[go: up one dir, main page]

CN100449450C - Method and system for protecting electronic data objects from unauthorized access - Google Patents

Method and system for protecting electronic data objects from unauthorized access Download PDF

Info

Publication number
CN100449450C
CN100449450C CNB2004100397120A CN200410039712A CN100449450C CN 100449450 C CN100449450 C CN 100449450C CN B2004100397120 A CNB2004100397120 A CN B2004100397120A CN 200410039712 A CN200410039712 A CN 200410039712A CN 100449450 C CN100449450 C CN 100449450C
Authority
CN
China
Prior art keywords
access
data object
data
identification
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100397120A
Other languages
Chinese (zh)
Other versions
CN1530792A (en
Inventor
德特莱夫·贝克尔
卡尔海因茨·多恩
伊凡·墨菲
格哈德·蒙妮赫
托马斯·波利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Corp
Original Assignee
Siemens Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Corp filed Critical Siemens Corp
Publication of CN1530792A publication Critical patent/CN1530792A/en
Application granted granted Critical
Publication of CN100449450C publication Critical patent/CN100449450C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及一种保护电子数据对象免受非授权访问的方法和数据处理系统。该方法包括步骤:a)根据电子数据对象的内容产生电子数据对象标识(56,57),b)根据数据对象标识确定访问权限(63),c)根据访问权限允许对电子数据对象的访问(65)。所述数据处理系统具有可以访问电子数据对象的数据处理装置(1)和访问控制模块(7)。通过访问控制模块(7)按照数据对象的内容产生数据对象标识,并根据数据对象标识确定访问权限。访问权限包括如“读”、“写”和“执行”等的标准权限。本发明的优点在于,用于建立数据对象标识的信息可以存储在数据对象本身,并例如在对数据对象拷贝或发送时得到保持,由此保证访问权限的不变。

Figure 200410039712

The invention relates to a method and a data processing system for protecting electronic data objects from unauthorized access. The method comprises the steps of: a) generating an electronic data object identifier (56, 57) according to the content of the electronic data object, b) determining an access right according to the data object identifier (63), c) allowing access to the electronic data object according to the access right ( 65). The data processing system has a data processing device (1) capable of accessing electronic data objects and an access control module (7). The data object identification is generated according to the content of the data object through the access control module (7), and the access right is determined according to the data object identification. Access rights include standard rights such as "read", "write" and "execute". The advantage of the present invention is that the information for establishing the data object identification can be stored in the data object itself and retained, for example, when the data object is copied or transmitted, thereby ensuring that the access rights remain unchanged.

Figure 200410039712

Description

用于保护电子数据对象免受非授权访问的方法和系统 Method and system for protecting electronic data objects from unauthorized access

技术领域 technical field

本发明涉及一种用于保护电子数据对象免受非授权访问的方法和实施该方法的数据处理系统,以及一种其上存储有用于在数据处理装置实施该方法的信息的存储介质。The invention relates to a method for protecting electronic data objects from unauthorized access, to a data processing system implementing the method, and to a storage medium on which information for implementing the method at a data processing device is stored.

背景技术 Background technique

电子数据对象的日益增长的应用要求越来越多的用于保护电子数据对象免受非授权访问的智能机制。在此,数据对象例如可以是用于存储或放置信息的单个的文件、综合成的文件系统或者文件结构。对数据对象的保护在由多人使用的并且可以从其上调用保密信息的工作场所尤其重要。除了其它之外,这种信息出现在医疗工作环境,在试验室、研究、开发等环境或者进行人口统计的工作环境。基本上,尤其是关于个人的信息需要特殊的保护措施。The increasing use of electronic data objects requires more and more intelligent mechanisms for protecting electronic data objects from unauthorized access. In this case, a data object can be, for example, an individual file, an integrated file system or a file structure for storing or storing information. The protection of data objects is especially important in workplaces that are used by multiple people and from which confidential information can be called up. Such information occurs in, among others, medical work environments, in laboratories, research, development, etc. or work environments where demographics are performed. Basically, especially personal information requires special protection measures.

公知的保护机制是基于对数据对象的加密。但是,对数据对象的加密和解密尤其是在规模大的数据对象时要花费多的时间,因此在必须是工作方式合理化和经济的工作环境内是不实用的。此外,对于加密系统的足够可靠的密码的相应操作也构成了一种引人注目的花费。尤其是对于加密系统的变动只可以直接对数据存量本身进行,而对于数据对象(例如数据载体或者移动工作站)的其它拷贝是不够的。Known protection mechanisms are based on encryption of data objects. However, the encryption and decryption of data objects takes a lot of time especially for large-scale data objects, so it is not practical in a work environment that requires a rational and economical work style. Furthermore, the corresponding operation of sufficiently reliable ciphers for the encryption system constitutes a significant outlay. In particular, changes to the encryption system can only be carried out directly on the data storage itself, and other copies of the data object (for example a data carrier or a mobile workstation) are not sufficient.

另外,基于加密的对数据对象的保护不提供对删除数据对象的保护,并且不允许有区别的分配访问权限,例如对读、写或者删除访问的区分。尤其是,在非对称加密方法中在加密时就必须已经知道全部接收者,因为必须考虑每个接收者的公钥。In addition, encryption-based protection of data objects does not provide protection against deletion of data objects and does not allow differentiated assignment of access rights, such as distinctions for read, write or delete access. In particular, in the case of asymmetric encryption methods, all recipients must already be known during the encryption, since the public key of each recipient must be taken into account.

公知的还有在操作系统层上对数据对象的保护,其中,依据在操作系统上登录的用户的权限预先给定对数据访问的范围。数据访问权限的范围通过所谓的访问控制列表(ACL)确定,该列表通过操作系统分配给文件系统中的每个数据对象。在每个数据对象的ACL中列出对各操作系统专用的依赖于用户的访问权限。Also known is the protection of data objects at the operating system level, wherein the scope of access to the data is predetermined as a function of the authorizations of the user logged on to the operating system. The scope of data access rights is determined by so-called access control lists (ACLs), which are assigned to each data object in the file system by the operating system. List user-dependent access rights specific to each operating system in the ACL of each data object.

但是,迄今为止ACL是操作系统或者文件系统的组成部分,而不是仅仅在文件系统内与数据对象拷贝时一同拷贝(即继承)的数据对象,而其在被拷贝到各文件系统外时是得不到的。这点由于ACL的针对操作系统的作用方式是不可能的。此外,在文件系统内多次拷贝时出现的对于数据对象访问权限的变更同样不能集中地进行,因为其不能自动地转移到对数据对象的拷贝。However, so far the ACL is an integral part of the operating system or the file system, rather than just a data object that is copied (ie inherited) with the data object when it is copied in the file system, and it is obtained when it is copied out of each file system. less than. This is not possible due to the way ACLs work against the operating system. Furthermore, changes to the access rights for data objects that occur during multiple copies within the file system cannot be carried out centrally, since they cannot be automatically transferred to the copy of the data objects.

此外,例如在门诊环境中的医疗系统或者在人员或财务管理系统中优选的是将特定的功能不仅限制给特定的用户,而且还与要处理的数据相关。这样可以例如在门诊环境中将对患者隐私数据的全部的访问权限仅为主治医生设立可以读取的特例,而对于所有其它患者的数据允许所有的医生访问。另外,可以将例如实验报告的数据类型区别对待,对于这种报告原则上仅实验室人员应该有处理权限,而其它的医院人员仅需要阅读的权限。在其它例如银行或者人力管理的工作环境中类似的区分同样也是有意义的。Furthermore, for example in medical systems in outpatient settings or in personnel or financial management systems it is preferred not only to restrict specific functions to specific users but also in relation to the data to be processed. In this way, for example, in an outpatient environment, full access rights to the patient's private data can only be read by the attending doctor as a special case, while all other patient data are allowed to be accessed by all doctors. In addition, data types such as laboratory reports can be treated differently. In principle, only laboratory personnel should have processing authority for such reports, while other hospital personnel only need to read authority. Similar distinctions also make sense in other work environments such as banking or human resources management.

通常,对用户根据依赖于用户和当前系统或域(domain)得到“创建”、“读取”、“更新”和“删除”权限(即对应于标准权限)的组合。称之为“执行”权限的功能性权限根据数据类型或者数据内容仅在应用程序内由应用程序本身给出。“执行”权限确定是否允许执行一种特定的功能,例如图像处理措施、对一数据组的评价、对电子患者病历的诊断等。对用户的标准权限的分配是独立于对功能性“执行”权限的数据相关的分配的。对功能性“执行”权限的数据相关的分配又是依赖于应用的,并因此可能以不希望的方式通过在不同的域的不同的应用被区别对待的。Typically, a user is given a combination of "create", "read", "update" and "delete" permissions (ie corresponding to the standard permissions) depending on the user and the current system or domain. The functional right called "execute" right is given only within the application by the application itself, depending on the type of data or the content of the data. The "execute" right determines whether execution of a specific function is permitted, eg image processing measures, evaluation of a data set, diagnosis of electronic patient records, etc. The assignment of standard rights to users is independent of the data-dependent assignment of functional "execute" rights. The data-related assignment of the functional "execute" authorization is again application-dependent and can therefore be treated differently by different applications in different domains in an undesired manner.

常规的用于访问权限控制的一个特殊问题在于对数据对象的拷贝,例如通过电子邮件发送或者可携带存储器载体传输,该拷贝出现在数量上和范围上都在不可控制的范围内。由此,使得不可能对与内容关联的或者一致的拷贝或修改的拷贝事后集中地对访问权限进行变动。常规的控制机制由此不能对所有数据对象进行,因为数据对象的数目以及出现的地点是不知道的。A particular problem with conventional methods for access control is the copying of data objects, for example by e-mail or transmission on a portable memory carrier, which takes place in an uncontrollable number and extent. As a result, it is rendered impossible to subsequently modify the access rights centrally for the content-associated or identical copy or modified copy. Conventional control mechanisms cannot thus be performed on all data objects, since the number and location of occurrence of data objects is not known.

发明内容Contents of the invention

本发明要解决的技术问题是,提供一种方法和一种数据处理系统,用于赋予为了存储信息而存放的电子数据对象的访问权限,该访问权限的赋予使得可以从中心位置出发对包括所有拷贝在内的数据对象的访问权限进行变动。The technical problem to be solved by the present invention is to provide a method and a data processing system for granting access rights to electronic data objects stored for information storage. The access rights of the data objects included in the copy are changed.

本发明是通过一种方法、一种数据处理系统以及一种存储介质解决上述技术问题的。The present invention solves the above technical problems through a method, a data processing system and a storage medium.

本发明的基本思路在于,提供一种用于保护为了存储信息而存放的电子数据对象免受非授权访问的方法,其中,在第一步骤中根据所述电子数据对象的内容产生一个电子数据对象标识,在下一个步骤中根据所述数据对象标识确定访问权限,而在最后一个步骤中根据所述访问权限允许对电子数据对象的访问。在此,数据对象被理解为文件或由一个文件或多个文件构成的对象或者一文件结构或目录结构。在此,访问权限既可以理解为标准权限又可以理解为功能性的“执行”权限。也就是通过可以自由定义的访问权限补充标准权限。The basic idea of the invention is to provide a method for protecting an electronic data object stored for information storage against unauthorized access, wherein in a first step an electronic data object is generated from the content of said electronic data object In the next step, the access authority is determined according to the data object identifier, and in the last step, access to the electronic data object is allowed according to the access authority. A data object is understood here to mean a file or an object consisting of one or more files or a file structure or directory structure. Access rights are here understood both as standard rights and as functional "execute" rights. This means that the standard rights are supplemented by freely definable access rights.

这种思路的基本要素在于,使用依赖于该数据对象内容的电子数据对象标识。由此,可以从数据对象自身出发确定访问权限。对于确定访问权限重要的数据对象的内容因为其本身也属于内容因此在拷贝时同样被复制,即得到继承,由此使得对数据对象的每个拷贝同样包含用于确定访问权限所需的信息。访问权限和据以允许访问权限的数据对象标识之间的分配,例如可以以表格的形式存放在中心位置并可以改变,使得对这种分配的变动自动地对所有数据对象的拷贝有效。由此,可以使访问权限独立于或者甚至在不知道拷贝的数量和位置的条件下随时由中心位置进行改动。在此,访问权限包括所有对于数据对象有效的标准权限和“执行”权限。An essential element of this approach is the use of an electronic data object identification that is dependent on the content of the data object. In this way, access rights can be determined starting from the data object itself. The content of the data object which is important for determining the access right is also copied, ie inherited, since it is itself part of the content, so that each copy of the data object also contains the information required for determining the access right. The assignment between access rights and data object identifiers by which access rights are granted can be stored centrally, for example in the form of a table, and can be changed, so that changes to this assignment are automatically effective for all copies of the data objects. In this way, access rights can be changed at any time from a central location independently or even without knowledge of the number and location of the copies. Access rights here include all standard rights and "execute" rights valid for the data object.

本发明的另一基本思路在于,提供一种数据处理系统,其具有一个可以访问电子数据对象的数据处理装置和一个访问控制模块,通过所述访问控制模块可以根据所述数据对象的内容产生电子数据对象标识,通过所述访问控制模块可以根据所述数据对象标识确定访问权限,以及通过所述访问控制模块可以根据所述访问权限允许对所述电子数据对象的访问。所述访问控制模块使得可以根据在数据对象中包含的信息给出对于数据对象的访问权限。因为数据对象的内容在产生拷贝时一起被复制,所以访问权限的给出由此对于该数据对象是一致的,并且对于该数据对象的所有拷贝由中心位置出发并独立于可能拷贝的存放地点而进行的。在此,访问权限理解为所有对于数据对象有效的标准权限和“执行”权限。Another basic idea of the present invention is to provide a data processing system, which has a data processing device that can access electronic data objects and an access control module, through which electronic data can be generated according to the content of the data object. A data object identifier, through which the access control module can determine an access right according to the data object identifier, and through the access control module, can allow access to the electronic data object according to the access right. The access control module makes it possible to give access rights to data objects based on information contained in the data objects. Since the content of a data object is copied together when a copy is made, the granting of access rights is thus consistent for this data object and all copies of this data object originate from a central location and are independent of the storage location of possible copies ongoing. Access rights are understood here to mean all standard rights and "execute" rights valid for data objects.

在本发明的一种优选结构中,数据对象标识是利用存储在该数据对象中的信息的自动产生的。例如,数据对象标识是利用存储的人名、生日以及内容类型(如图像或者文本)组合而成的。这允许产生其中带有关于数据对象内容的信息的数据对象标识,使得可以根据该数据对象标识对数据对象进行系统地分类和归类。如果例如应该为特定内容关联的所有数据对象(例如对于所有实验室报告、研究结果、诊断发现或计算数据)赋予同样的访问权限,则这种数据标识也可以成功地应用在为数据对象的类系统地赋予访问权限。In a preferred configuration of the invention, the data object identification is automatically generated using information stored in the data object. For example, a data object identifier is formed using a stored combination of a person's name, date of birth, and content type (such as an image or text). This allows generating a data object identification with information about the content of the data object therein, so that data objects can be systematically classified and categorized according to the data object identification. If, for example, the same access rights should be granted to all data objects associated with a particular content (e.g. for all laboratory reports, research results, diagnostic findings, or calculation data), this data identification can also be successfully applied to classes of data objects Systematically grant access rights.

在本发明的另一种优选结构中,将一种电子标识作为这种数据对象标识存储在数据对象中。这样,将该数据对象标识作为在数据对象中的拷贝产生就足够了。换言之,即仅需从数据对象中读出该标识。将数据对象标识作为对于在数据对象中包含的标识的直接拷贝来产生同样减少了被篡改的可能性,因为不能使用可以篡改的步骤来根据数据对象的内容间接地产生数据对象标识,例如从存储的人名和生日综合出数据对象标识。In a further preferred embodiment of the invention, an electronic identifier is stored in the data object as the data object identifier. It is then sufficient to generate the data object identifier as a copy in the data object. In other words, only the identifier has to be read out from the data object. Generating the data object identity as a direct copy of the identity contained in the data object also reduces the possibility of tampering, because tamperable steps cannot be used to indirectly generate the data object identity from the content of the data object, such as from the stored The person's name and date of birth are synthesized into a data object identifier.

本发明的另一种优选结构在于,将该方法在包括一访问权限模块的数据处理系统上实施,通过该模块可以存储关于用户标识和访问权限相互间的分配,其中,该数据处理系统的访问控制模块可以根据对所述访问权限模块的访问确定访问权限。在此,模块被理解为各种形式的电子服务,例如服务器、电子图书馆或在计算机上运行的过程。由此,形成了在数据处理系统内的访问权限模块的模块化设置,这种设置使得可以在灵活的位置上中心定位。由此可以从中心位置出发对赋予的访问权限进行变更。通过该所谓的中央标记存储模块的访问权限模块,定义了访问权限类别,在这些类别内为一定的用户标识分配了一定的访问权限,例如读取、写入、删除、拷贝或者功能性的权限。在此,用户标识既包括单独的也包括分组的用户标识。A further preferred configuration of the invention consists in implementing the method on a data processing system comprising an access authorization module, by means of which the assignment of user identification and access authorization to each other can be stored, wherein the access authorization of the data processing system The control module can determine the access right according to the access to the access right module. Modules are here understood to mean various forms of electronic services, such as servers, electronic libraries or processes running on computers. This results in a modular arrangement of the access authorization modules within the data processing system, which allows central positioning at flexible locations. Changes to the assigned access rights can thus be made from a central location. Via the access authorization module of this so-called central tag storage module, access authorization classes are defined within which certain user identifications are assigned certain access authorizations, such as read, write, delete, copy or functional authorizations . In this case, user identifications include both individual and group user identifications.

本发明的另一种优选结构在于,所述数据处理系统包括一个数据对象分类模块,通过该模块可以存储关于数据对象标识和访问权限分类相互间的分配,以及访问控制模块可以访问该模块,其中,通过所述访问控制模块可以根据对该数据对象分类模块的访问确定所述访问权限。也和上面一样,在此模块被理解为各种形式的电子服务,例如服务器、电子图书馆或在计算机上运行的过程。数据对象分类模块允许确定和变更数据对象标识和访问权限分类相互间的分配。通过在数据对象分类模块内的变动可以从中心位置出发将数据对象标识分配给其它的访问权限分类,并由此改变该数据访问权限。Another preferred configuration of the present invention is that the data processing system comprises a data object classification module, through which the assignment of data object identifiers and access rights classifications to each other can be stored, and the access control module can access this module, wherein , the access authority can be determined according to the access to the data object classification module through the access control module. Also as above, modules are understood here to mean various forms of electronic services, such as servers, electronic libraries or processes running on computers. The data object classification module allows to determine and change the assignment of data object identities and access rights classifications to each other. By means of changes within the data object classification module, it is possible to assign data object identifiers to other access authorization classes from a central location and thereby change the data access authorization.

本发明具有这样的优点,即以一致的方式保护所有的数据对象和其所有的拷贝。也就是说,只要用户处在该数据处理系统内,则用户对于每个数据对象和其拷贝具有等同的访问权限,并且与对该数据对象访问的地点以及该数据对象存放的位置无关。这种数据处理系统可以是具有多台具有灵活访问可能性机器的网络。通过适当的装置访问权限可以保证数据对象不脱离该安全域。The invention has the advantage that all data objects and all copies thereof are protected in a consistent manner. That is to say, as long as the user is in the data processing system, the user has the same access right to each data object and its copy, and it has nothing to do with the place where the data object is accessed or where the data object is stored. Such a data processing system can be a network with several machines with flexible access possibilities. Appropriate device access rights can ensure that data objects do not leave this security domain.

本发明还具有这样的优点,即可以独立于数据对象本身确定用户对数据对象的访问权限。尽管如此,知道数据对象标识就已经足够了。如果将数据对象标识系统地从数据对象的内容或者其它的与该数据对象有关的信息产生出,则这点可以简单地实现。这样,为了确定有关数据对象的访问权限了解系统信息(例如,在一个确定的工作流程中患者的四项数据以及当前病区)就已经足够了。由此,可以独立于其所在的位置确定对可以分配给确定系统类别的数据对象的访问权限。The invention also has the advantage that a user's access rights to a data object can be determined independently of the data object itself. Nevertheless, it is sufficient to know the data object identity. This can be easily achieved if the data object identification is systematically generated from the content of the data object or other information relating to the data object. In this way, it is sufficient to know system information (for example, the four data items of a patient and the current ward in a certain workflow) in order to determine the access rights for the relevant data objects. Access rights to data objects that can be assigned to certain system classes can thus be determined independently of their location.

本发明另一个优点在于,数据对象的传输可以在安全域内独立于数据传送协议或者操作系统进行。在传输期间仅保证数据对象的完整性就足够了,从而也可以将确定访问权限所需要的数据对象标识从数据对象的拷贝中产生出来。Another advantage of the present invention is that the transfer of data objects can take place within the secure domain independently of the data transfer protocol or the operating system. It is sufficient only to ensure the integrity of the data object during the transfer, so that the data object identification required for determining the access authorization can also be generated from the copy of the data object.

保证用于产生数据对象标识的信息也优选地使得可以将数据对象加以控制地从一个安全域传送到另一个安全域。由此可以实现自动地改变访问权限,而不必对数据对象的内容进行变动。这种不同安全域的应用特别可以应用在工作流系统中,其中将数据对象从一个部门传送到另一个部门。这样,使得可以在医疗环境中,通过将每个工作流的步骤用一个特定的安全域加以表示,而为接收患者、放射科和开处方赋予不同的访问权限。为此目的,在不同的安全域设置不同的访问权限和数据对象分类。由此,按预定的方式产生不同的依赖于域的访问权限。此外,必要时也可以设置不同的用户组,以便可以特别构成不同的组属性。Securing the information used to generate the data object identification also preferably enables a controlled transfer of the data object from one security domain to another. This makes it possible to change the access rights automatically without having to change the content of the data object. This application of different security domains is particularly applicable in workflow systems where data objects are transferred from one department to another. This makes it possible to grant different access rights for receiving patients, radiology departments, and prescribing in a medical environment by representing each workflow step with a specific security domain. For this purpose, different access rights and data object classifications are set in different security domains. As a result, different domain-dependent access rights are produced in a predetermined manner. In addition, different user groups can also be set up if necessary, so that different group properties can be formed in particular.

本发明的一个特别的优点是,可以根据在数据对象中存储的内容产生数据对象标识。由此,也可以根据内容设置访问权限。如果对数据对象进行了例如在处理与任务和存储器相应的信息时可能产生的改动,则可以在最后产生改变了的访问权限。例如,可以在数据对象加入关于个人的保密信息后自动地对一类特定的人禁止访问。A particular advantage of the present invention is that the data object identification can be generated from the content stored in the data object. Thereby, access rights can also be set according to content. If changes are made to the data objects, which may occur, for example, during the processing of information associated with tasks and memories, changed access rights can eventually be generated. For example, access to a specific class of people can be automatically prohibited after the data subject adds confidential information about the individual.

附图说明 Description of drawings

下面结合附图对实施方式作进一步说明。其中,The implementation manner will be further described below in conjunction with the accompanying drawings. in,

图1示出了用于实施本发明的数据处理系统,Figure 1 shows a data processing system for implementing the present invention,

图2示出了该数据处理系统的内逻辑层的示意结构,以及Fig. 2 shows the schematic structure of the inner logical layer of the data processing system, and

图3示出了本发明的方法步骤。Figure 3 shows the method steps of the invention.

具体实施方式 Detailed ways

在图1中示出了用于实施本发明的数据处理系统。该系统包括数据处理装置1,其具有显示器3和键盘5,通过该数据处理装置可以访问电子数据对象。可以被访问的数据对象位于应用存储器9中。对在应用存储器9中的数据对象的访问是通过访问控制模块7控制的。A data processing system for implementing the invention is shown in FIG. 1 . The system comprises a data processing device 1 with a display 3 and a keyboard 5 via which electronic data objects can be accessed. The data objects that can be accessed are located in the application memory 9 . Access to data objects in the application memory 9 is controlled by the access control module 7 .

访问控制模块7独立于操作系统的访问控制机制(例如,依赖于用户的文件专用的ACL)工作。在一种优选的结构中,将其设计为附加的程序层(数据访问层),并且可以作为模块化的硬件部件连接到数据处理装置1的数据总线上。但是,其实现也可以在数据处理装置1内仅在软件层上进行。该访问控制模块7控制对其控制的数据对象的所有数据访问,例如删除、拷贝、产生、编辑或者功能的执行,也就是说,在安全域内所有对数据对象的数据访问。此外,自然也可以独立于访问控制模块7,即从安全域外,在数据存储器9中并通过数据处理装置1存储其它数据对象,例如应用程序或者公开的非保密数据对象。The access control module 7 works independently of the operating system's access control mechanisms (eg, relying on user-specific file-specific ACLs). In a preferred configuration, it is designed as an additional program layer (data access layer) and can be connected to the data bus of the data processing device 1 as a modular hardware component. However, its implementation can also take place within the data processing device 1 only on a software level. The access control module 7 controls all data accesses to the data objects it controls, such as deletion, copying, creation, editing or execution of functions, that is to say all data accesses to data objects within the security domain. Furthermore, it is naturally also possible to store other data objects independently of the access control module 7 , ie from outside the security domain, in the data memory 9 and via the data processing device 1 , for example applications or public non-confidential data objects.

在启动数据处理装置1的操作系统时通常要求用户登录,其中必须识别用户并为数据访问进行验证。这种验证既包括识别用户又包括为用户对数据的访问进行授权。为了识别用户设置了一种安全询问,对于该询问例如必须通过键盘5输入用户标识和口令。在这种意义下,每种输入装置均可以作为识别装置6。在一种特别优选的实施方式中识别装置6(例如一个芯片卡)自动执行对能够唯一识别用户的、对指纹或者眼球虹膜结构的询问。尽管由访问控制模块7进行的访问控制独立于在操作系统上的用户登录,但是也可以指明该用户的识别。为此,用户可以通过键盘5或者识别装置6使用相同的识别方法。When starting the operating system of the data processing device 1 a user login is usually required, wherein the user must be identified and authenticated for data access. This authentication includes both identifying the user and authorizing the user's access to the data. In order to identify the user, a security challenge is provided for which, for example, a user ID and a password have to be entered via the keyboard 5 . In this sense, any input device can serve as identification device 6 . In a particularly preferred embodiment, the identification device 6 (for example a chip card) automatically performs an interrogation of the fingerprint or the structure of the iris of the eye, which uniquely identifies the user. Although the access control by the access control module 7 is independent of the user's login on the operating system, the identity of the user can also be indicated. For this purpose, the user can use the same identification method via the keyboard 5 or the identification device 6 .

本发明的基本要素在于,可以为每个在访问控制模块7访问下存储的电子数据对象产生一个唯一的数据对象标识。该数据对象标识可以存储在该数据对象中,或者自动地从该数据对象的内容中产生。例如,其可以是DICOM数据对象中常见的DICOM-UID。该访问控制模块7既起到产生该标识的作用,该标识又被存储在数据对象中,又起到从数据对象的内容中产生(或者说成是提取)数据对象标识的作用。The essential element of the present invention is that a unique data object identifier can be generated for each electronic data object stored under access of the access control module 7 . The data object identification may be stored in the data object, or automatically generated from the content of the data object. For example, it may be a DICOM-UID commonly found in DICOM data objects. The access control module 7 not only generates the identifier, which is stored in the data object, but also generates (or extracts) the data object identifier from the content of the data object.

数据对象标识可以系统地构成,以便可以描述访问权限的结构性关联,例如工作组、研究团队、人员层次、关于人员的内容或者对于访问权限系统学中事务领域或研究的内容上的分配。例如,对于电子患者病历,数据对象标识为包括患者姓名、性别、生日和医院标识的识别患者的四项。这种患者四项数据一般对于唯一地识别一个患者是足够的。另外,数据对象标识可以反映出病历属性,用于医疗研究、诊断发现或者在一个较长的时期或者对于特定的诊断图像类型(如X光照片或者超声波照片)的序列。这种结构信息可以在赋予访问权限中这样地加以考虑,使得各自不同的访问权限指明例如对于治疗医生、研究的导师、放射科的专业人员或者计算部门。在充分利用这种系统信息的条件下可以独立于各自的工作环境为每个电子数据对象设置一个唯一的数据对象标识。Data object identifiers can be structured systematically so that structural associations of access rights can be described, such as workgroups, research teams, personnel hierarchies, content about people or assignments to business domains or research content in the system of access rights. For example, for an electronic patient record, a data object is identified as four items identifying the patient including patient name, gender, date of birth, and hospital identification. Such four items of patient data are generally sufficient to uniquely identify a patient. Additionally, data object identification can reflect medical record attributes for medical research, diagnostic discovery, or sequence over a longer period of time or for specific diagnostic image types such as radiographs or ultrasound images. Such structured information can be taken into account when assigning access authorizations such that the respective access authorizations specify, for example, the treating physician, research supervisor, radiology specialist or computer department. Under the condition of making full use of this system information, a unique data object identifier can be set for each electronic data object independently of the respective working environment.

为了在充分利用所描述的系统性的数据对象标识的条件下进行分配,访问控制模块7需要关于进行访问的用户、其组的属性信息和关于将数据对象类型分配给特定访问权限类别的信息。这些信息分别各自存放并可以在数据处理系统内模块化地访问。In order to carry out the assignment using the described systematic data object identification, the access control module 7 requires attribute information about the accessing user, his group and information about the assignment of the data object type to a specific access authorization category. This information is stored separately and can be accessed modularly within the data processing system.

在本发明的一种优选的实施方式中,系统具有一个可以访问访问权限存储器13的访问权限模块11,例如一个服务器、电子图书馆或在计算机上运行的过程,以及一个可以访问用户组存储器17的用户组模块15,其同样可以例如是服务器、电子图书馆或一个在计算机上运行的过程。在访问权限存储器13中存放了用于将用户标识分配给访问权限类别的信息。访问权限类别分别描述了允许哪些用户或者用户组哪种访问权限规模。例如,可以如下定义访问权限类别:In a preferred embodiment of the invention, the system has an access authorization module 11 which can access an access authorization memory 13, for example a server, an electronic library or a process running on a computer, and an access authorization memory 17 The user group module 15 can also be, for example, a server, an electronic library or a process running on a computer. Information for assigning user identifications to access authorization categories is stored in the access authorization memory 13 . The access rights category describes which users or user groups are allowed with which access rights. For example, an access category can be defined as follows:

-用户A没有访问权限- User A has no access

-用户B只有读取访问权限- User B only has read access

-用户组C具有所有的访问权限- Usergroup C has all access rights

-用户组D可以执行功能1和2- User group D can perform functions 1 and 2

-用户组E可以执行功能2- User group E can perform function 2

可能的访问权限例如包括产生数据对象,产生拷贝或者从数据对象继承信息,读取、变更和删除存储在数据对象中的信息,在各自访问权限类别内对访问权限的变更和特定功能的执行,只要她们在工作场所可供执行。Possible access rights include, for example, creating data objects, making copies or inheriting information from data objects, reading, changing and deleting information stored in data objects, changing access rights and performing specific functions within the respective access right category, As long as they are available in the workplace.

在用户组存储器17中存储了这样的信息,该信息使得可以根据先前确定的用于识别和验证用户的信息分配用户标识或者用户组。该用户标识或者用户组由单独的、电子用户标识表征,该用户标识使得可以在数据处理系统内唯一地进行识别。组的属性例如可以反映出对于工作组的所属性、对于如值班的上级医生的功能的属性、对于分层的如诊所主任的分级的属性、对于如放射科的专业设置的属性或者对于如人力部门或结算部门的部门属性。Information is stored in the user group memory 17 which makes it possible to assign user identifications or user groups on the basis of previously determined information for identifying and authenticating users. The user identity or group of users is characterized by a single, electronic user identity that enables unique identification within the data processing system. The attributes of a group can reflect, for example, attributes for a working group, attributes for a function such as a senior doctor on duty, attributes for a hierarchy such as a clinic director's classification, attributes for a professional setting such as a radiology department, or attributes for a function such as a manpower Department attribute for department or billing department.

用户识别和组的属性允许完整地描述对于确定访问权限来说重要的工作环境结构。对用户的识别和组的分配可以在用户组存储器17中集中地改动,并由此在整个系统中对于各自用户的每个数据访问起作用,无论用户何时或何地对数据进行访问。The attributes of user identities and groups allow a complete description of the working environment structure that is important for determining access rights. Identification of users and assignments to groups can be changed centrally in the user group memory 17 and thus take effect throughout the system for each data access of the respective user, regardless of when or where the user accesses the data.

访问控制模块7根据电子数据对象标识将电子数据对象分配到访问权限存储器13中。根据电子用户标识同样为进行访问的用户在对访问权限模块11访问的基础上配置访问权限类别。通过这两种设置可以确定,在访问特定的数据对象时允许哪个用户使用何种访问权限。The access control module 7 allocates the electronic data objects to the access right storage 13 according to the electronic data object identifiers. According to the electronic user identification, the access authority category is also configured for the accessing user on the basis of access to the access authority module 11 . These two settings define which user is permitted to use which access rights when accessing certain data objects.

通过在访问权限模块11内或者在用户组模块15内的变动可以从中心位置出发、独立于数据对象的所在地点,为所有从中产生特定数据对象标识的数据对象改变对访问权限的许可。这种设置的变动也自动地影响到该数据对象的每个拷贝,因为其从中产生特定数据对象标识的内容的部分在拷贝中保持不变。By means of changes in the access authorization module 11 or in the user group module 15 , the authorization of the access authorization can be changed from a central location for all data objects from which a specific data object identifier is generated, independently of the location of the data object. Changes of this setting also automatically affect every copy of the data object, since the part of the content from which the particular data object identity was generated remains unchanged in the copy.

在另一个优选的实施方式中,该系统具有一个访问权限模块11、一个用户组模块15和一个附加的数据对象分类模块12,其同样可以例如是服务器、电子图书馆或一个在计算机上运行的过程。数据对象分类模块12可以访问数据对象分类存储器14,其中存储有用于将数据对象标识与访问权限分类对应的信息,并且可以改变该信息。In another preferred embodiment, the system has an access authorization module 11, a user group module 15 and an additional data object classification module 12, which can also be, for example, a server, an electronic library or a process. The data object classification module 12 can access the data object classification storage 14, in which information used to associate data object identifiers with access right classifications is stored, and can change the information.

与上面描述内容相比本实施方式模块化的程度更强。如上所述,用户组模块15提供用于确定电子用户标识的信息,而访问权限模块11提供如何如上用于将用户标识与访问权限分类进行分配的信息。数据对象分类模块12提供对使得可以将用户标识与访问权限分类进行分配的信息的补充。通过数据对象分类模块12可以对每个数据对象预定和变更,它们属于何种访问权限分类。Compared with the above description, the degree of modularization of this embodiment is stronger. As mentioned above, the user group module 15 provides information for determining electronic user identities, while the access rights module 11 provides information for how to assign user identities to access right categories as above. The data object classification module 12 provides supplementary information enabling the assignment of user identifications to access rights classifications. Through the data object classification module 12, each data object can be reserved and changed, and which access right classification they belong to.

这样,在每个访问权限分类中在该访问权限分类中分配的用户和用户组具有其中预定的访问权限。通过依次使不同的用户或者用户组可以访问数据对象,而改变在数据对象分类模块12中的分配,可以例如对应于预定工作流的运行变更对于一个数据对象的访问权限。在医疗工作环境中,这种状态可以例如是:在诊所中接收患者、入院检查、随后的借助于放射学产生图像的方法的检查、治疗和最后的诊断,其中,各自不同的用户组,例如医疗技术员、放射科人员和治疗人员,对患者数据对象进行处理。In this way, in each access right category, the users and user groups assigned in this access right category have the access rights predetermined therein. By successively making data objects accessible to different users or groups of users, changing the assignment in the data object classification module 12 , it is possible, for example, to change the access rights for a data object corresponding to the execution of a predetermined workflow. In a medical work environment, such states can be, for example: reception of a patient in a clinic, admission examination, subsequent examination by means of radiological image-generating methods, treatment and final diagnosis, wherein the respective different user groups, e.g. Medical technicians, radiologists and therapeutic staff, who work on patient data objects.

当要一直在数据处理系统内,即在安全域内对数据进行访问时,则首先通过访问控制模块7产生待访问的数据对象的数据对象标识。通过对用户组模块15的访问,访问控制模块7确定一个用户标识,并根据该用户标识通过对访问权限模块11的访问确定一个访问权限分类。通过访问数据对象分类模块12根据前面产生的数据对象标识,确定哪个访问权限分类属于该数据对象。由此,通过对数据对象标识和用户标识的分配确定所有信息,以便可以允许该用户对该数据对象的特定访问权限。When the data is to be accessed in the data processing system, that is, in the security domain, the data object identification of the data object to be accessed is firstly generated by the access control module 7 . Through access to the user group module 15 , the access control module 7 determines a user ID, and based on the user ID, through access to the access rights module 11 , an access right category is determined. The access data object classification module 12 determines which access right classification belongs to the data object according to the previously generated data object identification. All information is thus determined by the assignment of the data object identifier and the user identifier in order to be able to grant the user specific access rights to the data object.

也可以将访问控制模块7的作用方式用于从远处设置的工作站进行的数据访问。例如,移动数据处理装置21(如一个PDA或者笔记本电脑)可以通过数据远距离连接19(如一个调制解调连接或者移动无线连接)对系统的数据对象进行访问。在例如家庭工作场所或者在如诊所的移动设备的工作环境内可以是这种情况。The mode of operation of the access control module 7 can also be used for data access from remotely located workstations. For example, a mobile data processing device 21 (such as a PDA or notebook computer) can access data objects of the system via a data remote connection 19 (such as a modem connection or a mobile wireless connection). This may be the case, for example, in a home workplace or within a work environment on a mobile device like a clinic.

上面描述的数据处理系统的结构可以在不对访问控制模块7的作用方式进行变动的条件下改变其模块性。例如,可以将用户组存储器17和访问权限存储器13结合在一个共同的存储器介质上,或者可以将访问权限模块11和用户组模块15集成在一个单一的数据处理装置中。与访问控制模块7分开的设置也不是对于工作方式所必需的,而是可以集成在其中。模块化的结构使得可以特别灵活地对应于各自工作环境的所有结构上的要求特别灵活地使用系统。The structure of the data processing system described above can be modified in its modularity without changing the mode of operation of the access control module 7 . For example, the user group memory 17 and the access right memory 13 can be combined on a common storage medium, or the access right module 11 and the user group module 15 can be integrated into a single data processing device. Provisions separate from the access control module 7 are also not required for the mode of operation, but can be integrated therein. The modular construction allows a particularly flexible use of the system in accordance with all structural requirements of the respective working environment.

在图2中示意地示出了数据处理系统内部(即安全域内)的逻辑层。对其访问进行控制的电子数据对象处于在最低层31上。这些数据对象具有对于标识重要的内容33,从该内容33中可以产生数据对象标识。迄今为止必须将该对于标识重要的内容33设置在更高的层上,因为该数据对象标识必须可以独立于用户的访问权限被访问,以便能够确定这种访问权限的规模。The logical layers within the data processing system (ie within the security domain) are schematically shown in FIG. 2 . On the lowest layer 31 are the electronic data objects whose access is controlled. These data objects have identification-relevant content 33 from which a data object identification can be generated. Previously, this identification-relevant content 33 had to be arranged on a higher layer, since the data object identification had to be accessible independently of the user's access rights in order to be able to determine the extent of such access rights.

在数据层之上设置了一个ACL35,该ACL在操作系统层上并在各自操作系统内独立于在操作系统上的用户登录控制对数据的访问。ACL35迄今不是数据对象层31,33的一部分,因为其在离开各自的文件系统或者在对操作系统进行变更之后不能得到保持。其不会连同数据一起得到继承,而是被丢失。因此,将ACL35在示意性的表示中表示为单独的层。An ACL 35 is set above the data layer, which controls access to data on the operating system layer and within the respective operating system independently of user logins on the operating system. The ACL 35 has hitherto not been part of the data object layer 31 , 33 because it cannot be maintained after leaving the respective file system or after changes to the operating system. It is not inherited along with the data, but is lost. Therefore, ACL 35 is shown as a separate layer in the schematic representation.

操作系统层37设置在ACL35之上,其控制ACL35并通过ACL35控制数据对象层31,33。Arranged above the ACL 35 is an operating system layer 37 which controls the ACL 35 and via the ACL 35 the data object layers 31 , 33 .

访问控制层39位于操作系统层37之上,在其内部执行访问控制模块7的功能。除了当前现有的操作系统访问控制之外,其还控制对所有数据的访问。The access control layer 39 is located above the operating system layer 37 and executes the functions of the access control module 7 inside it. It controls access to all data in addition to currently existing operating system access controls.

具有各自工作环境的应用程序的应用层41位于访问控制层39之上。On top of the access control layer 39 is an application layer 41 for applications with respective working environments.

在附图的右边部分示例地示出了这样的逻辑层,其可以进行按照通过箭头表示的将文件传送至另一个操作系统。该另一操作系统在所选择的例子中不具有ACL。特别是将数据对象标识33一同传送,则数据对象层31,33保持不变。但是,由于缺少ACL没有通过操作系统层37的访问权限控制。The right part of the figure shows an example of a logical layer that can carry out the transfer of files to another operating system as indicated by the arrows. This other operating system has no ACLs in the chosen example. In particular, if the data object identifier 33 is transmitted together, the data object layers 31, 33 remain unchanged. However, there is no access control through the operating system layer 37 due to the lack of ACLs.

但是,对于数据对象层31,33的访问根据其定位只可以通过访问控制层39进行。即,对在设定的范围中数据访问的控制在数据导入之后保持不变,并且独立于操作系统的变换。应用层41可以仅通过访问控制层39对数据进行访问。However, access to the data object layers 31 , 33 is only possible via the access control layer 39 depending on their location. That is, the control over data access within the set range remains unchanged after data import and is independent of operating system changes. The application layer 41 can access data only through the access control layer 39 .

在图3中示出了在安全域内对数据对象进行访问的方法步骤。在步骤51从用户或者应用程序一侧开始对数据对象的访问。The method steps for accessing a data object within a security domain are shown in FIG. 3 . Access to the data object starts at step 51 from the user or application side.

在步骤53确定用于识别用户的用户标识。如上所述,根据键盘输入或者生物测定学上的数据采集对所需的信息进行采集。根据这样采集的数据通过经用户组模块15对用户组存储器17进行访问而确定用户标识。In step 53 a user identification for identifying the user is determined. As described above, the required information is collected based on keyboard input or biometric data collection. Based on the data collected in this way, the subscriber identification is determined by accessing the subscriber group memory 17 via the subscriber group module 15 .

在步骤55中进行检验,看待访问的数据对象能否产生一个数据对象标识。该数据对象标识要么存储在自身的数据对象中,要么包含能够自动确定标识的信息。In step 55 it is checked whether a data object identifier can be generated for the data object to be accessed. The data object identifier is either stored in the own data object or contains information that enables the identifier to be determined automatically.

如果证明不能产生数据对象标识,则在步骤56分配一个缺省数据对象标识,根据该缺省标识可以随后设置一个按照标准的访问权限范围。由此,在例如没有在系统中引入数据对象标识的条件下,可以按照标准并无须花费时间地进行其它确定访问权限范围的方法步骤,而实现对于数据对象的访问控制。If it turns out that a data object identifier cannot be generated, then in step 56 a default data object identifier is assigned, on the basis of which a standard-based access authorization range can then be set. Thus, for example, without introducing a data object identifier into the system, other method steps for determining the scope of the access rights can be carried out according to the standard without taking time, so as to realize the access control to the data object.

如果可能,在步骤57将数据对象标识作为对在数据对象中存储的标识的拷贝或者从在数据对象中存储的内容中自动地产生。If possible, the data object identity is generated at step 57 as a copy of the identity stored in the data object or automatically from the content stored in the data object.

在步骤59中对访问权限模块11进行访问,以便根据访问权限存储器15中的信息确定一个访问权限分类。在此,调用一个用户标识和访问权限分类之间的分配,这种分配可以按表格的形式或者作为图存放。In step 59 the access authorization module 11 is accessed in order to determine an access authorization classification based on the information in the access authorization memory 15 . In this case, an assignment between user identification and access authorization classification is called, which assignment can be stored in table form or as a graph.

在步骤61对数据对象分类模块12进行访问,以便从数据对象分类存储器14中获得信息,根据这些信息可以确定一个为先前确定的数据对象标识分配的访问权限类别。In step 61 the data object classification module 12 is accessed in order to obtain information from the data object classification memory 14 from which an access authorization class assigned to a previously determined data object identifier can be determined.

在得到所有用于用户识别、组识别和数据对象分类信息之后,在步骤63确定该用户所允许的访问权限。这种确定要么在步骤59和步骤61中调用的数据基础上进行,要么在步骤56分配的标准值的基础上进行。在此,标准值的分配可以不经对模块的进一步访问进行,以便避免不必要的访问和节省访问时间。After obtaining all the information for user identification, group identification and data object classification, at step 63 the access rights allowed by the user are determined. This determination is made either on the basis of the data called up in steps 59 and 61 or on the basis of the standard values assigned in step 56 . In this case, the assignment of standard values can take place without further access to the module in order to avoid unnecessary access and save access time.

在步骤65中根据前面确定的访问权限进行对数据的访问。In step 65 the access to the data takes place according to the previously determined access rights.

在步骤67中结束对数据的访问。例如,用户可以从系统中注销,也可以由系统进行自动的超时停止,或者在系统中对用于确定访问权限的分类进行改变。Access to the data is ended in step 67 . For example, a user may log off from the system, or be automatically timed out by the system, or the classification used to determine access rights may be changed in the system.

为了说明本发明的程序技术的方面,下面再现了几个极其简化的对于实现本发明方法步骤的语义上的应用。简化包括例如对于变量定义和错误处理的读出。In order to illustrate the procedural aspects of the invention, several extremely simplified semantic applications of the steps for implementing the method of the invention are reproduced below. Simplifications include, for example, the reading out of variable definitions and error handling.

用户组模块允许加入、修改、删除和调用用户和组识别。此外,其包括用于识别各用户的措施。其实现可以在下列分配中找到应用:The User Groups module allows adding, modifying, deleting and recalling user and group identification. Furthermore, it includes measures for identifying the individual users. Its implementation can find application in the following allocations:

bool createUser(wchar_t*theUserName,wchar_t*thepassword,wchar_t*&heSID);bool createUser(wchar_t*theUserName, wchar_t*thepassword, wchar_t*&heSID);

bool deleteUser(wchar_t*theUserNarme);bool deleteUser(wchar_t*theUserNarme);

bool querySID(wchar_t*theUserName,wchar_t*&theSID);bool querySID(wchar_t*theUserName, wchar_t*&theSID);

bool createGroup(wchar_t*theGroupName,wchar_t*&heGID);bool createGroup(wchar_t*theGroupName, wchar_t*&heGID);

bool deleteGroup(wchar_t*theGroupName);bool deleteGroup(wchar_t*theGroupName);

bool queryGID(wchar_t*theGroupName,wchar_t*&theGID);bool queryGID(wchar_t*theGroupName, wchar_t*&theGID);

bool addUserToGroup(wchar_t*theSID,wchar_t*theGID);bool addUserToGroup(wchar_t*theSID, wchar_t*theGID);

bool removeUserFromGrouP(wchar_t*theSID,wchar_t*theGID);bool removeUserFromGrouP(wchar_t*theSID,wchar_t*theGID);

bool authenticateUser(wchar_t*theUserName,wchar_t*theUserPassword,wchar_t*theUID);bool authenticateUser(wchar_t*theUserName, wchar_t*theUserPassword, wchar_t*theUID);

bool releaseUID(wchar_t*theUID);bool releaseUID(wchar_t*theUID);

bool analyzeUID(wchar_t*thetUID,wchar_t*&theSID,wchar_t*&theGID)bool analyzeUID(wchar_t*thetUID,wchar_t*&theSID,wchar_t*&theGID)

其中,“bool”是一个可以取布尔值TRUE或者FALSE的C++关键字,该关键字位于变量定义、方法定义或者方法说明之前。“wchar_t”定义一种微软数据类型。“enum”是一个可以定义列举类型(Enumerations)的C++关键字。“struct”是一个可以定义新的组合数据类型的C++关键字。Among them, "bool" is a C++ keyword that can take the Boolean value TRUE or FALSE, and this keyword is located before the variable definition, method definition or method description. "wchar_t" defines a Microsoft data type. "enum" is a C++ keyword that can define enumerated types (Enumerations). "struct" is a C++ keyword that can define new composite data types.

SID以及GID是对于用户识别以及组识别的唯一标识,并在一个安全域内得到使用。它们起到在该安全域内代表用户和组的作用,而无须为此使用实际的标识或者名称。SID and GID are unique identifiers for user identification and group identification, and are used in a security domain. They serve to represent users and groups within the security domain without having to use actual identities or names for this purpose.

其它例如createGroup或deleteGroup的所谓指示字,是单独选择的并且可以从其自身的词义得到解释。Other so-called pointers, such as createGroup or deleteGroup, are selected individually and can be interpreted from their own meaning.

随着每个对用户的成功验证将产生一个唯一标志用户和工作环境的UID。一旦用户从系统中注销或者由于超时该工作环境从安全区域中结束,则将该UID被删除。With each successful authentication of the user will generate a UID that uniquely identifies the user and work environment. The UID is deleted once the user logs out of the system or the work environment ends from the secure area due to a timeout.

访问权限模块可以通过使用下列指令得到实现:Access rights modules can be implemented using the following directives:

Enum TokenRightsEnum TokenRights

{{

     Create,//在分层组织的文件中允许创建新的子对象Create, // Allows creation of new sub-objects in hierarchically organized files

     Read,     //允许读取文件内容Read, //Allow to read file content

     Update,   //允许修改文件内容Update, //Allow modification of file content

     Delete,   //允许删除整个文件,即进行物理的破坏Delete, //Allows to delete the entire file, that is, physical destruction

     Execute,  //允许更新对该文件的当前保护Execute, //Allow updating the current protection for this file

     ExecuteSpecificFunction  //允许在文件的内容上执行特殊的功能ExecuteSpecificFunction //Allows special functions to be performed on the contents of the file

};};

bool createToken(wchar_t*theTokenName);bool createToken(wchar_t*theTokenName);

bool assignRight(wchar_t*theTokenName,wchar_t*theSID,TokenRightsbool assignRight(wchar_t*theTokenName, wchar_t*theSID, TokenRights

     theGrantedRights);theGrantedRights);

bool assignRight(wchar_t*theTokenName,wchar_t*theGID,TokenRightsbool assignRight(wchar_t*theTokenName, wchar_t*theGID, TokenRights

     theGrantedRights);theGrantedRights);

bool removeToken(wchar_t*theTokenName);bool removeToken(wchar_t*theTokenName);

TokenRights authorize(wchar_t*theTokenName,wchar_t*theSID wchar_tTokenRights authorize(wchar_t*theTokenName, wchar_t*theSID wchar_t

     *theGID);*theGID);

为了能够确定用户的访问权限,访问权限模块11使用其SID和GID。可以为组识别和用户识别配置不同的访问权限,并且一个用户可以取得多个标识,从而必须对所有的SID和GID进行评估,以便可以确定各用户的访问权限范围。In order to be able to determine the access rights of a user, the access rights module 11 uses his SID and GID. Different access rights can be configured for group identification and user identification, and a user can obtain multiple identities, so all SIDs and GIDs must be evaluated to determine the range of access rights for each user.

在前面的指令举例中作为“Token”表示的、将数据对象标识至类别的分配,允许加入、删除、搜索和修改单个的分配。其可以通过使用下列指令得到实现:Assignment, denoted as "Token" in the previous command example, that identifies a data object to a class, allows adding, deleting, searching and modifying individual assignments. It can be achieved by using the following commands:

struct SecurityID  //用于DICOM构成文件的抽样定义struct SecurityID //Sampling definition for DICOM constituent files

{{

       wchar_t  *thePatientQuadruple;wchar_t *thePatientQuadruple;

       wchar_t  *theStudyInstanceUID;  wchar_t *theStudyInstanceUID;

       };};

bool setDefaultProtection(wchar_t*theTokenNames);bool setDefaultProtection(wchar_t*theTokenNames);

bool addProtection(SecurityID &theDocumentSecurityID,wchar_tbool addProtection(SecurityID & theDocumentSecurityID, wchar_t

*theTokenNames);*theTokenNames);

bool queryProtection(SecurityID &theDocumentServiceID,wchar_tbool queryProtection(SecurityID & theDocumentServiceID, wchar_t

*&theTokenNames);*&theTokenNames);

bool removeProtection(SecurityID &theDocumentServiceID,wchar_tbool removeProtection(SecurityID & theDocumentServiceID, wchar_t

*theTokenNames);*theTokenNames);

可以将一个数据对象标识分配给多个类别。没有分配给类别的数据对象标识获得标准的缺省访问权限的范围。A Data Object ID can be assigned to multiple categories. Data objects that are not assigned to a category identify scopes that get standard default access rights.

Claims (10)

1. A method of protecting an electronic data object against unauthorized access, said data object being arranged for storing information, wherein a) in a first step (56, 57) an electronic data object identification is generated on the basis of the content of said electronic data object, b) in a next step (63) access rights are determined on the basis of the data object identification, and c) in a last step (65) access to the electronic data object is allowed on the basis of the access rights, wherein,
an electronic user identification is determined for the operator in a further step (53) prior to step c), and information enabling the assignment of the user identification to the access right classification is determined in a further step (59), and the access right is determined on the basis of the assignment of the user identification to the access right classification.
2. The method of claim 1, wherein the data object identification is generated as a copy of an identification contained in the data object.
3. The method of claim 1, wherein the data object identification is generated using information stored in the data object.
4. Method according to claim 1, wherein in a further step (61) after said step a) information is determined which enables an assignment of the data object identification to an access rights classification, and the access rights are determined from the assignment of the data object identification to an access rights classification.
5. The method of any of claims 1-4, wherein the access rights include one standard right and one functional right.
6. The method of claim 1, wherein medical data about an individual is stored in the data object.
7. A data processing system having a data processing apparatus (1) which can access electronic data objects and an access control module (7), by means of which access control module (7) an electronic data object identification is generated on the basis of the content of the data object and an access right is determined on the basis of the data object identification by means of the access control module (7) and access to the electronic data object is permitted on the basis of the access right by means of the access control module (7), wherein the data processing system further comprises a recognition means (6) by means of which an electronic user identification of an operator can be determined and an access right module (13) by means of which an assignment between the electronic user identification and the classification of the access right is stored and which access right module (13) can be accessed by the access control module (7), wherein the access rights can be determined by the access control module (7) from the access to the access rights module (13).
8. The data processing system according to claim 7, said data processing system comprising a data object classification module (12), by means of which data object classification module (12) the assignment of electronic data object identifications and access rights classifications to each other is stored, and which module (12) is accessible to said access control module (7), wherein said access rights are determinable by said access control module (7) on the basis of access to said data object classification module (12).
9. The data processing system of claim 7, wherein the data processing system determines one standard right and one functional right as access rights.
10. The data processing system of claim 7, wherein the data processing system is designed as a medical workstation.
CNB2004100397120A 2003-03-14 2004-03-15 Method and system for protecting electronic data objects from unauthorized access Expired - Fee Related CN100449450C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10311648.6 2003-03-14
DE10311648 2003-03-14

Publications (2)

Publication Number Publication Date
CN1530792A CN1530792A (en) 2004-09-22
CN100449450C true CN100449450C (en) 2009-01-07

Family

ID=32920851

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100397120A Expired - Fee Related CN100449450C (en) 2003-03-14 2004-03-15 Method and system for protecting electronic data objects from unauthorized access

Country Status (2)

Country Link
CN (1) CN100449450C (en)
DE (1) DE102004004101A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100412743C (en) * 2004-12-17 2008-08-20 摩托罗拉公司 Method and apparatus for digital rights management
CN101399695B (en) * 2007-09-26 2011-06-01 阿里巴巴集团控股有限公司 Method and device for operating shared resource
WO2009049681A1 (en) * 2007-10-19 2009-04-23 Vascops Automatic geometrical and mechanical analyzing method and system for tubular structures
WO2016065553A1 (en) 2014-10-29 2016-05-06 华为技术有限公司 Data frame transmission method and apparatus
CN105117582A (en) * 2015-07-29 2015-12-02 苏州麦迪斯顿医疗科技股份有限公司 Medical data platform information processing method
CN107103245B (en) * 2016-02-23 2022-08-02 中兴通讯股份有限公司 File authority management method and device
CN105872108B (en) * 2016-06-15 2019-02-22 深圳市清时捷科技有限公司 A kind of multiple data screening, transmission method and its devices for receiving terminal
CN107944297B (en) * 2017-12-11 2020-11-24 北京奇虎科技有限公司 A control method and device for accessing files
DE102018127949A1 (en) * 2018-11-08 2020-05-14 Samson Aktiengesellschaft Control of access rights in a networked system with data processing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1232560A (en) * 1996-09-30 1999-10-20 诺基亚电信公司 Marking of electronic documents in order to expose unauthorized publication
CN1313988A (en) * 1999-04-14 2001-09-19 松下电器产业株式会社 Data management apparatus, data management method, and record medium recording data management program
WO2003017036A2 (en) * 2001-08-20 2003-02-27 Pardalis Software, Inc. Informational object authoring and distribution system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1232560A (en) * 1996-09-30 1999-10-20 诺基亚电信公司 Marking of electronic documents in order to expose unauthorized publication
CN1313988A (en) * 1999-04-14 2001-09-19 松下电器产业株式会社 Data management apparatus, data management method, and record medium recording data management program
WO2003017036A2 (en) * 2001-08-20 2003-02-27 Pardalis Software, Inc. Informational object authoring and distribution system

Also Published As

Publication number Publication date
DE102004004101A1 (en) 2004-09-30
CN1530792A (en) 2004-09-22

Similar Documents

Publication Publication Date Title
JP4550056B2 (en) Method, system, and program storage device for realizing data access control function
Hu et al. Assessment of access control systems
Zhang et al. A role-based delegation framework for healthcare information systems
Motta et al. A contextual role-based access control authorization model for electronic patient record
US8185411B2 (en) Method, system, and apparatus for patient controlled access of medical records
EP1732024A1 (en) Techniques for providing role-based security with instance-level granularity
JP4892179B2 (en) Zone-based security management for data items
Pernul Database security
US7761382B2 (en) Method and system to protect electronic data objects from unauthorized access
CN100449450C (en) Method and system for protecting electronic data objects from unauthorized access
Le et al. Activity-oriented access control to ubiquitous hospital information and services
Sohr et al. Formal specification of role-based security policies for clinical information systems
Longstaff et al. The tees confidentiality model: an authorisation model for identities and roles
Adamu et al. A robust context and role-based dynamic access control for distributed healthcare information systems
Desai The break-the-glass (BtG) principle in access control
Tall et al. Access Control in the Era of Big-Data Driven Models and Simulations
Chinaei et al. User-managed access control for health care systems
Salau et al. A Robust Context and Role-Based 10 Dynamic Access Control for Distributed Healthcare Information Systems
Ou et al. Designing a Flow-based Mechanism for Accessing Electronic Health Records on a Cloud Environment
Poliac et al. Seismocardiogram (SCG) interpretation using neural networks
Sanzi et al. Trust Profile based Trust Negotiation for the FHIR Standard.
Henkind et al. Application of a multilevel access model in the development of a security infrastructure for a clinical information system
Tzelepi et al. A flexible role-based access control model for multimedia medical image database systems
Kallepalli A security framework for DICOM images in health information systems
Porter Trust Negotiation for Open Database Access Control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090107

Termination date: 20180315