所述访问控制模块可以根据所述数据对象的内容产生电子数据对象标识,通过所述访问控制模块可以根据所述数据对象标识确定访问权限,以及通过所述访问控制模块可以根据所述访问权限允许对所述电子数据对象的访问。所述访问控制模块使得可以根据在数据对象中包含的信息给出对于数据对象的访问权限。因为数据对象的内容在产生拷贝时一起被复制,所以访问权限的给出由此对于该数据对象是一致的,并且对于该数据对象的所有拷贝由中心位置出发并独立于可能拷贝的存放地点而进行的。在此,访问权限理解为所有对于数据对象有效的标准权限和“执行”权限。Another basic idea of the present invention is to provide a data processing system, which has a data processing device that can access electronic data objects and an access control module, through which electronic data can be generated according to the content of the data object. A data object identifier, through which the access control module can determine an access right according to the data object identifier, and through the access control module, can allow access to the electronic data object according to the access right. The access control module makes it possible to give access rights to data objects based on information contained in the data objects. Since the content of a data object is copied together when a copy is made, the granting of access rights is thus consistent for this data object and all copies of this data object originate from a central location and are independent of the storage location of possible copies ongoing. Access rights are understood here to mean all standard rights and "execute" rights valid for data objects.
在本发明的一种优选结构中,数据对象标识是利用存储在该数据对象中的信息的自动产生的。例如,数据对象标识是利用存储的人名、生日以及内容类型(如图像或者文本)组合而成的。这允许产生其中带有关于数据对象内容的信息的数据对象标识,使得可以根据该数据对象标识对数据对象进行系统地分类和归类。如果例如应该为特定内容关联的所有数据对象(例如对于所有实验室报告、研究结果、诊断发现或计算数据)赋予同样的访问权限,则这种数据标识也可以成功地应用在为数据对象的类系统地赋予访问权限。In a preferred configuration of the invention, the data object identification is automatically generated using information stored in the data object. For example, a data object identifier is formed using a stored combination of a person's name, date of birth, and content type (such as an image or text). This allows generating a data object identification with information about the content of the data object therein, so that data objects can be systematically classified and categorized according to the data object identification. If, for example, the same access rights should be granted to all data objects associated with a particular content (e.g. for all laboratory reports, research results, diagnostic findings, or calculation data), this data identification can also be successfully applied to classes of data objects Systematically grant access rights.
在本发明的另一种优选结构中,将一种电子标识作为这种数据对象标识存储在数据对象中。这样,将该数据对象标识作为在数据对象中的拷贝产生就足够了。换言之,即仅需从数据对象中读出该标识。将数据对象标识作为对于在数据对象中包含的标识的直接拷贝来产生同样减少了被篡改的可能性,因为不能使用可以篡改的步骤来根据数据对象的内容间接地产生数据对象标识,例如从存储的人名和生日综合出数据对象标识。In a further preferred embodiment of the invention, an electronic identifier is stored in the data object as the data object identifier. It is then sufficient to generate the data object identifier as a copy in the data object. In other words, only the identifier has to be read out from the data object. Generating the data object identity as a direct copy of the identity contained in the data object also reduces the possibility of tampering, because tamperable steps cannot be used to indirectly generate the data object identity from the content of the data object, such as from the stored The person's name and date of birth are synthesized into a data object identifier.
本发明的另一种优选结构在于,将该方法在包括一访问权限模块的数据处理系统上实施,通过该模块可以存储关于用户标识和访问权限相互间的分配,其中,该数据处理系统的访问控制模块可以根据对所述访问权限模块的访问确定访问权限。在此,模块被理解为各种形式的电子服务,例如服务器、电子图书馆或在计算机上运行的过程。由此,形成了在数据处理系统内的访问权限模块的模块化设置,这种设置使得可以在灵活的位置上中心定位。由此可以从中心位置出发对赋予的访问权限进行变更。通过该所谓的中央标记存储模块的访问权限模块,定义了访问权限类别,在这些类别内为一定的用户标识分配了一定的访问权限,例如读取、写入、删除、拷贝或者功能性的权限。在此,用户标识既包括单独的也包括分组的用户标识。A further preferred configuration of the invention consists in implementing the method on a data processing system comprising an access authorization module, by means of which the assignment of user identification and access authorization to each other can be stored, wherein the access authorization of the data processing system The control module can determine the access right according to the access to the access right module. Modules are here understood to mean various forms of electronic services, such as servers, electronic libraries or processes running on computers. This results in a modular arrangement of the access authorization modules within the data processing system, which allows central positioning at flexible locations. Changes to the assigned access rights can thus be made from a central location. Via the access authorization module of this so-called central tag storage module, access authorization classes are defined within which certain user identifications are assigned certain access authorizations, such as read, write, delete, copy or functional authorizations . In this case, user identifications include both individual and group user identifications.
本发明的另一种优选结构在于,所述数据处理系统包括一个数据对象分类模块,通过该模块可以存储关于数据对象标识和访问权限分类相互间的分配,以及访问控制模块可以访问该模块,其中,通过所述访问控制模块可以根据对该数据对象分类模块的访问确定所述访问权限。也和上面一样,在此模块被理解为各种形式的电子服务,例如服务器、电子图书馆或在计算机上运行的过程。数据对象分类模块允许确定和变更数据对象标识和访问权限分类相互间的分配。通过在数据对象分类模块内的变动可以从中心位置出发将数据对象标识分配给其它的访问权限分类,并由此改变该数据访问权限。Another preferred configuration of the present invention is that the data processing system comprises a data object classification module, through which the assignment of data object identifiers and access rights classifications to each other can be stored, and the access control module can access this module, wherein , the access authority can be determined according to the access to the data object classification module through the access control module. Also as above, modules are understood here to mean various forms of electronic services, such as servers, electronic libraries or processes running on computers. The data object classification module allows to determine and change the assignment of data object identities and access rights classifications to each other. By means of changes within the data object classification module, it is possible to assign data object identifiers to other access authorization classes from a central location and thereby change the data access authorization.
本发明具有这样的优点,即以一致的方式保护所有的数据对象和其所有的拷贝。也就是说,只要用户处在该数据处理系统内,则用户对于每个数据对象和其拷贝具有等同的访问权限,并且与对该数据对象访问的地点以及该数据对象存放的位置无关。这种数据处理系统可以是具有多台具有灵活访问可能性机器的网络。通过适当的装置访问权限可以保证数据对象不脱离该安全域。The invention has the advantage that all data objects and all copies thereof are protected in a consistent manner. That is to say, as long as the user is in the data processing system, the user has the same access right to each data object and its copy, and it has nothing to do with the place where the data object is accessed or where the data object is stored. Such a data processing system can be a network with several machines with flexible access possibilities. Appropriate device access rights can ensure that data objects do not leave this security domain.
本发明还具有这样的优点,即可以独立于数据对象本身确定用户对数据对象的访问权限。尽管如此,知道数据对象标识就已经足够了。如果将数据对象标识系统地从数据对象的内容或者其它的与该数据对象有关的信息产生出,则这点可以简单地实现。这样,为了确定有关数据对象的访问权限了解系统信息(例如,在一个确定的工作流程中患者的四项数据以及当前病区)就已经足够了。由此,可以独立于其所在的位置确定对可以分配给确定系统类别的数据对象的访问权限。The invention also has the advantage that a user's access rights to a data object can be determined independently of the data object itself. Nevertheless, it is sufficient to know the data object identity. This can be easily achieved if the data object identification is systematically generated from the content of the data object or other information relating to the data object. In this way, it is sufficient to know system information (for example, the four data items of a patient and the current ward in a certain workflow) in order to determine the access rights for the relevant data objects. Access rights to data objects that can be assigned to certain system classes can thus be determined independently of their location.
本发明另一个优点在于,数据对象的传输可以在安全域内独立于数据传送协议或者操作系统进行。在传输期间仅保证数据对象的完整性就足够了,从而也可以将确定访问权限所需要的数据对象标识从数据对象的拷贝中产生出来。Another advantage of the present invention is that the transfer of data objects can take place within the secure domain independently of the data transfer protocol or the operating system. It is sufficient only to ensure the integrity of the data object during the transfer, so that the data object identification required for determining the access authorization can also be generated from the copy of the data object.
保证用于产生数据对象标识的信息也优选地使得可以将数据对象加以控制地从一个安全域传送到另一个安全域。由此可以实现自动地改变访问权限,而不必对数据对象的内容进行变动。这种不同安全域的应用特别可以应用在工作流系统中,其中将数据对象从一个部门传送到另一个部门。这样,使得可以在医疗环境中,通过将每个工作流的步骤用一个特定的安全域加以表示,而为接收患者、放射科和开处方赋予不同的访问权限。为此目的,在不同的安全域设置不同的访问权限和数据对象分类。由此,按预定的方式产生不同的依赖于域的访问权限。此外,必要时也可以设置不同的用户组,以便可以特别构成不同的组属性。Securing the information used to generate the data object identification also preferably enables a controlled transfer of the data object from one security domain to another. This makes it possible to change the access rights automatically without having to change the content of the data object. This application of different security domains is particularly applicable in workflow systems where data objects are transferred from one department to another. This makes it possible to grant different access rights for receiving patients, radiology departments, and prescribing in a medical environment by representing each workflow step with a specific security domain. For this purpose, different access rights and data object classifications are set in different security domains. As a result, different domain-dependent access rights are produced in a predetermined manner. In addition, different user groups can also be set up if necessary, so that different group properties can be formed in particular.
本发明的一个特别的优点是,可以根据在数据对象中存储的内容产生数据对象标识。由此,也可以根据内容设置访问权限。如果对数据对象进行了例如在处理与任务和存储器相应的信息时可能产生的改动,则可以在最后产生改变了的访问权限。例如,可以在数据对象加入关于个人的保密信息后自动地对一类特定的人禁止访问。A particular advantage of the present invention is that the data object identification can be generated from the content stored in the data object. Thereby, access rights can also be set according to content. If changes are made to the data objects, which may occur, for example, during the processing of information associated with tasks and memories, changed access rights can eventually be generated. For example, access to a specific class of people can be automatically prohibited after the data subject adds confidential information about the individual.
附图说明 Description of drawings
下面结合附图对实施方式作进一步说明。其中,The implementation manner will be further described below in conjunction with the accompanying drawings. in,
图1示出了用于实施本发明的数据处理系统,Figure 1 shows a data processing system for implementing the present invention,
图2示出了该数据处理系统的内逻辑层的示意结构,以及Fig. 2 shows the schematic structure of the inner logical layer of the data processing system, and
图3示出了本发明的方法步骤。Figure 3 shows the method steps of the invention.
具体实施方式 Detailed ways
在图1中示出了用于实施本发明的数据处理系统。该系统包括数据处理装置1,其具有显示器3和键盘5,通过该数据处理装置可以访问电子数据对象。可以被访问的数据对象位于应用存储器9中。对在应用存储器9中的数据对象的访问是通过访问控制模块7控制的。A data processing system for implementing the invention is shown in FIG. 1 . The system comprises a data processing device 1 with a
访问控制模块7独立于操作系统的访问控制机制(例如,依赖于用户的文件专用的ACL)工作。在一种优选的结构中,将其设计为附加的程序层(数据访问层),并且可以作为模块化的硬件部件连接到数据处理装置1的数据总线上。但是,其实现也可以在数据处理装置1内仅在软件层上进行。该访问控制模块7控制对其控制的数据对象的所有数据访问,例如删除、拷贝、产生、编辑或者功能的执行,也就是说,在安全域内所有对数据对象的数据访问。此外,自然也可以独立于访问控制模块7,即从安全域外,在数据存储器9中并通过数据处理装置1存储其它数据对象,例如应用程序或者公开的非保密数据对象。The
在启动数据处理装置1的操作系统时通常要求用户登录,其中必须识别用户并为数据访问进行验证。这种验证既包括识别用户又包括为用户对数据的访问进行授权。为了识别用户设置了一种安全询问,对于该询问例如必须通过键盘5输入用户标识和口令。在这种意义下,每种输入装置均可以作为识别装置6。在一种特别优选的实施方式中识别装置6(例如一个芯片卡)自动执行对能够唯一识别用户的、对指纹或者眼球虹膜结构的询问。尽管由访问控制模块7进行的访问控制独立于在操作系统上的用户登录,但是也可以指明该用户的识别。为此,用户可以通过键盘5或者识别装置6使用相同的识别方法。When starting the operating system of the data processing device 1 a user login is usually required, wherein the user must be identified and authenticated for data access. This authentication includes both identifying the user and authorizing the user's access to the data. In order to identify the user, a security challenge is provided for which, for example, a user ID and a password have to be entered via the keyboard 5 . In this sense, any input device can serve as
本发明的基本要素在于,可以为每个在访问控制模块7访问下存储的电子数据对象产生一个唯一的数据对象标识。该数据对象标识可以存储在该数据对象中,或者自动地从该数据对象的内容中产生。例如,其可以是DICOM数据对象中常见的DICOM-UID。该访问控制模块7既起到产生该标识的作用,该标识又被存储在数据对象中,又起到从数据对象的内容中产生(或者说成是提取)数据对象标识的作用。The essential element of the present invention is that a unique data object identifier can be generated for each electronic data object stored under access of the
数据对象标识可以系统地构成,以便可以描述访问权限的结构性关联,例如工作组、研究团队、人员层次、关于人员的内容或者对于访问权限系统学中事务领域或研究的内容上的分配。例如,对于电子患者病历,数据对象标识为包括患者姓名、性别、生日和医院标识的识别患者的四项。这种患者四项数据一般对于唯一地识别一个患者是足够的。另外,数据对象标识可以反映出病历属性,用于医疗研究、诊断发现或者在一个较长的时期或者对于特定的诊断图像类型(如X光照片或者超声波照片)的序列。这种结构信息可以在赋予访问权限中这样地加以考虑,使得各自不同的访问权限指明例如对于治疗医生、研究的导师、放射科的专业人员或者计算部门。在充分利用这种系统信息的条件下可以独立于各自的工作环境为每个电子数据对象设置一个唯一的数据对象标识。Data object identifiers can be structured systematically so that structural associations of access rights can be described, such as workgroups, research teams, personnel hierarchies, content about people or assignments to business domains or research content in the system of access rights. For example, for an electronic patient record, a data object is identified as four items identifying the patient including patient name, gender, date of birth, and hospital identification. Such four items of patient data are generally sufficient to uniquely identify a patient. Additionally, data object identification can reflect medical record attributes for medical research, diagnostic discovery, or sequence over a longer period of time or for specific diagnostic image types such as radiographs or ultrasound images. Such structured information can be taken into account when assigning access authorizations such that the respective access authorizations specify, for example, the treating physician, research supervisor, radiology specialist or computer department. Under the condition of making full use of this system information, a unique data object identifier can be set for each electronic data object independently of the respective working environment.
为了在充分利用所描述的系统性的数据对象标识的条件下进行分配,访问控制模块7需要关于进行访问的用户、其组的属性信息和关于将数据对象类型分配给特定访问权限类别的信息。这些信息分别各自存放并可以在数据处理系统内模块化地访问。In order to carry out the assignment using the described systematic data object identification, the
在本发明的一种优选的实施方式中,系统具有一个可以访问访问权限存储器13的访问权限模块11,例如一个服务器、电子图书馆或在计算机上运行的过程,以及一个可以访问用户组存储器17的用户组模块15,其同样可以例如是服务器、电子图书馆或一个在计算机上运行的过程。在访问权限存储器13中存放了用于将用户标识分配给访问权限类别的信息。访问权限类别分别描述了允许哪些用户或者用户组哪种访问权限规模。例如,可以如下定义访问权限类别:In a preferred embodiment of the invention, the system has an
-用户A没有访问权限- User A has no access
-用户B只有读取访问权限- User B only has read access
-用户组C具有所有的访问权限- Usergroup C has all access rights
-用户组D可以执行功能1和2- User group D can perform functions 1 and 2
-用户组E可以执行功能2- User group E can perform function 2
可能的访问权限例如包括产生数据对象,产生拷贝或者从数据对象继承信息,读取、变更和删除存储在数据对象中的信息,在各自访问权限类别内对访问权限的变更和特定功能的执行,只要她们在工作场所可供执行。Possible access rights include, for example, creating data objects, making copies or inheriting information from data objects, reading, changing and deleting information stored in data objects, changing access rights and performing specific functions within the respective access right category, As long as they are available in the workplace.
在用户组存储器17中存储了这样的信息,该信息使得可以根据先前确定的用于识别和验证用户的信息分配用户标识或者用户组。该用户标识或者用户组由单独的、电子用户标识表征,该用户标识使得可以在数据处理系统内唯一地进行识别。组的属性例如可以反映出对于工作组的所属性、对于如值班的上级医生的功能的属性、对于分层的如诊所主任的分级的属性、对于如放射科的专业设置的属性或者对于如人力部门或结算部门的部门属性。Information is stored in the
用户识别和组的属性允许完整地描述对于确定访问权限来说重要的工作环境结构。对用户的识别和组的分配可以在用户组存储器17中集中地改动,并由此在整个系统中对于各自用户的每个数据访问起作用,无论用户何时或何地对数据进行访问。The attributes of user identities and groups allow a complete description of the working environment structure that is important for determining access rights. Identification of users and assignments to groups can be changed centrally in the
访问控制模块7根据电子数据对象标识将电子数据对象分配到访问权限存储器13中。根据电子用户标识同样为进行访问的用户在对访问权限模块11访问的基础上配置访问权限类别。通过这两种设置可以确定,在访问特定的数据对象时允许哪个用户使用何种访问权限。The
通过在访问权限模块11内或者在用户组模块15内的变动可以从中心位置出发、独立于数据对象的所在地点,为所有从中产生特定数据对象标识的数据对象改变对访问权限的许可。这种设置的变动也自动地影响到该数据对象的每个拷贝,因为其从中产生特定数据对象标识的内容的部分在拷贝中保持不变。By means of changes in the
在另一个优选的实施方式中,该系统具有一个访问权限模块11、一个用户组模块15和一个附加的数据对象分类模块12,其同样可以例如是服务器、电子图书馆或一个在计算机上运行的过程。数据对象分类模块12可以访问数据对象分类存储器14,其中存储有用于将数据对象标识与访问权限分类对应的信息,并且可以改变该信息。In another preferred embodiment, the system has an
与上面描述内容相比本实施方式模块化的程度更强。如上所述,用户组模块15提供用于确定电子用户标识的信息,而访问权限模块11提供如何如上用于将用户标识与访问权限分类进行分配的信息。数据对象分类模块12提供对使得可以将用户标识与访问权限分类进行分配的信息的补充。通过数据对象分类模块12可以对每个数据对象预定和变更,它们属于何种访问权限分类。Compared with the above description, the degree of modularization of this embodiment is stronger. As mentioned above, the
这样,在每个访问权限分类中在该访问权限分类中分配的用户和用户组具有其中预定的访问权限。通过依次使不同的用户或者用户组可以访问数据对象,而改变在数据对象分类模块12中的分配,可以例如对应于预定工作流的运行变更对于一个数据对象的访问权限。在医疗工作环境中,这种状态可以例如是:在诊所中接收患者、入院检查、随后的借助于放射学产生图像的方法的检查、治疗和最后的诊断,其中,各自不同的用户组,例如医疗技术员、放射科人员和治疗人员,对患者数据对象进行处理。In this way, in each access right category, the users and user groups assigned in this access right category have the access rights predetermined therein. By successively making data objects accessible to different users or groups of users, changing the assignment in the data object
当要一直在数据处理系统内,即在安全域内对数据进行访问时,则首先通过访问控制模块7产生待访问的数据对象的数据对象标识。通过对用户组模块15的访问,访问控制模块7确定一个用户标识,并根据该用户标识通过对访问权限模块11的访问确定一个访问权限分类。通过访问数据对象分类模块12根据前面产生的数据对象标识,确定哪个访问权限分类属于该数据对象。由此,通过对数据对象标识和用户标识的分配确定所有信息,以便可以允许该用户对该数据对象的特定访问权限。When the data is to be accessed in the data processing system, that is, in the security domain, the data object identification of the data object to be accessed is firstly generated by the
也可以将访问控制模块7的作用方式用于从远处设置的工作站进行的数据访问。例如,移动数据处理装置21(如一个PDA或者笔记本电脑)可以通过数据远距离连接19(如一个调制解调连接或者移动无线连接)对系统的数据对象进行访问。在例如家庭工作场所或者在如诊所的移动设备的工作环境内可以是这种情况。The mode of operation of the
上面描述的数据处理系统的结构可以在不对访问控制模块7的作用方式进行变动的条件下改变其模块性。例如,可以将用户组存储器17和访问权限存储器13结合在一个共同的存储器介质上,或者可以将访问权限模块11和用户组模块15集成在一个单一的数据处理装置中。与访问控制模块7分开的设置也不是对于工作方式所必需的,而是可以集成在其中。模块化的结构使得可以特别灵活地对应于各自工作环境的所有结构上的要求特别灵活地使用系统。The structure of the data processing system described above can be modified in its modularity without changing the mode of operation of the
在图2中示意地示出了数据处理系统内部(即安全域内)的逻辑层。对其访问进行控制的电子数据对象处于在最低层31上。这些数据对象具有对于标识重要的内容33,从该内容33中可以产生数据对象标识。迄今为止必须将该对于标识重要的内容33设置在更高的层上,因为该数据对象标识必须可以独立于用户的访问权限被访问,以便能够确定这种访问权限的规模。The logical layers within the data processing system (ie within the security domain) are schematically shown in FIG. 2 . On the
在数据层之上设置了一个ACL35,该ACL在操作系统层上并在各自操作系统内独立于在操作系统上的用户登录控制对数据的访问。ACL35迄今不是数据对象层31,33的一部分,因为其在离开各自的文件系统或者在对操作系统进行变更之后不能得到保持。其不会连同数据一起得到继承,而是被丢失。因此,将ACL35在示意性的表示中表示为单独的层。An
操作系统层37设置在ACL35之上,其控制ACL35并通过ACL35控制数据对象层31,33。Arranged above the
访问控制层39位于操作系统层37之上,在其内部执行访问控制模块7的功能。除了当前现有的操作系统访问控制之外,其还控制对所有数据的访问。The
具有各自工作环境的应用程序的应用层41位于访问控制层39之上。On top of the
在附图的右边部分示例地示出了这样的逻辑层,其可以进行按照通过箭头表示的将文件传送至另一个操作系统。该另一操作系统在所选择的例子中不具有ACL。特别是将数据对象标识33一同传送,则数据对象层31,33保持不变。但是,由于缺少ACL没有通过操作系统层37的访问权限控制。The right part of the figure shows an example of a logical layer that can carry out the transfer of files to another operating system as indicated by the arrows. This other operating system has no ACLs in the chosen example. In particular, if the data object
但是,对于数据对象层31,33的访问根据其定位只可以通过访问控制层39进行。即,对在设定的范围中数据访问的控制在数据导入之后保持不变,并且独立于操作系统的变换。应用层41可以仅通过访问控制层39对数据进行访问。However, access to the data object layers 31 , 33 is only possible via the
在图3中示出了在安全域内对数据对象进行访问的方法步骤。在步骤51从用户或者应用程序一侧开始对数据对象的访问。The method steps for accessing a data object within a security domain are shown in FIG. 3 . Access to the data object starts at
在步骤53确定用于识别用户的用户标识。如上所述,根据键盘输入或者生物测定学上的数据采集对所需的信息进行采集。根据这样采集的数据通过经用户组模块15对用户组存储器17进行访问而确定用户标识。In step 53 a user identification for identifying the user is determined. As described above, the required information is collected based on keyboard input or biometric data collection. Based on the data collected in this way, the subscriber identification is determined by accessing the
在步骤55中进行检验,看待访问的数据对象能否产生一个数据对象标识。该数据对象标识要么存储在自身的数据对象中,要么包含能够自动确定标识的信息。In
如果证明不能产生数据对象标识,则在步骤56分配一个缺省数据对象标识,根据该缺省标识可以随后设置一个按照标准的访问权限范围。由此,在例如没有在系统中引入数据对象标识的条件下,可以按照标准并无须花费时间地进行其它确定访问权限范围的方法步骤,而实现对于数据对象的访问控制。If it turns out that a data object identifier cannot be generated, then in step 56 a default data object identifier is assigned, on the basis of which a standard-based access authorization range can then be set. Thus, for example, without introducing a data object identifier into the system, other method steps for determining the scope of the access rights can be carried out according to the standard without taking time, so as to realize the access control to the data object.
如果可能,在步骤57将数据对象标识作为对在数据对象中存储的标识的拷贝或者从在数据对象中存储的内容中自动地产生。If possible, the data object identity is generated at
在步骤59中对访问权限模块11进行访问,以便根据访问权限存储器15中的信息确定一个访问权限分类。在此,调用一个用户标识和访问权限分类之间的分配,这种分配可以按表格的形式或者作为图存放。In
在步骤61对数据对象分类模块12进行访问,以便从数据对象分类存储器14中获得信息,根据这些信息可以确定一个为先前确定的数据对象标识分配的访问权限类别。In
在得到所有用于用户识别、组识别和数据对象分类信息之后,在步骤63确定该用户所允许的访问权限。这种确定要么在步骤59和步骤61中调用的数据基础上进行,要么在步骤56分配的标准值的基础上进行。在此,标准值的分配可以不经对模块的进一步访问进行,以便避免不必要的访问和节省访问时间。After obtaining all the information for user identification, group identification and data object classification, at
在步骤65中根据前面确定的访问权限进行对数据的访问。In
在步骤67中结束对数据的访问。例如,用户可以从系统中注销,也可以由系统进行自动的超时停止,或者在系统中对用于确定访问权限的分类进行改变。Access to the data is ended in
为了说明本发明的程序技术的方面,下面再现了几个极其简化的对于实现本发明方法步骤的语义上的应用。简化包括例如对于变量定义和错误处理的读出。In order to illustrate the procedural aspects of the invention, several extremely simplified semantic applications of the steps for implementing the method of the invention are reproduced below. Simplifications include, for example, the reading out of variable definitions and error handling.
用户组模块允许加入、修改、删除和调用用户和组识别。此外,其包括用于识别各用户的措施。其实现可以在下列分配中找到应用:The User Groups module allows adding, modifying, deleting and recalling user and group identification. Furthermore, it includes measures for identifying the individual users. Its implementation can find application in the following allocations:
bool createUser(wchar_t*theUserName,wchar_t*thepassword,wchar_t*&heSID);bool createUser(wchar_t*theUserName, wchar_t*thepassword, wchar_t*&heSID);
bool deleteUser(wchar_t*theUserNarme);bool deleteUser(wchar_t*theUserNarme);
bool querySID(wchar_t*theUserName,wchar_t*&theSID);bool querySID(wchar_t*theUserName, wchar_t*&theSID);
bool createGroup(wchar_t*theGroupName,wchar_t*&heGID);bool createGroup(wchar_t*theGroupName, wchar_t*&heGID);
bool deleteGroup(wchar_t*theGroupName);bool deleteGroup(wchar_t*theGroupName);
bool queryGID(wchar_t*theGroupName,wchar_t*&theGID);bool queryGID(wchar_t*theGroupName, wchar_t*&theGID);
bool addUserToGroup(wchar_t*theSID,wchar_t*theGID);bool addUserToGroup(wchar_t*theSID, wchar_t*theGID);
bool removeUserFromGrouP(wchar_t*theSID,wchar_t*theGID);bool removeUserFromGrouP(wchar_t*theSID,wchar_t*theGID);
bool authenticateUser(wchar_t*theUserName,wchar_t*theUserPassword,wchar_t*theUID);bool authenticateUser(wchar_t*theUserName, wchar_t*theUserPassword, wchar_t*theUID);
bool releaseUID(wchar_t*theUID);bool releaseUID(wchar_t*theUID);
bool analyzeUID(wchar_t*thetUID,wchar_t*&theSID,wchar_t*&theGID)bool analyzeUID(wchar_t*thetUID,wchar_t*&theSID,wchar_t*&theGID)
其中,“bool”是一个可以取布尔值TRUE或者FALSE的C++关键字,该关键字位于变量定义、方法定义或者方法说明之前。“wchar_t”定义一种微软数据类型。“enum”是一个可以定义列举类型(Enumerations)的C++关键字。“struct”是一个可以定义新的组合数据类型的C++关键字。Among them, "bool" is a C++ keyword that can take the Boolean value TRUE or FALSE, and this keyword is located before the variable definition, method definition or method description. "wchar_t" defines a Microsoft data type. "enum" is a C++ keyword that can define enumerated types (Enumerations). "struct" is a C++ keyword that can define new composite data types.
SID以及GID是对于用户识别以及组识别的唯一标识,并在一个安全域内得到使用。它们起到在该安全域内代表用户和组的作用,而无须为此使用实际的标识或者名称。SID and GID are unique identifiers for user identification and group identification, and are used in a security domain. They serve to represent users and groups within the security domain without having to use actual identities or names for this purpose.
其它例如createGroup或deleteGroup的所谓指示字,是单独选择的并且可以从其自身的词义得到解释。Other so-called pointers, such as createGroup or deleteGroup, are selected individually and can be interpreted from their own meaning.
随着每个对用户的成功验证将产生一个唯一标志用户和工作环境的UID。一旦用户从系统中注销或者由于超时该工作环境从安全区域中结束,则将该UID被删除。With each successful authentication of the user will generate a UID that uniquely identifies the user and work environment. The UID is deleted once the user logs out of the system or the work environment ends from the secure area due to a timeout.
访问权限模块可以通过使用下列指令得到实现:Access rights modules can be implemented using the following directives:
Enum TokenRightsEnum TokenRights
{{
Create,//在分层组织的文件中允许创建新的子对象Create, // Allows creation of new sub-objects in hierarchically organized files
Read, //允许读取文件内容Read, //Allow to read file content
Update, //允许修改文件内容Update, //Allow modification of file content
Delete, //允许删除整个文件,即进行物理的破坏Delete, //Allows to delete the entire file, that is, physical destruction
Execute, //允许更新对该文件的当前保护Execute, //Allow updating the current protection for this file
ExecuteSpecificFunction //允许在文件的内容上执行特殊的功能ExecuteSpecificFunction //Allows special functions to be performed on the contents of the file
};};
bool createToken(wchar_t*theTokenName);bool createToken(wchar_t*theTokenName);
bool assignRight(wchar_t*theTokenName,wchar_t*theSID,TokenRightsbool assignRight(wchar_t*theTokenName, wchar_t*theSID, TokenRights
theGrantedRights);theGrantedRights);
bool assignRight(wchar_t*theTokenName,wchar_t*theGID,TokenRightsbool assignRight(wchar_t*theTokenName, wchar_t*theGID, TokenRights
theGrantedRights);theGrantedRights);
bool removeToken(wchar_t*theTokenName);bool removeToken(wchar_t*theTokenName);
TokenRights authorize(wchar_t*theTokenName,wchar_t*theSID wchar_tTokenRights authorize(wchar_t*theTokenName, wchar_t*theSID wchar_t
*theGID);*theGID);
为了能够确定用户的访问权限,访问权限模块11使用其SID和GID。可以为组识别和用户识别配置不同的访问权限,并且一个用户可以取得多个标识,从而必须对所有的SID和GID进行评估,以便可以确定各用户的访问权限范围。In order to be able to determine the access rights of a user, the
在前面的指令举例中作为“Token”表示的、将数据对象标识至类别的分配,允许加入、删除、搜索和修改单个的分配。其可以通过使用下列指令得到实现:Assignment, denoted as "Token" in the previous command example, that identifies a data object to a class, allows adding, deleting, searching and modifying individual assignments. It can be achieved by using the following commands:
struct SecurityID //用于DICOM构成文件的抽样定义struct SecurityID //Sampling definition for DICOM constituent files
{{
wchar_t *thePatientQuadruple;wchar_t *thePatientQuadruple;
wchar_t *theStudyInstanceUID; wchar_t *theStudyInstanceUID;
};};
bool setDefaultProtection(wchar_t*theTokenNames);bool setDefaultProtection(wchar_t*theTokenNames);
bool addProtection(SecurityID &theDocumentSecurityID,wchar_tbool addProtection(SecurityID & theDocumentSecurityID, wchar_t
*theTokenNames);*theTokenNames);
bool queryProtection(SecurityID &theDocumentServiceID,wchar_tbool queryProtection(SecurityID & theDocumentServiceID, wchar_t
*&theTokenNames);*&theTokenNames);
bool removeProtection(SecurityID &theDocumentServiceID,wchar_tbool removeProtection(SecurityID & theDocumentServiceID, wchar_t
*theTokenNames);*theTokenNames);
可以将一个数据对象标识分配给多个类别。没有分配给类别的数据对象标识获得标准的缺省访问权限的范围。A Data Object ID can be assigned to multiple categories. Data objects that are not assigned to a category identify scopes that get standard default access rights.
Claims (10)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10311648.6 | 2003-03-14 | ||
DE10311648 | 2003-03-14 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1530792A CN1530792A (en) | 2004-09-22 |
CN100449450C true CN100449450C (en) | 2009-01-07 |
Family
ID=32920851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100397120A Expired - Fee Related CN100449450C (en) | 2003-03-14 | 2004-03-15 | Method and system for protecting electronic data objects from unauthorized access |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN100449450C (en) |
DE (1) | DE102004004101A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100412743C (en) * | 2004-12-17 | 2008-08-20 | 摩托罗拉公司 | Method and apparatus for digital rights management |
CN101399695B (en) * | 2007-09-26 | 2011-06-01 | 阿里巴巴集团控股有限公司 | Method and device for operating shared resource |
WO2009049681A1 (en) * | 2007-10-19 | 2009-04-23 | Vascops | Automatic geometrical and mechanical analyzing method and system for tubular structures |
WO2016065553A1 (en) | 2014-10-29 | 2016-05-06 | 华为技术有限公司 | Data frame transmission method and apparatus |
CN105117582A (en) * | 2015-07-29 | 2015-12-02 | 苏州麦迪斯顿医疗科技股份有限公司 | Medical data platform information processing method |
CN107103245B (en) * | 2016-02-23 | 2022-08-02 | 中兴通讯股份有限公司 | File authority management method and device |
CN105872108B (en) * | 2016-06-15 | 2019-02-22 | 深圳市清时捷科技有限公司 | A kind of multiple data screening, transmission method and its devices for receiving terminal |
CN107944297B (en) * | 2017-12-11 | 2020-11-24 | 北京奇虎科技有限公司 | A control method and device for accessing files |
DE102018127949A1 (en) * | 2018-11-08 | 2020-05-14 | Samson Aktiengesellschaft | Control of access rights in a networked system with data processing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1232560A (en) * | 1996-09-30 | 1999-10-20 | 诺基亚电信公司 | Marking of electronic documents in order to expose unauthorized publication |
CN1313988A (en) * | 1999-04-14 | 2001-09-19 | 松下电器产业株式会社 | Data management apparatus, data management method, and record medium recording data management program |
WO2003017036A2 (en) * | 2001-08-20 | 2003-02-27 | Pardalis Software, Inc. | Informational object authoring and distribution system |
-
2004
- 2004-01-27 DE DE200410004101 patent/DE102004004101A1/en not_active Ceased
- 2004-03-15 CN CNB2004100397120A patent/CN100449450C/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1232560A (en) * | 1996-09-30 | 1999-10-20 | 诺基亚电信公司 | Marking of electronic documents in order to expose unauthorized publication |
CN1313988A (en) * | 1999-04-14 | 2001-09-19 | 松下电器产业株式会社 | Data management apparatus, data management method, and record medium recording data management program |
WO2003017036A2 (en) * | 2001-08-20 | 2003-02-27 | Pardalis Software, Inc. | Informational object authoring and distribution system |
Also Published As
Publication number | Publication date |
---|---|
DE102004004101A1 (en) | 2004-09-30 |
CN1530792A (en) | 2004-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4550056B2 (en) | Method, system, and program storage device for realizing data access control function | |
Hu et al. | Assessment of access control systems | |
Zhang et al. | A role-based delegation framework for healthcare information systems | |
Motta et al. | A contextual role-based access control authorization model for electronic patient record | |
US8185411B2 (en) | Method, system, and apparatus for patient controlled access of medical records | |
EP1732024A1 (en) | Techniques for providing role-based security with instance-level granularity | |
JP4892179B2 (en) | Zone-based security management for data items | |
Pernul | Database security | |
US7761382B2 (en) | Method and system to protect electronic data objects from unauthorized access | |
CN100449450C (en) | Method and system for protecting electronic data objects from unauthorized access | |
Le et al. | Activity-oriented access control to ubiquitous hospital information and services | |
Sohr et al. | Formal specification of role-based security policies for clinical information systems | |
Longstaff et al. | The tees confidentiality model: an authorisation model for identities and roles | |
Adamu et al. | A robust context and role-based dynamic access control for distributed healthcare information systems | |
Desai | The break-the-glass (BtG) principle in access control | |
Tall et al. | Access Control in the Era of Big-Data Driven Models and Simulations | |
Chinaei et al. | User-managed access control for health care systems | |
Salau et al. | A Robust Context and Role-Based 10 Dynamic Access Control for Distributed Healthcare Information Systems | |
Ou et al. | Designing a Flow-based Mechanism for Accessing Electronic Health Records on a Cloud Environment | |
Poliac et al. | Seismocardiogram (SCG) interpretation using neural networks | |
Sanzi et al. | Trust Profile based Trust Negotiation for the FHIR Standard. | |
Henkind et al. | Application of a multilevel access model in the development of a security infrastructure for a clinical information system | |
Tzelepi et al. | A flexible role-based access control model for multimedia medical image database systems | |
Kallepalli | A security framework for DICOM images in health information systems | |
Porter | Trust Negotiation for Open Database Access Control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090107 Termination date: 20180315 |