[go: up one dir, main page]

TW448387B - Generalized policy server - Google Patents

Generalized policy server Download PDF

Info

Publication number
TW448387B
TW448387B TW088110985A TW88110985A TW448387B TW 448387 B TW448387 B TW 448387B TW 088110985 A TW088110985 A TW 088110985A TW 88110985 A TW88110985 A TW 88110985A TW 448387 B TW448387 B TW 448387B
Authority
TW
Taiwan
Prior art keywords
access
decision
information
user
database
Prior art date
Application number
TW088110985A
Other languages
Chinese (zh)
Inventor
Clifford L Hannel
Laurence R Lipstone
Davis S Schneider
Original Assignee
Internet Dynamics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Internet Dynamics Inc filed Critical Internet Dynamics Inc
Application granted granted Critical
Publication of TW448387B publication Critical patent/TW448387B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter use a local copy of an access control data base to determine whether an access request made by a user. Changes made by administrators in the local copies are propagated to all of the other local copies. Each user belongs to one or more user groups and each information resource belongs to one or more information sets. Access is permitted or denied according to of access policies which define access in terms of the user groups and information sets. The rights of administrators are similarly determined by administrative policies. Access is further permitted only if the trust levels of a mode of identification of the user and of the path in the network by which the access is made are sufficient for the sensitivity level of the information resource. If necessary, the access filter automatically encrypts the request with an encryption method whose trust level is sufficient. The first access filter in the path performs the access check and encrypts and authenticates the request; the other access filters in the path do not repeat the access check. A policy server component of the access filter has been separated from the access filter and the policies have been generalized to permit administrators of the policy server to define new types of actions and new types of entities for which policies can be made. Policies may now further have specifications for time intervals during which the policies are in force and the entities may be associated with attributes that specify how the entity is to be used when the policy applies.

Description

經濟部智慧財產局員工消費合作社印製 4483 87 A7 ______B7 五、發明說明(1 ) 1網路中資訊之安全遞送 交又參看有關專利申請案 2交又參看有關專利申請案 本專利申請案對:在1998年6月29曰,由韓纳爾(Hanne!), 皇il_M_(Lipstone) ’及史耐德(Schneider)楛出申請,標題爲 通用決策飼服器”的美國臨時專利申請案第60/091,130號 享有優先權》本專利申請案並且是:在1998年3月4曰, 由主衛·史耐德(David Schneider)等人提出申請,標題爲"存 取資訊之分佈型管理"的美國專利申請案(U.S.S.N)第 09/034,507號之一續篇部份;因而包含該專利申請案的整 個闡述和附圖。本專利申請案中的新資料始於標題爲,,使 用在存取過濾器203中的諸多技術之通則I,的章節,並包括 一些新附圖2 6到3 7。 發明背景 2發明背景1 .發明領域 3 1 .發明領域 本發明通常與存取資料之控制有關:且説得更明確些, 與存取在分佈型環境中的存取資料之控制有關。 2 ,有關技藝之描述 3 2 ·有關技藝之描述 網際網路(Internet)已革新了資料通信。已經藉由提供諸 多通信協定(protocols)和定址方案來達成,不論:電腦系 統的實體硬體(physical hardware),被連接到的實體網路種 類’或者被用來將資訊從一個電腦系統發送到另—個電腦 -4- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公餐) ------t I----I --------訂·--------i ------ (請先Μίί背面之注意事項再填寫本頁) 448387 A7 經濟部智慧財產局員工消費合作社印製 ---------B7_____五、發明說明(2 ) 系’先的諸多貫體網路種類如何,該方案使得世界上任何地 方的任何電腦系統和世界上任何地方的任何其它電腦系統 父換資訊成爲可能。使得兩個電腦系統交換資訊的一切要 求疋:每個電腦系統都要有一個網際網路位址及針對通信 k定所需的軟體;並且,藉由許多實體網路的某種組合, 兩個機器之間會有一條路由(route),它可能用來載送根據 通信協定而構築的訊息。 然而’電腦系统可能經由網際網路來交換訊息之如此容 易已赵造成諸多問題。在—方面,它已經使存取資訊變得 前所未有之容易和低廉;在另—方面,它已經使它更難保 護資訊。網際網路在兩方面已經使它較難保護資訊: • 較難限制存取操作。假如可能經由網際網路來存取資 訊’就有可能隨著存取網際網路資訊而存取任何人的 資訊。一旦有經由網際網路而存取資訊,阻擋熟練入 侵者就會變成一種困難的技術問題。 • 經由網際網路,在途中(en route)較難維護安全性"將 網際網路建構作爲一種分包資訊交換網路(packet switching network)。不可能預測訊息由網路將會採取 什麼路由。更不可能保證所有資訊交換(switches)的安 全性,或保證包括那些載明其來源或目標的訊息部 份:在途中都未曾被讀取或改變。 圖1顯示:目前用來增加可經由網際網路存取資訊之網 路安全性的技^。圖1顯示:網路101,它由兩個分離内部 網路103(A)和103 (B)組成,該内部網路皆由網際網路111所 -5- 本纸張尺度適用中囤國家標準(CNS)M規格(210x297公a ) (請先閱筇背面之it意事項再填寫本頁) '1----- — 丁____ I言 線丨 4483 87 經濟部智慧財產局員工消費合作社印*]衣 Α7 Β7 五、發明說明(3 ) 連接。雖然兩個網路丨〇3(A)和丨〇3(β) 一般説來都不可存取 資訊’但是從某種意義説來,它們都是網際網路的—部 份:在這些網路中的電腦系統都有網際網路位址,並且都 會使用網f祭網路通信協定來交換資訊。兩個這樣的電腦系 統出現在圖1中,就像在網路1 03(A)中的請求者(requestor) 105以及在網路103(b)中的伺服器113那樣。請求者105正在 請求存取能夠由伺服器U3提供的資料。附接到伺服器113 的是一種大量儲存裝置115,該裝置包含正由請求者1〇5請 求的資料1 17。當然,對於其它資料而言,伺服器U3可能 是請求者’而請求者丨05則可能是伺服器。而且,在目前 上下文中,存取操作被認爲是:能夠讀取或改變儲存在伺 服器1 13上之資料或者能夠改變伺服器113之狀態的任何操 作。在提出請求方面,請求者105正在使用諸多標準 TCP/IP(傳輸控制通信協定/網際網路通信協定)協定中的 一種協定。如此處所使用的,通信協定是能夠被用來交換 諸多電腦系統之間的資訊之一訊息集的—種描述。 知根據一種通信協定而正在通信的諸多電腦系統之間所 發送的些貫際訊息集體稱爲:對話(s e s s i ο η)。在對話期 間,清求者1 0 5根據通信協定將訊息發送到伺服器η 3的網 際網路位址,而伺服器丨13則根據通信協定將訊息發送到 請求者1 05的網際網路位址。請求及回應兩者將會藉由網 際網路111而在兩個内部網路1〇3(Α)和〗〇3(Β)之間運行。土 伺服器113允許請求者105存取資料,則在對話中從伺服器 113流到請求者1〇5的一些訊息將包括被請求資料1丨7 ^將 本紙張尺度適用中囷Θ家標準(CNS)AJ規格 (210 X 297公釐) (請先闇讀背面之注意事項再填寫衣頁) ,4------- 線> 4483 8 7 A7 B7 五、發明說明(4 ) 必要時藉由網際網路而回應訊息之伺服器1丨3的諸多多軟 體组件稱爲:服務(service) 9 若兩個内部網路103 ( A和B )之擁有者想要確信:只有直 接連接到網路103(A和B )之諸電腦系統的使用者才能夠存 取資料Π 7,以及請求及回應之内容在那些網路之外皆不 爲人所知:則該擁有者必須解決兩項問題:確信何服器 113並不會回應來自與連接到内部網路之那些電腦系統不 同的電腦系統之請求;以及確信:雖然都是經由網際網路 1 1 1轉接中(in transit),可是存取網際網路! 11資訊的人都 無法存取或修改請求及回應。有可能達成這些目標的兩種 技術爲:防火牆(firewalls)及使用加密的鑿隧道操作 (tunneling) ° 概念上,防火牆是内部網路與其餘的網際網路n 1之間 的一道障壁(barrier)。防止牆出現在109(A)和(B)處。防火 牆109(A)保護内部網路103(A),而防火牆109(B)則保護内 部網路103(B)。藉由一種在電腦系統中運作的通路(gate way)來建構防火牆,該電腦系統被安裝在内部網路被連接 到網際網路的地方。包括在通路中的是一種存取過濾器: 它是電腦系統中的一套軟體和硬體組件,會針對儲存在内 部網路之内的資訊而核對來自内部網路之外的所有請求: 並且,若它來自有權存取資訊的來源,則只會將請求發送 在内部網路上。在其它方面,它會捨棄該請求。兩個這樣 的存取過濾器:存取過濾器107(A)存取過濾器107(B)則出 現在圖1中。 本紙張尺度適用令0國家標準<CNS)A4規格(210 X 297公釐) (請先Λ3讀背面之注意事項再填窵本頁) k--------訂---------線 ' 、 經濟部智慧財產局員工消費合作社印製 ;3 3 8 7 A7 _____B7 五、發明說明(5 ) 若能夠肯定答復兩個問題,則來源有權存取被請求資 訊:Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4483 87 A7 ______B7 V. Description of the invention (1) 1 For the secure delivery of information on the Internet, please refer to the related patent application. 2 Please refer to the related patent application. This patent application is for: On June 29, 1998, U.S. Provisional Patent Application No. 60 entitled "General Decision Feeder" was filed by Hanne !, Emperor il_M_ (Lipstone) 'and Schneider. / 091,130 enjoys priority "This patent application is also: On March 4, 1998, the application was made by David Schneider and others, entitled" Distributed Management of Access Information " ; A sequel to US Patent Application (USSN) No. 09 / 034,507; thus containing the entire description and drawings of this patent application. The new material in this patent application begins with the title, Take the chapters of General Principle I, of many technologies in the filter 203, and include some new drawings 26 to 37. BACKGROUND OF THE INVENTION 2 Background of the Invention 1. Field of the Invention 3 1. Field of the Invention The present invention is generally related to the control of access to data Related: And say More specifically, it is related to the control of access to data in a distributed environment. 2. Description of technology 3 2 · Description of technology The Internet has revolutionized data communication. It has provided many Protocols and addressing schemes are reached, regardless of: the physical hardware of the computer system, the type of physical network to which it is connected, or used to send information from one computer system to another-a computer- 4- This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 meals) ------ t I ---- I -------- Order · ------ --i ------ (please fill out the note on the back of Μίί before filling this page) 448387 A7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs --------- B7_____ V. Description of the invention ( 2) What are the types of many continuous networks? This solution makes it possible to exchange information between any computer system anywhere in the world and any other computer system anywhere in the world. Everything that makes two computer systems exchange information Requirement 疋: Every computer system must have an Internet bit And software required for communication; and, through some combination of many physical networks, there will be a route between the two machines, which may be used to carry messages constructed in accordance with communication protocols. However, the ease with which computer systems may exchange information via the Internet has caused many problems. In one aspect, it has made accessing information easier and cheaper than in the past; in another aspect, it has made it more difficult. Protect information. The Internet has made it more difficult to protect information in two ways: • It is more difficult to restrict access. If it is possible to access the information via the Internet ', it is possible to access anyone's information as the Internet information is accessed. Once information is accessed via the Internet, blocking skilled intruders becomes a difficult technical issue. • It is difficult to maintain security en route via the Internet " Construct the Internet as a packet switching network. It is impossible to predict what route the message will take through the network. It is even more impossible to guarantee the security of all information exchanges, or to include those parts of the message that specify their source or destination: they have not been read or changed along the way. Figure 1 shows the current technology used to increase the security of networks that can access information via the Internet ^. Figure 1 shows: network 101, which is composed of two separate internal networks 103 (A) and 103 (B), which are all controlled by the Internet 111 (CNS) M specification (210x297mm a) (Please read the notice on the back of it before filling out this page) '1 ----- — 丁 ____ I 言 线 丨 4483 87 Employee Consumer Cooperative of Intellectual Property Bureau, Ministry of Economic Affairs印 *] 衣 Α7 Β7 V. Description of the invention (3) Connection. Although two networks 丨 〇3 (A) and 丨 〇3 (β) are generally inaccessible to information, but in a sense, they are both Internet-partial: in these networks All computer systems in the Internet have Internet addresses, and all use the Internet protocol to exchange information. Two such computer systems appear in Figure 1, like the requestor 105 on the network 103 (A) and the server 113 on the network 103 (b). Requester 105 is requesting access to information that can be provided by server U3. Attached to the server 113 is a mass storage device 115 which contains data 1 17 being requested by the requester 105. Of course, for other materials, server U3 may be the requester ’and requester 05 may be the server. Moreover, in the current context, an access operation is considered to be any operation that can read or change the data stored on the server 113 or can change the state of the server 113. In making a request, the requester 105 is using one of many standard TCP / IP (Transmission Control Communication Protocol / Internet Protocol) protocols. As used herein, a communication protocol is a description of a set of information that can be used to exchange information between many computer systems. The collective messages sent between the various computer systems that are communicating according to a communication protocol are collectively called: dialogue (s e s s i ο η). During the conversation, the requester 105 sent the message to the Internet address of the server η 3 according to the communication protocol, and the server 13 sent the message to the Internet bit of the requester 105 according to the communication protocol. site. Both the request and the response will operate through the Internet 111 between the two intranets 103 (Α) and 〖〇3 (Β). The local server 113 allows the requester 105 to access the data, then some of the messages flowing from the server 113 to the requester 105 in the dialogue will include the requested data 1 丨 7 ^ Apply this paper standard to the Θ house standard CNS) AJ specification (210 X 297 mm) (please read the precautions on the back and then fill in the clothing page), 4 ------- Thread > 4483 8 7 A7 B7 V. Description of the invention (4) Necessary Many of the multiple software components of the server 1 丨 3 that respond to messages through the Internet are called: services 9 If the owners of the two internal networks 103 (A and B) want to be sure: Only direct connections Only users of computer systems on network 103 (A and B) can access the data, and the contents of the request and response are unknown outside those networks: the owner must resolve both Item: be sure that server 113 will not respond to requests from computer systems that are different from those connected to the internal network; and be sure: although all are in transit via the Internet 1 1 1 , But access to the Internet! No one of the information can access or modify the request and response. Two technologies that may achieve these goals are: firewalls and tunneling using encryption ° Conceptually, a firewall is a barrier between the internal network and the rest of the Internet n 1 . Prevent walls from appearing at 109 (A) and (B). The firewall 109 (A) protects the internal network 103 (A), and the firewall 109 (B) protects the internal network 103 (B). The firewall is constructed by a gate way that operates in a computer system that is installed where the internal network is connected to the Internet. Included in the channel is an access filter: a set of software and hardware components in a computer system that checks all requests from outside the internal network for information stored within the internal network: and , If it comes from a source that has access to the information, it will only send the request on the intranet. Otherwise, it discards the request. Two such access filters: access filter 107 (A) and access filter 107 (B) appear in FIG. This paper size is applicable to 0 national standards < CNS) A4 specification (210 X 297 mm) (please read the precautions on the back before filling in this page) k -------- Order ---- ----- line ', printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs; 3 3 8 7 A7 _____B7 V. Description of the Invention (5) If two questions can be answered affirmatively, the source has the right to access the requested information:

(fr先閱tf背面之注意事項再填寫本FC •來源實際上就是亨有權利人或物嗎? • 來源有權存取資料嗎? 將找到第一問題之答案的過程稱爲:鑑定。藉著將資訊 提供到識別使用者的防火牆,使用者親自對防火牆加以鑑 定。在這種資訊中有下列幾項。 由 種爲使用者所有的鑑定令牌(authentication token) (有時候稱爲智慧卡(smartcard))所提供的資訊; •使用者機器的作業系統識別;以及 *使用者機器的I P位址和網際網路網域名稱(domain name) 0 防火牆用於鑑定的資訊可能是在頻帶内(in band),那就 是:它是通信協定的一部份;或者,它可能是在頻帶外 (out of band),那就是:它是由—分離通信協定所提供。 線- 經濟部智"財產局員工消費合作社印製 像從上述識別資訊列表中顯而易見的那樣,防火牆能夠 馆賴識別資訊以鑑定使用者達到的程度,端視識別資訊的 種類而定。譬如説,在—分包資訊中的丨P位址就能夠由能 夠截取分包資訊的任何人所改變;因此,防火牆能夠對它 賦予少許的信賴,故而將藉由丨p位址來鑑定稱爲具宥^種 很低的信賴等級。在另一方面,當識別資訊來自一種令牌 時’防火牆就能夠给予該識別資訊一種更高的信賴等級’ 此乃因爲:唯若令牌已經爲別人所有,則它應該不會識別 使用者。通常,就一項關於鑑定的討論而言’請參看由儿 本纸張尺度適用中國固家標準(CNS〉A4規格(210 x 297公Μ ) 3387 Α7 Β7 五、發明說明(6 ) ilL^(S. Bellovin)和 Cheswkk)合著:,,防火牆 (請先閱讀背面v;it事項再填寫本I) 與網際網路安全性·_ 一書,該書由^ ^_± -^^(Addison Wesley)圖書公司印行,美國廠州_,1994年版s 線. 經濟部智慧財產局員工消費合作社印裂 在現代存取過濾器中,在兩個層級處來核對存取操作: 網際網路分包資訊或簡稱丨p層級,以及應用層級。就從 IP層級開始,用於網際網路中的訊息都以分包方式載送, 稱之爲資料級(datagram)。每一個這樣的分包都有—個標 題(header),它包含指示著分包之來源和目標的資訊。來 源和目;^各自依據I P位址和痒號(p〇rt number)來表示。埠 號是用來將電腦内多重業務流(Streams 〇f traffic)各個加以 分別的一個從i到65535的數字。將針對一些爲人所熟知的 網際網路通信協定(諸如:Ηττρ(超本文傳送協定)或FTP (樓案傳送協定))的服務加以指定它們”傾聽"(丨isten t〇)的 諸多爲人所熟知的埠號s存取過濾器具有指示著哪些目標 可能會接收來自哪些來源之〖p分包資訊的一套規則:且若 載明於標題中的來源和目標並未遵從這些规則,則將分包 資訊捨棄》譬如説,該規則可能容許或不容許所有從—部 電腦到另一部電腦的存取操作;或者,根據j p分包資訊之 來源而限制存取—項特定服務(由埠號所載明)。然而,在 I P分包資訊之標題中,並沒有關於正在被存取之個別資訊 片長的資訊’而關於使用者的唯一資訊則是來源資訊。於 是’存取核對是無法在丨p層級處完成的,而必須換成是在 資訊協定層級處完成的,該存取核對涉及:不是鑑定不可 能使用來源資訊之使用者,就是決定使用者是否有權存取 -9- 不砥掁尺度適用中0國家標準(CNS)AJ格(2J〇 κ 297公釐) 448387 經濟部智慧財產局員工消費合作社印製 Λ7 B7 五、發明說明(7 ) 一個別資訊片段。 在應用層級處的存取核對通常是在防火牆中由代理伺服 器(proxies)來完成。代理伺服器是一種存取過濾器的軟體 組件。I所以稱爲代理伺服器,是因爲:它可作爲存取過 滤器中的通信協定之替身(stand_in)用,爲了實現關於使用 者已經請求之資訊片段的使用者鑑定及/或存取核對。譬 如説’一種常用的TCP/IP協定就是超本文傳送協定(hypertext transfer protocol , 或簡稱 http) , 它被用 來將全 球資訊 網(World-Wide Web)網頁(pages)從一個電腦系統傳送到另 一個這樣的電腦系統。若需要個別網頁的存取控制,則必 須檢視協定内容’以便決定哪個特定網頁要求被請求。就 防火牆的詳細討論而言,請參看貝洛文和柴斯維克之前面 參考文獻。 雖然正確執行之存取過濾器操作能夠預防經由網際網路 U 1而未經授權就存取儲存在内部網路中的資料,可是它 無法預防經由網際網路1丨1而未經授權就存取轉接中的資 料。此事藉由使用加密的鑿隧道操作加以預防。這種鑿隧 道操作運作如下:當存取過濾器1 07(A)接收具有内部網路 103(B)中之目標位址的一種來自内部網路i〇3(A)中之一電 腦系統的I P分包資訊時,它會對I P分包資訊,包括其標 題加以加密;進而增加一項新標題,該標題載明:將存取 過渡器107(A)的I P位址當作分包資訊的來源位址,而將存 取過濾器1 07(B)的I P位址當作目標位址。新標題也可能包 含:將存取過濾器107(A)識別爲已加密分包資訊之來源的 -10- 本紙張尺度適用中國舀家標準(CNS)A-l規格(210 X 297公爱〉 --------------4^--------訂---------I ' (請先Μΐ*背面之注意事項再填寫本頁> 448387 A7 B7 五、發明說明(8 ) 鑑定資訊;以及存取過濾器丨〇7(B)能夠從其中決定已加密 分包資訊是否已經被干預的資訊。 因爲原始I P分包資訊已經被加密:所以,當它正在通尚 網際網路1 1 1時,標題和原始Z P分包資訊的内容兩者都無 法被續取,而標題或原始I p分包資訊的資料則也無法沒有 檢測下被修改。當存取過濾器1〇7(B)接收Ip分包資訊時, 它就使用任何識別資訊來決定分包資訊是否的確來自存取 過濾器1 07(A)。如果是的話,它會將由存取過濾器丨〇7(a) 增加到分包資訊的標題加以去除,並決定分包資訊是否被 干預;如果不是的話’就對分包資訊加以解密(decrypt), 並執行關於原始標題的I p層級存取核對。如果標題通過的 話’存取過濾器107(B)就將分包資訊轉遞(f0rward)到載明 於原始標逆中之内邵網路中的I p位址;或者轉遞到針對通 信協定層級存取控制之一代理伺服器。原始I P分包資訊被 稱爲鑿隧道通過網際網路1 1 1 ^在圖1中,一個這樣的隧道 112被顯示在兩個存取過濾器1〇7(八)和1〇7(8)之間。鑿隧道 操作之一附加優點是:它會隱藏來自只有從網際網路m 中有權存取資訊的那些人的内部網路之結構,此乃因爲只 有未加在、I P位址才是存取過渡器的I P位址。 兩個内部網路103(A)和103(B)的擁有者也能夠使用鑿隧 道操作,連同網際網路11 1 ;因而使兩個内部網路1 03(A和 B)成爲單一虛擬專用網路(VPN)l 19。藉由隧道1 12,在網 路103(A)和103(B)中的電腦系統能夠彼此安全地通信,並 且適用於其它電腦;好像網路103(A)和103(B)都是由一種 -11 - 本纸張尺度適用中固舀家標準(CNS)A4規格(210 X 297公窆) ί锖先閱讀背面之汶意事項再填寫本頁) I ί 經濟部智慧財產局員工消費合作社印製 4483^7 A/ B7 五、發明說明(9 專用實體鏈路(physical link)而不是由網際網路1 1 1加以U 接的。的確,可能將虚擬專用網路1 1 9加以擴充’以便I? 括存取網際網路I 1 1資訊的任何使用者,進而能夠執行下 列各項: * 以一種允許存取過濾器107對分包資訊加以解密的方 式,將被定址到内部網路103中之一電腦系統的網際 網路分包資訊加以加密; * 將一標題增加到被定址到存取過濾器107的已加密分 包資訊:以及 ’ 親自對存取過濾器1 07加以鑑定。 誓如説,一位具有連接到網際網路11 1之一可攜式電腦 並具有必要的加密和鑑定能力的雇員能夠使用虛擬專用網 路,以便安全地檢索(retrieve)來自諸多内部網路其中之一 網路中之一電腦系統的資料。 —旦諸多内部網路開始使用網際網路定址操作和網際網 路通信協定,並且被連接進入虚擬專用網路中:針對網際 網路已經發展出的-些劇覽器(brc)wsers)也能夠使用在: 部網路103中:並且從使用者的觀點看來,在網際網路⑴ 中存取資料與在内部網路1 03中存取杳拉士 經濟部智慧紂產局員工消費合作社印製 伃取貧科疋間並沒有差 別。於是,内部網路103已經變成—秭人 、 裡止業内部網路 (intranet),那就是:一種具有和網際 「坑丹路U丨相同的使用 者界面的内部網路。當然,一旦屬於—(fr first read the notes on the back of tf before filling out this FC. • Is the source actually the rightful person or thing? • Does the source have access to the data? The process of finding the answer to the first question is called: identification. Borrow In order to provide information to the firewall that identifies the user, the user personally authenticates the firewall. There are several items of this information. The user-owned authentication token (sometimes called a smart card) (Smartcard)); • The operating system identification of the user's machine; and * The IP address and Internet domain name of the user's machine 0 The information used by the firewall for authentication may be in the frequency band (In band), that is: it is part of the communication protocol; or, it may be out of band, that is: it is provided by-separate communication protocol. Line-Ministry of Economy " Printed by the Property Cooperative Consumer Cooperative, as apparent from the above list of identification information, the firewall can rely on the identification information to identify the extent to which the user has reached. It depends on the type. For example, the P address in the subcontracting information can be changed by anyone who can intercept the subcontracting information; therefore, the firewall can give a little trust to it, so it will use the p It is known to have a very low level of trust. On the other hand, when the identification information comes from a token, 'the firewall can give the identification information a higher level of trust.' This is because: Card is already owned by someone else, it should not recognize the user. Generally, for a discussion about authentication, 'see the Chinese paper standard (CNS> A4 size (210 x 297 mm) applicable to children ’s paper standards. Μ) 3387 Α7 Β7 V. Description of the invention (6) ilL ^ (S. Bellovin) and Cheswkk) :, firewall (please read v on the back first and then fill in this I) and Internet security · _ One book, printed by ^ ^ _ ±-^^ (Addison Wesley) Book Company, US Factory State _, 1994 edition s line. The Intellectual Property Bureau employee consumer cooperative of the Ministry of Economic Affairs is printed in modern access filters, in Check access operations at two levels: Internet Network subcontracting information or abbreviation 丨 p-level, and application level. Starting from the IP level, messages used in the Internet are carried in sub-contracting methods, called datagrams. Each of these Each subcontract has a header, which contains information indicating the source and destination of the subcontract. The source and destination; ^ are each expressed according to the IP address and the number. The port number is used Let's separate the multiple traffic streams (Streams 0f traffic) in the computer from i to 65535. The services of some well-known Internet communication protocols (such as: Ηττρ (transformation protocol) or FTP (building case transmission protocol)) will be designated as "listening" (丨 isten t〇) The well-known port number s access filter has a set of rules that indicate which targets might receive p-subcontracting information from which sources: and if the source and target specified in the title do not follow these rules, Discard Subcontracting Information ", for example, the rule may allow or disallow all access operations from one computer to another; or restrict access based on the source of the JP subcontracting information—a specific service ( (Indicated by the port number). However, in the title of the IP subcontracting information, there is no information about the length of the individual information piece being accessed 'and the only information about the user is the source information. Therefore,' access check It cannot be done at the level of 丨 p, but must be completed at the level of information protocol. The access check involves: instead of identifying users who are unlikely to use the source information, It is to determine whether the user has the right to access. -9- National Standard (CNS) AJ grid (2J〇κ 297 mm) is applicable. 448387 Printed by the Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs Λ7 B7 V. Invention Explanation (7) A piece of information. Access check at the application level is usually done by proxy servers (proxies) in the firewall. A proxy server is a software component of an access filter. So it is called a proxy The server is because: it can be used as a stand-in for the communication protocol in the access filter, in order to achieve user authentication and / or access check on the pieces of information that the user has requested. For example, 'a commonly used The TCP / IP protocol is the Hypertext Transfer Protocol (or HTTP for short), which is used to transfer World-Wide Web pages from one computer system to another such computer system If access control is required for individual web pages, the content of the agreement must be reviewed in order to determine which specific web page request is being requested. For a detailed discussion of firewalls, In other words, please refer to the previous references by Belovan and Chasewick. Although properly implemented access filter operations can prevent unauthorized access to data stored on the intranet via the Internet U 1, but It cannot prevent unauthorized access to the data in transit via the Internet 1 丨 1. This is prevented by using an encrypted tunneling operation. This tunneling operation works as follows: When accessing filter 1 When 07 (A) receives an IP subcontracting information from a computer system in an intranet i03 (A) with a target address in the internal network 103 (B), it will Including its title is encrypted; a new title is added, which states that the IP address of the access adapter 107 (A) is used as the source address of the subcontracting information, and the access filter 1 07 ( B) The IP address is used as the target address. The new title may also include: -10- identifying the access filter 107 (A) as the source of the encrypted subcontracting information. -10- This paper size applies the Chinese Standard (CNS) Al specification (210 X 297 Public Love)- ------------ 4 ^ -------- Order --------- I '(Please fill in this page with the precautions on the back of Mΐ *> 448387 A7 B7 V. Description of the invention (8) Authentication information; and information from which the access filter 7 (B) can determine whether the encrypted subcontracting information has been intervened. Because the original IP subcontracting information has been encrypted: so When it is communicating the Internet 1 1 1, both the title and the content of the original ZP subcontracting information cannot be renewed, and the data of the title or the original IP subcontracting information cannot be modified without detection. When the access filter 107 (B) receives IP subcontracting information, it uses any identifying information to determine whether the subcontracting information does indeed come from the access filter 107 (A). If so, it will pass the Access filter 丨 07 (a) is added to the header of the subcontracting information to remove it, and determines whether the subcontracting information is interfered; if not, 'subcontracting The message is decrypted, and an IP-level access check on the original title is performed. If the title passes, the 'access filter 107 (B) forwards (f0rward) the subcontracting information to the original title. IP address in Nakanosho network; or forwarded to a proxy server for protocol-level access control. The original IP subcontracting information is called tunneling through the Internet 1 1 1 ^ In Figure 1, one such tunnel 112 is shown between two access filters 107 (A) and 107 (8). One additional advantage of tunneling is that it hides data from only the Internet. The structure of the internal network of those who have access to the information in Road m is because the IP address is the IP address of the access adapter only if it is not added. The two internal networks 103 (A) and The owner of 103 (B) is also able to use tunneling operations together with the Internet 11 1; thus making the two internal networks 103 (A and B) a single virtual private network (VPN) 19. By tunneling 1 12. Computer systems in networks 103 (A) and 103 (B) can communicate with each other securely and are suitable for other computers It seems that the Internet 103 (A) and 103 (B) are both a type of -11-This paper size is applicable to the China Solid Standard (CNS) A4 specification (210 X 297 public). Read the matter on the back first Refill this page) I ί Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4483 ^ 7 A / B7 V. Description of the invention (9 Dedicated physical link (physical link) instead of U 1 1 1 . Indeed, it is possible to extend the virtual private network 1 1 9 so that I? Includes any user who accesses the Internet I 1 1 information, and thus can perform the following: * Divide by an allowable access filter 107 Decrypt the packet information by encrypting the Internet subcontracting information addressed to one of the computer systems in the internal network 103; * Add a header to the encrypted subcontracting information addressed to the access filter 107 : And 'personally authenticate access filter 107. It is said that an employee who has a portable computer connected to the Internet 11 and has the necessary encryption and authentication capabilities can use a virtual private network in order to securely retrieve from many intranets Information about a computer system on a network. -Once many intranets began to use Internet addressing operations and Internet communication protocols, and were connected into virtual private networks: some Internet browsers (brc) wsers) have also been developed Used in: Internal network 103: and from the user ’s point of view, access to data on the Internet and access to the intranet 103 are from the Intellectual Property Bureau of the Ministry of Economic Affairs, Employees ’Consumer Cooperatives, India There is no difference in the control of poverty. As a result, the internal network 103 has become a 秭 ren, Lizhiye intranet, that is: an internal network with the same user interface as the Internet "Kandan Road U 丨. Of course, once it belongs to-

' I植的所有内部培I 路都已經被組合成爲單-虛掇專用企業内部網路卢 發生屬於網際網路之特性的存取护制 賞丹又 別閂4…此時,除了有 -12- 本纸張尺度適用中0 0家標準(CNS)A4規格(210 X 297公爱) 4483 8 7 A7 B7 經涪部智祛財產局員工消費合作社印製 五、發明說明(1(3) 關内邵存取資料之外。雖然在内部網路被連接到網際網路 1 1 1的地方的諸多防火牆都完美地足以使局外人(0Uts丨ders) 無法在内部網路中存取資料,可是它們不能使局中人 (insiders)無法存取該資料。譬如説,可能就像公司防備其 人事資料不受其雇員影響與防備該資料不受局外人影響一 樣重要。同時’公司可能想要使有權存取網際網路n丨資 訊的任何人可以很谷易地存取:在諸多内部網路丨〇 3其中 之一網路中之一電腦系統上’它的全球資訊網網站。 一種針對由虛擬專用企業内部網路所引起諸多安全性問 題的解決方法是:使用防火牆將諸多内部網路加以細分, 以及防備内部網路不受經由網際網路而未經授權就存取資 訊的影響。現代存取過濾器107皆被設計用來防備内部網 路之周界(perimeter)不受未經授權就存取資訊的影響:並 且,一般説來,每個網際網路連接才只有一個存取過濾器 10 7。若打其將諸多存取過據器使用内部網路内;則將會 有它們更多的存取過濾器,因而使用多重現代存取過濾器 1 07的虛擬專用網路並不容易規模可伸縮性,那就是:在 具有小量存取過濾器的虚擬專用網路中,諸多存取過濾器 並不是一項嚴重的負擔:而在具有大量存取過濾器的網路 中,它們則是一項負擔。在標題爲”使用在存取過濾器2〇3 中的諸多技術之通則"章節之前的本專利申請案之一部份 中所描述的存取過濾器,實際上解決了先前技藝存取過濾 器的規模可伸縮性(scalability)問題;於是,建構具有大量 存取過濾器的網路就變得更爲容易。 -13- 本纸張尺度適用中舀國家標準(CMS)A4規格(210 x 297公发) (請先閱讀背面之注意事項再填寫本頁} --------訂--------*線丨 經濟部智慧財產局員工消費合作社印製 4 ^83 8 7'All internal training channels have been combined into a single-virtual private enterprise intranet. The access protection system that belongs to the Internet is a feature of security. Do n’t latch 4… At this time, except for -12 -This paper standard is applicable to 0 standard (CNS) A4 specifications (210 X 297 public love) 4483 8 7 A7 B7 Inside Shao access data. Although many firewalls where the internal network is connected to the Internet 1 1 1 are perfect enough to prevent outsiders (0Uts 丨 ders) from accessing the data on the internal network, but they Do not make it impossible for insiders to access the information. For example, it may be as important as a company to prevent its personnel data from being affected by its employees and to prevent it from being affected by outsiders. At the same time, 'the company may want to empower Anyone who accesses the Internet n 丨 information can easily access it: on one of the many intranets, one of the computer systems' its World Wide Web site. Caused by a dedicated corporate intranet The solution to many security problems is to use firewalls to subdivide many intranets and to protect the intranet from unauthorized access to information via the Internet. Modern access filters 107 are designed The perimeter used to protect the intranet from unauthorized access to information: and, generally speaking, there is only one access filter per Internet connection 10 7. If you hit it Many access registers use the intranet; there will be more access filters for them, so virtual private networks using multiple modern access filters 107 are not easy to scale, that is : In a virtual private network with a small number of access filters, many access filters are not a serious burden: in a network with a large number of access filters, they are a burden. In The access filter described in "General Principles of Many Techniques Used in Access Filters 203" in the section of this patent application before the chapter actually solves the problem of prior art access The scalability of the device (scalability); therefore, it becomes easier to build a network with a large number of access filters. -13- This paper standard applies the China National Standard (CMS) A4 specification (210 x 297 public hair) (Please read the notes on the back before filling out this page} -------- Order -------- * Line 丨 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 4 ^ 83 8 7

AT B7 五、發明說明(11 ) 在關於本專利申請案之第—部份中所描述的存取過渡器 之進一步運作中,已經變得顯而易見的是,若能將技術通 用化’則執行存取過濾器2〇3中之存取核對所發展出的諸 多技術應該更爲有用:若它們能夠使用在與正在丨p層級或 網際網路通信協定層級處操作之存取過濾器不同的上下文 中’且若使它們能夠加以擴充:則使得決策能夠加以制 定,不但針對存取資訊集,並且針對可能針對可經由一電 腦系統存取資訊的一種實體而執行的任何行動;使得使用 者群組能夠包括可經由一電腦系統而執行一項行動的任何 種類之實體;並且使得資訊集能夠變成資源集(res〇urce sets),其中一項資源是能夠經由—電腦系統而控制的任何 實體。進-步變得顯而易見的是:若允許決策包括一種時 間组件(temp〇ra丨component),譬如説,—種只有在非工 時間期間才允許某-使用者群組存取某些資源的組件,^ 決策應該更爲有用;並且,對能夠使諸多屬性與—項揾汰 打怎樣執行決策之行動的決策有關聯也應該是有益的。处 如,一項決策可能不但載明能夠存取一已知資源之一已= 使用者群組的成員,並且載明打算用於存取操作之網路: 務的類別(class)。於是,此處所披露的本發明之—目 是:提供針對通用化存取核對的技術,以及進一步提供2 中時間組件和屬性都可能與決策有關聯的決策。疋^、其 發明概要 本發明藉由一種決策施行系統來達到前述目的,在該 統中,在以下兩個組件之間共享決策施行之工作 -14- 本紙張尺度適用巾S國豕標準(CNS)A4規格(9】〇 x 297公发) f __丁 I__I__ — III — I---I I 1 I * I i . — I I I I - — — ll — ιί» I (請先閲讀背面之注音?事項再填鸾本頁} 4483 8 7 A7 B7五、發明說明(12 ) 經濟部智慧財產局員工消費合作社印" 包括可擴允決策資料庫之_決策伺服器,α及—決策施行 器(poIicy enforcer)。當決策施行器接收由第一實體所提出 (-請求以執行針對第二實體的一項行動時,;夹策施行器 就將該請求傳達到決策伺服器;並且,准若來自決策词服 器之-回應指示:在資料庫中的決策容許行動,才會允許 行動。可能將可擴充決策資料庫加以擴充,以便包^不是 由決策施行器所執行的諸多類塑之行動。因爲如此,所以 決策施行系統能夠藉由以τ方法來處理諸多新行動㈣: 擴充決策資料庫以提供針對那些㈣之決策,以及增加針 對諸多類型之行動的決策施行器。的確,只要行動是由電 腦系統中(-決策施行器所控制,電腦系統就沒有必要執 行該行動。 ‘將決策評估和決策施行加以分離,也有可能使得:決策 施行系統會在決策施行系統所屬之電腦系統的諸多不同層 級處很容易地處理決策施行;並且使得:》策施行器都被 定位遠離決策伺服器。 在另j點中’依據:第一實體之集合,第二實體之集 合,以及$ —集合之—實體可能針對第二集合之-實體執 :的一項行動;將諸多決策加以定義在決策施行系統之-貫施例中。在本實施例中,"行動類型之外,第一實體 類型和第二實體類型都是可擴充的。 在本實施例中,行動屬性可能附屬於第-實體之集合或 f二實體之集合’該行動屬性會決定打算怎樣執行就是決 策之主體(subject)的行動。譬如説,可能將優先級(_出力 -15- <請先閱筇背面之--意事項再填寫本頁) -1'.--- ----線 本纸張尺度適用中國國家標準 297公发) 483 8 7 A7 B7 五、發明說明(13 使之集合’或者將頻寬(―)指定給服務 ,以便包括諸 之蕖合。本實施例的決策資科庫是可擴充的 經潑部智慧財產局員工消費合作社印车 多新行動屬性類型 在本發明的H財,可能將條相屬於決 統之決策資料庫中料h即使當m之行動在^ 情況應該被允許時,若未履行附屬於決策的條件,.則 動也將不被充許。這些條件之一類別是時間條件。例如 能制定一項定義存取資訊的決策,而關於決策之—時間條 件則可旎將決策之有效性(val丨dity)限制於正常營業時間。 追隨著下列闡述和附圖,與本發明有關的本發明之其它 目的及優點對那些熟習於此技藝者而言將是顯而易見的, 其中’· 附圖概述 2附圖概述 圖1是:經由網際網路,用來控制資訊之存取的諸多技 術之總覽(overview); 圖2是:使用納入此處所披露之技術的諸多存取過濾器 之一VPN(虛擬專用網路)之總覽; 圖3是:使用在存取過濾器中的一種存取控制資科康之 總纜; 圖4顯示:在使用納入此處所披露之技術的諸多存取過 濾器之一 VPN中的存取核對和鑿隧道操作; 圖5顯示:由一,·漫遊者"(roamer)存取在VPN中的資訊; 圖6是:使用在定義靈敏度和信賴等級與諸多鑑定和加 1 ! I u I ί I I I j/ ^·-- (請先Μ讀背面之;i意事項再填寫本頁) ί--- -- ^ D1 · I - 1 ti - 1— n I 4 16- ^纸張尺度_巾Θ @家標準(CNS)A4規格(210^297公楚) 448387 A7 經濟部智慧財產局員工消費合作社印製 ____B7__·___五、發明說明(14 ) 密技術之間的關係中的一種表; 圖7是:應用SEND(安全加密網路遞送)技術之一實例; 圖8是:決策建立過程之一流程圖: 圖9顯示:用來定義使用者群組之一顯示圖; 圖1 0顯示:用來定義資訊集之一顯示圖; 圖11顯示:用來定義存取決策之一顯示圖; 圖1 2顯示:用來定義存取過濾器2〇3之一顯示圖: 圖13 A和B都是:定義使用者群組之存取控制資料庫3〇 1 的一部份之一圖表(schema); 圖1 4是:定義資訊集之存取控制資料庫3〇1的一部份之 一圖表: 圖1 5是:定義在VPN中的網站(sites)以及在每個網站處 的伺服器’服務’及資源之存取控制資料庫3 〇 I的一部份 之一圖表; 圖16A和B都是:定義決策之存取控制資料庫3〇1的—部 份之一圖表; 圖1 7A,B,及C都是:定義伺服器之存取控制資料庫3 〇} 的一部份之一圖表; 圖1 8顯示:使用在intraMap(映像内)界面中的顯示圖; 圖1 9顯示:怎樣針對存取控制資料庫3〇丨做出改變; 圖2 0是··存取過濾器203的架構之一詳細方塊圖; 圖2 1是:一種MMF(記憶體映射檔案)檔案2303的結構之 一示意圖; 圖22 :是一種使用SKIP(網際網路通信協定之簡單密翁 -17- 本紙張尺度適用令國國家標準(CNS)A4規格(210 X 297公釐) ~~~ ______- ______ I ί 卜__I___«IT i ____' I ___ — I I i I [ I i · I I I I I I I 4-0 - i- I -厶 ί'·νI (靖先閱t5背面之注意事項再填寫本頁) 4483 87 A7 B7 五、發明說明(15 ) 經濟部智慧財產局員工消f合作社印*·'^ 管理)ii;2疋所發送的訊息之一示意圖; 圖23A,B ’及C都是·使用在—較佳實袍例中之陳f樓 案的一種表; 圖24是:IntraMap界面之—建構例之一示意圖: 圖25是:圖解説明在VPN2〇1中的委託權限_以_) 之一示意圖; 圖26是:一種已經將決策核對和決策施行加以分離的行 動控制系統之一方塊圖; 圖27是:—種具有種種的決策致能(p〇Hcyenab_裝置 的行動控制系統之一方塊圖; 圖28顯示:-種用來定義通用化決策的語法㈣叫· 圖29顯示:在—較佳實施例中的決策資料庫“ο!之總纜; 圖30顯示:決策資料庫测中的諸多屬性和時間間隔之 一建構例: 圖3 1顯示:列示所有已定義時程安排(仏^ 之一視窗:二3、2顯示:*用在一較佳實施例中,用來定義時程安排 規則(一視窗; 圖33顯示:使用在—較佳實施例中,用來將時 用到決策之一視窗; ned schedules) 間間隔應 圖34顯示:使用在―較佳實施例中,用來 性 '一視窗: 圖3 5顯 -------------- 1------訂·--------'線 I、 (請先Μ讀背面之注意事項再填寫本頁) 之 示:使用在—較佳實施财,用來將屬性指定到 -18 - 泰纸張尺度適用中國囵家標準(CNS)A4規格(210 X 297公爱) A7 448387 ____B7_____ 五、發明說明(16 ) 主體之一視窗; 圖3 6顯示:用來顯示和修改在一較佳實施例中之一屬性 定義之一視窗;以及 圖3 7顯示:用來顯示和修改在一較佳實施例中之一特點 定義之一視窗。 在諸多附圖中的參考數字至少都有三個數字。兩個最右 側數字都是在圖内的參考數字;而在那些數字左侧的數字 則都是圖號,在圖中‘·由參考數字所識別的項目最先出 現。譬如說,在圖2中,具有參考數字203之項0最先出現。 闡述 2闡述 下列闡述將首先提供:一些容易規模可伸縮性的存取過 濾器,它們怎樣被用來控制在企業内部網路中的存取操 作,以及它們怎樣能夠用來構築虛擬專用網路之總纜。因 此,闡述將提供:使用在存取過濾器中的存取控制資料 庫;將它改變,進而將那些改變分佈在諸多存取過遽器中 所用的方式;以及個別存取過濾器控制存取操作所用的方 式之細節。 一種具有不會妨礙規模可伸縮性之諸存取過濾器的網路: 圖2 3 A —種具有不會妨礙規模可伸縮性之諸存取過滤器的網 路:圖2 圖2顯示一種虚擬專用網路(VPN)20 1,其中:存取資料 是由被設計用來避免因多重存取過濾器而引起問題的存取 -19 - 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) <請先閱讀背面之注意事項再填寫本頁)AT B7 V. Description of Invention (11) In the further operation of the access transition device described in the first part of this patent application, it has become apparent that if the technology can be generalized, then the storage Many of the techniques developed for access checking in access filter 203 should be more useful: if they can be used in a different context from access filters that are operating at the p or Internet protocol level 'And if they can be extended: they enable decisions to be made not only for access to information sets, but also for any actions that might be performed against an entity that can access information through a computer system; enabling groups of users to Includes any kind of entity that can perform an action via a computer system; and enables information sets to become resource sets, where a resource is any entity that can be controlled via a computer system. It is further obvious that if the decision is allowed to include a time component, for example, a component that allows a user group to access certain resources only during non-working hours ^ Decisions should be more useful; and it should be useful to associate many attributes with decisions that determine how actions are performed. For example, a decision may specify not only access to one of the known resources = a member of the user group, but also the network: class of the service that it intends to use for the access operation. Therefore, the purpose of the present invention disclosed herein is to provide a technique for generalized access checking, and further provide a decision in which both the time components and attributes may be related to the decision.疋. Summary of the invention The present invention achieves the foregoing objectives through a decision execution system. In this system, the work of decision execution is shared between the following two components. -14- This paper standard applies to the national standard (CNS) ) A4 specifications (9) 0x 297 issued f__ 丁丁 I__I__ — III — I --- II 1 I * I i. — IIII-— — ll — ιί »I (Please read the note on the back first? Matters Refill this page} 4483 8 7 A7 B7 V. Description of the invention (12) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs " Including expandable decision database_decision server, α and—decision implementer (poIicy enforcer). When the decision executor receives a request from the first entity (-request to perform an action against the second entity, the policy enforcer passes the request to the decision server; and, if it comes from the decision Servor-response instructions: Decisions in the database allow actions before they are allowed. Actionable decision databases may be expanded to include many types of actions that are not performed by decision implementers. Because So, so decided The execution system can handle many new actions through the τ method: expand the decision database to provide decisions for those actions, and add decision implementers for many types of actions. Indeed, as long as actions are performed by a computer system (- A computer system does not need to perform the action under the control of the decision implementer. 'Separating decision evaluation and decision execution may also make the decision execution system easily handle at many different levels of the computer system to which the decision execution system belongs. Decision execution; and make: "Policy implementers are located far away from the decision server. In another point, 'based on: the set of the first entity, the set of the second entity, and $-the set-the entity may target the second set Zhi-entity execution: an action; many decisions are defined in the implementation of the decision execution system. In this embodiment, in addition to the "action type", the first entity type and the second entity type are both Extensible. In this embodiment, the action attribute may be attached to the set of the first entity or the set of f entities. The dynamic attribute determines how it intends to execute is the action of the subject of the decision. For example, it may be prioritized (_ 出力 -15- < please read the ——Issues on the back of the page before filling in this page) -1 ' .--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- The decision-making information base of this embodiment is an expandable type of action property of the consumer cooperative of employees of the Intellectual Property Bureau of the Ministry of Economic Affairs. The property type of the car is more likely to belong to the decision-making decision database. In the material h, even when the action of m should be allowed in the situation, if the conditions attached to the decision are not fulfilled, the action will not be allowed. One category of these conditions is time conditions. For example, a decision can be made to define access to information, and the decision-time condition can limit the validity of the decision to normal business hours. Following the following description and accompanying drawings, other objects and advantages of the present invention related to the present invention will be apparent to those skilled in the art, in which: "Overview of the Drawings 2 Overview of the Drawings Figure 1 is: via the Internet An overview of the many technologies used to control access to information over the Internet; Figure 2 is an overview of a VPN (Virtual Private Network) using one of the many access filters incorporated in the technology disclosed herein; Figure 3 Yes: an access control cable used in access filters; Figure 4 shows: access check and tunneling operations in a VPN using one of the many access filters incorporated in the technology disclosed herein Figure 5 shows: access to information in a VPN by roamer; Figure 6 is: used to define sensitivity and trust levels with many authentications and additions! I u I ί III j / ^ ·-(Please read the back of the book; fill in this page before filling in this page) ί ----^ D1 · I-1 ti-1— n I 4 16- ^ paper size _ towel Θ @ 家 标准(CNS) A4 specification (210 ^ 297 Gongchu) 448387 A7 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs ____ B7__ · ___ V. Description of the invention (14) A table in the relationship between encryption technology; Figure 7 is an example of applying SEND (Secure Encrypted Network Delivery) technology; Figure 8 is a flow of a decision-making process Figure: Figure 9 shows: a display used to define a user group; Figure 10 shows: a display used to define an information set; Figure 11 shows: a display used to define an access decision; Figure 1 2 display: used to define one of the access filters 203: Figure 13 A and B are: a part of the schema of the access control database 301 that defines the user group Figure 14 is a diagram that defines one part of the access control database 3001 of the information set: Figure 15 is: the sites defined in the VPN and the servers at each site ' Figures 16A and B are: part of a diagram of a part of the access control database 3001 that defines a decision; Figure 17A , B, and C are: a diagram that defines a part of the server's access control database 3 0}; Figure 18 shows: Display diagram used in the intraMap (intra-image) interface; Figure 19 shows how to make changes to the access control database 30; Figure 20 is a detailed block diagram of the structure of the access filter 203 Figure 21 is a schematic diagram of the structure of an MMF (Memory Map File) file 2303. Figure 22 is a simple sim-17 using SKIP (Internet Protocol) -17- This paper applies the national standard of this country (CNS) A4 specification (210 X 297 mm) ~~~ ______- ______ I ί __I ___ «IT i ____ 'I ___ — II i I [I i · IIIIIII 4-0-i- I-厶 ί' · ΝI (Jing first read the precautions on the back of t5 before filling out this page) 4483 87 A7 B7 V. Description of the invention (15) Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs will print the cooperative seal * · '^) ii; A schematic diagram of one of the messages; FIG. 23A, B ′ and C are all a table used in the case of the Chen F Building in the preferred example; FIG. 24 is a schematic diagram of the IntraMap interface—a construction example: FIG. 25 is : A diagram illustrating one of the delegation authority _ to _) in VPN2001; Figure 26 is: a decision has been checked and decided A block diagram of a separate action control system is implemented; Figure 27 is:-a block diagram of various action control systems with various decision enabling capabilities; Figure 28 shows:-a type used to define generalization The grammar of decision making · Figure 29 shows the total cable of the decision database "ο!" In the preferred embodiment; Figure 30 shows an example of construction of many attributes and time intervals in the decision database test: Figure 3 1 display: list all defined schedules (仏 ^ one window: two 3, 2 display: * used in a preferred embodiment to define schedule rules (a window; Figure 33 shows: use In the-preferred embodiment, a window used to make decisions; ned schedules) interval should be shown in Figure 34: used in the "preferred embodiment, used for a window": Figure 3 5 shows- ------------- 1 ------ Order · -------- 'Line I, (Please read the precautions on the back before filling in this page) : Used in—better implementation financial, used to specify the attribute to -18-Thai paper size applies to Chinese family standard (CNS) A4 specification (210 X 297 public love) A7 448 387 ____B7_____ V. Description of the invention (16) A window of the main body; Figure 36 shows: a window used to display and modify an attribute definition in a preferred embodiment; and Figure 37 shows: a window used to display and modify In a preferred embodiment, a feature is defined as a window. The reference numbers in the various figures have at least three digits. The two rightmost numbers are reference numbers in the figure; the numbers to the left of those numbers are the figure numbers. In the figure, the item identified by the reference number appears first. For example, in FIG. 2, item 0 with reference number 203 appears first. Elaboration 2 Elaboration The following elaborations will be provided first: how easy-to-scale scalability access filters are, how they can be used to control access operations in an enterprise intranet, and how they can be used to build virtual private networks Total cable. Thus, the narrative will provide: the access control database used in access filters; ways to change it, and then distribute those changes across many access filters; and individual access filters to control access Details of the method used. A network with access filters that does not prevent scalability: Figure 2 A-A network with access filters that does not prevent scalability: Figure 2 Figure 2 shows a virtual Private Network (VPN) 20 1, of which: the access to data is designed to avoid problems caused by multiple access filters. -19-This paper standard applies to China National Standard (CNS) A4 specifications ( 210 X 297 mm) < Please read the notes on the back before filling in this page)

I 訂---------線, 經濟部智慧財產局員工消費合作社印4·1^ 經濟部智¾財產局員工消費合作社印製 ^4 8,3 8 7 A7 β: 五、發明說明(17) 過濾器所控制。VPN 201是由四個内部網路1 〇3所組成,藉 由網際網路1 2 1將它們彼此連接。也經由網際網路121連接 到VPN 20 I的是:一漫遊者2 1 7,那就是一種電腦系統,該 系統雖然正在由可能存取在企業内部網路20 I中之資料的 人使用者,但是只會藉由網際網路1 2丨連接到諸多内部網 路。每個内部網路I 03都有:許多電腦系統或屬於使用者 的終端機209 ’以及許多伺服器2 1 1 :該伺服器包含:可能 由在諸多電腦系統或終端機209處之使用者,或可能由在 漫遊者2 17處之一使用者所存取的資料。然而,並沒有將 電腦系統或終端機2 0 9 ’或者漫遊者2 1 7直接連接到一伺服 器2 II ;換成是’各自經由一存取過濾器203而加以連接, 使得:由在使用者系統處之使用者所提出針對伺服器上之 資料項的所有查詢(references)至少都會通過一個存取過遽 器203。於是,使用者系統2〇9(i)被連接到網路2i3(i),該 網路被連接到存取過濾器203(a);而词服器2 u (丨)則被連接 到網路215(i) ’該網路也被連接到存取過濾器2〇3(a),因而 由在使用者系統209(i)處之使用者所做出針對存取飼服器 2 1 1⑴上之另料的任何嘗試都會通過存取過遽器2〇3(a),在 該處,若使用者無權存取資料,就會被拒絕。 既然VPN 20 I具有任何规模的大小,就會有—相當數目 的存取過濾器203 :因此,將會立即發生按規模伸縮 (scaling)問題。存取過濾器2〇3會避免這些問題,是因爲它 們都是根據下列原理加以設計的: •分佈型存取控制資料庫。每個存取過濾器2〇3都有它 -20- 本纸張尺度滷用中固國家標準(CNS)A4規格(210 * 297公釐) ---------------------訂·--------線 t l· (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 448387 A7Order I --------- line, printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4.1 · ^ Printed by the Ministry of Economic Affairs ¾ printed by the Consumer Cooperatives of the Property Bureau ^ 4 8,3 8 7 A7 Explanation (17) Controlled by filter. VPN 201 is composed of four internal networks 103, which are connected to each other via the Internet 1 2 1. Also connected to VPN 20 I via Internet 121: a roamer 2 1 7 is a computer system, although the system is being used by people who may access data in the corporate intranet 20 I, But it will only connect to many intranets through the Internet 1 2 丨. Each intranet I 03 has: many computer systems or terminals 209 ′ belonging to the user, and many servers 2 1 1: the server includes: users may be located in many computer systems or terminals 209, Or data that may be accessed by one of the users in the roamer 2-17. However, the computer system or terminal 2 0 9 'or the rover 2 1 7 are not directly connected to a server 2 II; instead, they are each connected via an access filter 203, so that: All queries made by a user at the user system for data items on the server will pass through at least one accessor 203. Thus, the user system 209 (i) is connected to the network 2i3 (i), which is connected to the access filter 203 (a); and the servlet 2 u (丨) is connected to the network Road 215 (i) 'The network is also connected to the access filter 203 (a), so it is made by the user at the user system 209 (i) to access the feeder 2 1 1⑴ Any other attempt above will pass through the access device 203 (a), where the user will be denied if he does not have access to the data. Since VPN 20 I is of any size, there will be-a considerable number of access filters 203: therefore, scaling problems will occur immediately. Access filters 203 avoid these problems because they are designed based on the following principles: • Distributed access control database. Each access filter 203 has it. -20- This paper is standard for the national solid (CNS) A4 specification of halogenated paper (210 * 297 mm) ------------- -------- Order · -------- Line tl · (Please read the precautions on the back before filling out this page) Printed by the Employee Consumption Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 448387 A7

---~~~-II 五、發明說明(18)--- ~~~ -II V. Description of the Invention (18)

自己的存取控制資科庫拷貝,用來控制存取在VPN 中的負料。將在資料庫之-拷貝中所做的改變傳 播到所有其它的拷貝s =:^管理。可能委託任何數目的管理員對系統之諸 子$ σ負有貴任。所有管理員可能會同時執行他們的 工作。 刀佈J存取杻制。存取控制功能都是在近端 存取過濾益203處加以執行的。那就是,在客戶機與 飼服备又間的路徑中的第一存取過濾器2〇3會決定; 存取操作是否被容許;而在路徑中的諸多隨後存取過 遽益則不會重複由第—存取過濾器所執行的存取核對。 端對端加密(end-to-end encryption)。加密發生在近端存 取過/慮器與可能的最遠加密端點(endp〇int)之間。此端 點不是資訊伺服器本身,就是遠端(far_end)存取過濾 器203-最後在從客戶機到伺服器之路由中的那個。動 態隧道都是根據目前網路路由選擇(routing)條件加以 建立的。 可適性加密和鑑定。根據正在被傳送的資訊靈敏度, 將可變加密等級和鑑定要求應用到通過VPN的通信量 (traffic) ° 將所有的這些設計觀點更加詳細地討論於下。 此時應該指出的是,可能以任何方式來建構存取過遽4 203,該方式保證:由可能未經授權就存取該資料的諸多 使用者所提出針對在VPN 20 1中之資料的所有查詢都會通 -21 - 本纸張尺度適用中國國家標準(CNS)A4規格(21〇χ297公 ^-----------------4 J (请先閱讀背面之注急事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 ^48387 A7 五、發明說明(19 ) 過-存取過滅器203。在-較佳實施例中,存取過;慮器2〇3 被建構在一词服器上’並且在由邀_^公司(Micr〇s〇ft Corporation)所製造的Windows NT®(新科技版本的視窗軟 體)作業系統下運作。在其它實施例中,存取過濾器2们可 能被建構作爲一種作業系統之組件,及/或可能被建構在 VPN 201中之一路由器(router)中。 分佈型決策資料庫:圖3 3分佈型決策資料庫:圖3 每個存取過濾器203都有存取控制資料庫3(Μ之—拷貝, 它保時了與在VPN 2〇1中之存取控制有關的所有資料。如 圖2中之存取過濾器203(a)所顯示的一個存取過滤器,它 具有存取控制資料庫301之一主拷貝205。因爲如此,所以 將存取過濾器203(a)稱爲:主決策管理程式(Master ρ〇ι_ Manager)。主拷貝2〇5是:被用來初始化(initiaUze)—些新 存取過濾器203或替換已受損存取控制資料庫3〇1的那個。 主決策管理程式電腦的備用裝置是存取過濾器2〇3(b)。備 份拷貝(backup) 207是主拷貝205之一鏡像。最後,報表管 理&式209包括用來產生報表的軟體:該報表係來自存取 控制資料庫301中的資訊,以及來自從所有其它存取過濾 器203中所獲得的記綠(丨〇gs)。存取控制資料庫3〇丨的任何 拷貝可能會被必須這麼執行存取操作的任何使用者所改 變:就像稍後將要更加詳細描述的那樣,將任何這樣的改 變,首先傳播到主決策管理程式2〇5,然後再到虛擬專用 網路20 1中的所有其它存取過濾器2〇3。 -22- 本紙括尺度適財® @家標準(CNS)Ai}規格伽x 297公爱) 7 ---------訂--------- (請先閱讀背面之注意事項再填寫本頁) ^48 3 8 7 經濟部智慧財產局員工消費合作社印製 Λ7 B7 五 '發明說明(2〇 ) 圖3是:存取控制資料庫3〇1 —概念性總覽^資料庫的主 要功能是對來自存取過濾器2〇3之一存取請求3〇9作回應, 破存取過濾器利用一種該請求是否將被准許或拒絕的指示 3 11來識別使用者和資訊資源。若下列兩者都成立,則該 請求將被准許: •使用者屬於一使用者群組,其中資料庫3 〇 1指示:可 存取資訊資源所屬之―資訊集;以及 •該請求具有一種至少是與屬於資訊資源之靈敏度等級 一樣鬲的信賴等級。 每位使用者均屬於一個或更多使用者群組,而每個資訊 資源則均屬於一個或更多資訊集:若使用者所屬的—些使 用者群組中沒有一個被拒絕存取資訊資源所屬之—資訊 木,以及使用者所屬的任何使用者群组被容許存取資訊資 源所屬的任何資訊集;則使用者可能存取資訊資源,假若 iS請求具有必要之信賴等級的話。 資源之靈敏度等級只是指示著用來存取資源所需的作賴 等級之一數値。就大體而論,需要保護資訊資源 、 靈敏度等級愈高。請求之信賴等級具有許多組成部份··、 *用來識別使用者之識別技術的信賴等級:譬如却 _ ^ * ^fc. 由令牌來識別使用者具有一種比藉由I p位址來識别B 用者還高的信賴等級。 使 •由經由網路之存取請求所採取路徑的信賴等級;兹』 T如 説’包括網際網路的路徑具有一種比只有包括—收内 部網路的路徑還低的信賴等級。 -23- 本纸張尺度適用中國國家標準(CNS〉A4規格(2^x297公发) ------------- I * I---1----*1-11· i ----------- 1 V t請先閱讀背面之庄意事項再填寫本頁) A7 448387 ____B7 五、發明說明(21 ) 若對存取請求加以加t,則使用加密技術的信 級;加密技術愈強,信賴等級愈高。 ' 將識別技術的信賴等級和路徑的信賴等級各別考慮。然 而,路徑的信賴等級可能會受用來加密存取請求之加宓; 術的信賴等級所影響。若利用一種其信賴等級高於路 一部份的信賴等級的加密技術而對請求加以加密,則路栌 之一部份的信賴等級被增加到加密技術的信賴等級。= 是,若路徑之一部份的信賴等級小於資源之靈敏度等級所 需要的;則藉著利用一種具有必要之信賴等級的加密技銜 來加密存取請求,就能夠解決問題。 可能將包含於資料庫30 1中的資訊分成六大類: 使用者識別資訊3 13,它會識別使用者; 使用者群组3丨5,它會定義使用者所屬的群组; 貝訊貪源3 2 0 ’匕會疋義蒙受保護的一些個別資訊 項’並且載明在何處找到它們; 資訊集3 2 1 ’它會定義資訊資源之群組; 信賴等級資訊323,它會載明資訊資源之靈敏度等級 以及使用者識別和網路路徑的信賴等級;以及 決策資訊303,它會依據使用者群組和在VPN 201中的 諸多物件(objects)來定義存取權利。 將決策資訊進一步分成:存取決策307,管理決策305, 以決策制定者決策306。 存取決策307會定義由使用者群组存取資訊集的權 利, -24- ^紙張尺度適用令國國家標準(CNS)A4規格⑵〇 X 297公爱) ------------------------訂·--------t ί » rrsp先閱璜背面"达意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印裳 448387 經濟部智慧財產局員工消費合作社印*''《 A; B7 五、發明說明(22 ) .官理決策305會足義使用者群組定義/则除/修改在咖 加:之諸多物件的權利β在諸多物件中則有:存取 決策,資訊集,使用者群組,在νρΝ 2〇1中的位置, 伺服器,及服務:以及 决策制定者決策306會定義使用者群组制定針對資訊 集之存取決策的權利。 載明在資料庫3CH之管理決策和決策制定者決策兩個部 份中的使用者群组都是管理員之使用者群组。在νρΝ2〇ι 中,藉著定義管理員群组以及在資料庫3〇丨中他們管轄的 物件來委託管理權限(administrative auth〇rity)。當然,一 既定使用者可能是一般使用者群组3 17和管理使用者群组 319兩者中之一成員。 使用者識別 3使用者識別 使用者群组利用使用者識別資訊3丨3來識別他們的成 員。識別資訊藉由一套可擴充識別技術來識別它的使用 者。目別’這些識別技術包括:X.509號證書(certificates), Windows NT網域識別,鑑定令牌,以及丨p位址/網域名 稱。用來識別使用者之識別技術種類會決定識別之信賴等 級。 在需要強有力識別使用者或與存取過濾器203通信之其 它實體的地方’ VPN 2〇1就會使用:由昇陽微系統公司 (Sun Microsystem,Inc.)所發展出的"網際網路通信協定之 簡單密输管理"(Simple Key Management for Internet -25- 本纸張尺度適用中固國家標準(CNS)A4規格(210 X 297公发) I I ____II____ 」 ______ I I T______ .?4J I —-*5°· Ϊ I ί (請先閱讀背面之注意事項再填寫本頁) 448387 A7 B? 五、發明說明(23 )Own copy of the access control resource library to control access to the load in the VPN. The changes made in the -copy of the database are propagated to all other copies s =: ^ management. Any number of administrators may be entrusted with the responsibility of the children of the system, $ σ. All administrators may perform their work at the same time. Knife cloth J access control. The access control functions are performed at the near-end access filtering benefit 203. That is, the first access filter 203 in the path between the client and the server will determine; whether the access operation is allowed; and many subsequent accesses in the path will not benefit. Repeat the access check performed by the first access filter. End-to-end encryption. Encryption occurs between the near-end cache / cache and the farthest possible encryption endpoint (endpoint). This endpoint is either the information server itself, or the far-end access filter 203-the last one in the route from the client to the server. Dynamic tunnels are established based on current network routing conditions. Adaptive encryption and authentication. Depending on the sensitivity of the information being transmitted, variable encryption levels and authentication requirements are applied to the traffic through the VPN ° All of these design points are discussed in more detail below. It should be pointed out at this time that the access information 4 203 may be constructed in any way, which guarantees that all of the data proposed in VPN 20 1 are proposed by many users who may access the data without authorization. Query Metropolis-21-This paper size is applicable to Chinese National Standard (CNS) A4 (21〇χ297 公 ^ ----------------- 4 J (Please read the Please fill in this page for urgent matters) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ 48387 A7 V. Description of the invention (19) Over-access over-extinguisher 203. In the preferred embodiment, over-access; Server 2003 is built on a server and operates under the Windows NT® (new technology version of Windows software) operating system manufactured by Microsft Corporation. In other implementations In the example, the access filter 2 may be constructed as a component of an operating system, and / or may be constructed in a router in VPN 201. Distributed decision database: Figure 3 3 Distributed decision data Library: Figure 3 Each access filter 203 has an access control database 3 (M of-copy, it is time All data related to access control in VPN 2001. An access filter shown in access filter 203 (a) in FIG. 2 has a master copy of an access control database 301 205. Because of this, the access filter 203 (a) is called: Master Decision Manager (Master Decision Manager). The master copy 20.5 is: used to initialize (initiaUze)-some new access filters Device 203 or the one that replaces the damaged access control database 301. The backup device of the master decision management computer is an access filter 203 (b). A backup 207 is one of the master copies 205 Finally, the report management & formula 209 includes the software used to generate the report: the report is derived from the information in the access control database 301 and the green records obtained from all other access filters 203 〇gs). Any copy of the access control database 3〇 丨 may be changed by any user who must perform such an access operation: as will be described in more detail later, any such changes are first propagated To the main decision management program 205 Then go to all other access filters 203 in the virtual private network 20 1. -22- This paper includes the standard suitable financial ® @ 家 标准 (CNS) Ai} size gamma x 297 public love) 7 ---- ----- Order --------- (Please read the notes on the back before filling out this page) ^ 48 3 8 7 Printed Λ7 B7 Five 'Invention Note by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ( 2) Figure 3 is: Access control database 3001 — a conceptual overview ^ The main function of the database is to respond to an access request 3009 from one of the access filters 203, breaking the access filter The server uses an indication of whether the request will be granted or denied 3 11 to identify users and information resources. The request will be granted if both of the following are true: • The user belongs to a user group, where the database 3 01 indicates that the accessible information resource belongs to the information set; and It is the same level of trust as the sensitivity level of information resources. Each user belongs to one or more user groups, and each information resource belongs to one or more information sets: if the user belongs to-none of the user groups is denied access to the information resource Belonging to—The information tree and any user group to which the user belongs are allowed to access any information set to which the information resource belongs; the user may access the information resource if the iS request has the necessary level of trust. The sensitivity level of a resource is only one of several levels of dependence required to access the resource. In general, information resources need to be protected and the higher the sensitivity level. The requested trust level has many components ... * The trust level of the identification technology used to identify the user: For example, _ ^ * ^ fc. Identifying a user by a token has a higher value than by using an IP address. Recognize that user B also has a high level of trust. • The trust level of the path taken by the access request via the network; “T” said that the path including the Internet has a lower level of trust than the path including only the internal network. -23- This paper size applies to Chinese national standards (CNS> A4 size (2 ^ x297)) ------------- I * I --- 1 ---- * 1- 11 · i ----------- 1 V t, please read the dignity on the back before filling this page) A7 448387 ____B7 V. Description of Invention (21) If t is added to the access request, then Trust level using encryption technology; the stronger the encryption technology, the higher the trust level. '' Consider the trust level of the identification technology and the trust level of the path separately. However, the trust level of the path may be affected by the trust level used to encrypt the access request. If the request is encrypted using an encryption technology whose trust level is higher than the trust level of the road part, the trust level of part of the road line is increased to the trust level of the encryption technology. = Yes, if the trust level of a part of the path is less than required for the sensitivity level of the resource; then the problem can be solved by encrypting the access request with an encryption technology with the necessary trust level. It is possible to divide the information contained in the database 30 1 into six categories: user identification information 3 13 which will identify the user; user groups 3 5 and 5 which will define the groups to which the user belongs; 3 2 0 'Dagger will protect some of the individual information items that are protected' and indicate where to find them; Information set 3 2 1 'It will define groups of information resources; Trust level information 323, it will contain information The sensitivity level of resources and the trust level of user identification and network paths; and decision information 303, which defines access rights based on user groups and many objects in VPN 201. The decision information is further divided into: access decision 307, management decision 305, and decision maker decision 306. The access decision 307 will define the right to access the information set by the user group. -24- ^ The paper size applies the national standard (CNS) A4 specification (〇X 297 public love) --------- --------------- Order · -------- t ί »rrsp first read the back of the quotation " problems and then fill out this page) Employee Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs Yinshang 448387 Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs * "A; B7 V. Invention Description (22). Official Decision 305 will be sufficient to define / exclude / modify user groups in Kajia: many Object rights β among many objects are: access decision, information set, user group, position in vn 2 201, server, and service: and decision maker decision 306 defines user group The right to make access decisions to information sets. It is stated that the user groups in the management decision and decision maker decision of the 3CH database are user groups of administrators. In νρΝ200ι, administrative authority is delegated by defining the administrator group and the objects they govern in the database 30 丨. Of course, a given user may be a member of both the general user group 317 and the management user group 319. User identification 3 User identification The user group uses user identification information 3 丨 3 to identify their members. Identification information identifies its users through a set of extensible identification technologies. These identification technologies include: X.509 certificates, Windows NT domain identification, authentication tokens, and IP addresses / domain names. The type of identification technology used to identify the user determines the level of confidence in the identification. Where strong identification of users or other entities communicating with the access filter 203 is required, VPN 2000 will be used: "Internet" developed by Sun Microsystems, Inc. (Simple Key Management for Internet -25- This paper standard applies to China Solid State Standard (CNS) A4 (210 X 297)) II ____II____ ”______ II T______.? 4J I —- * 5 ° · Ϊ I ί (Please read the precautions on the back before filling this page) 448387 A7 B? V. Description of the Invention (23)

Protocols’簡稱SKIP)軟體通信協定3該通信協定會管理: 公用密鑰(public key)交換,密鑰鑑定,以及對話二^。藉 由-種從正在交換資料之各方的公用和專用密鑰中所產: 的傳送密鑰(transport key)來執行對話加密。公用密鑰都包 括在X.509號證書中,該證書都是在佶用捕 己 |疋仕便州通%爲"證書發現 通信協定"(Certificate Discovery Pr〇t〇c〇1,簡稱 CD門之一 分離通信協定的㈣各方之間交換的。除了已加密訊息之 外,一種使用SKIP來加密的訊息還包括:針對訊息之—已 加密傳运密鑰,以及針對資料之來源和目標之證書的識別 符(identifiers;^訊息接受者使用針對訊息來源之證書的識 別符來指出針對來源之公用密鑰的位置;並使用其密鑰和 來源之公用在·餘’對傳送密餘加以解密:進而使用傳送密 鑰,對訊息加以解密。SKIP訊息是有自行鑑定性(self_ authenticating) ’從某種意義説來,它包含一種包括分包資 訊内容之密碼摘要(cryptographic digest)的鑑定標題,而任 何種類的修改將會使得摘要不正確。就關於SKIP的細節而 言,請參看由ϋ沙·阿濟芝(Ashar Aziz)和馬丁·斐特森 (Martin Patterson)所發表的”網際網路通信協定之簡單密鑰 管理(SKIP)’’專文,該專文能夠上網獲知:丨99g年2月28曰,網 址爲 http://www.skip.org/inet-95.html。就關於 X.509 號證書 的細節而言’請參看能夠上網獲知的描述:丨997年9月2日, 網址爲http://www.rnbo.eom/PROD/rmadiUo/p/pdoc2.htm.。 在VPN 201中,SKIP也會被諸多存取過濾器203所使用, 以便識別它們自己和在VPN中的其它存取過遽器203 ;進 -26- 本纸張尺度適用中國國家標準(CNS)A‘i規格(210x 297公釐) (請先閱續背面之注意事項再填寫本頁) *k 烴濟部智慧財產局員工消費合作社印製 4483 8 7 A7 __ B7 經濟部智慧財產局員工消費合作社印ic? 五、發明說明(24 ) 而在需要加密的地方,對TCP/IP對話加以加密。當它們正 在執行存取核對時,諸多存取過濾器203也能夠使用針對 SKIP密鑰之證書來識別使用者。這樣一種識別方法是特別 値得信賴的’因而具有一種相當高的信賴等級β這種藉由 證書的識別方法之一用途是:針對,,漫遊者,> 2 17之値得信 賴的識別方法。Χ.509號證書能夠被使用於使用者識別, 是因爲:它們使密鑰資訊與關於使用者的資訊有關係。 存取過濾器203使用下列來自證書的資訊撋位: 屆滿日期在此日期之後,證書就無效。 • 公用密鑰:一種公用一專用密鑰對的公用半對密鑰, 就像使用在Conclave(秘密會議客户軟體)所使用之基 於 SKIP 密碼術(SKIP-based cryptography)中的那樣。 • 證書當局(Certificate Authority)簽字:與發行證書之當 局有關聯的區別名稱。 • 證書序號。 ’ 主體名稱:發行證書到達之實體名稱。 主體名稱包括下列子糊位(在括孤内的代表字是獨位之 一般縮寫): ’共用名稱(CN):主體之既定名稱,譬如説是J〇hn & Public 0 •國家(C):主體所在之國家。國家代碼都是載明於 X.509號規範(specification)中的2個字母代碼。 •所存地(L):主體所在之位置。此櫊位通常是主體所在 之城市,但可能被使用任何與位置有關的數値。 -27- 本紙張尺度適用中國國家標準(CNS>A4規格(210 X 297公釐) ^^1 I - ϋ4 i^i ^^1 ^^1 I n- r t— 1^1 ^^1 ^^1 n ^^1 .,I ^^1 »n —fl— ^^1 _ (請先閱讀背面之注意事項再填寫本頁) 448387 經濟部智慧財產局員工消費合作社印製 A7 _________B7___ 五、發明說明(25 ) •组織(〇):主體所屬之組群。此攔位通常是組織之名 稱。 •组織單位(ου):主體之组織單位,此欄位通常是主體 之郅門,譬如説,業務部|,。Χ·5〇9號證書容許這些 欄位中高達四個攔位存在。 和諸多存取過濾器203 —起使用的證書當局會發行具有 所有’這些櫚位的證書〇並且,四個〇 U欄位可能被用來定 義附加分類。在證書中用來描述使用者的資訊皆可供資料 庫30 1之管理員利用,當定義使用者群組時就加以使用。 若證書中的資訊正確地反映企業的組織結構:則證書將不 但會識別使用者,而JL會顯巾使用者㉟合於企業組織的所 在;進而達到的程度是,在資料庫301中的使用者群組會 反映:組織結構,使用者所屬之使用者群組。 就像稍後將要更加詳細説明的那樣,其中可能定義諸多 使用者群組之成員的—個方法是:藉由”證書匹配準則,, (certificate matching criteria),該準則定義屬於一既定使用 者群组之成員的證書必須具有的欄位數値。證書匹配準則 可能是基於與所需一樣少或一樣多的上述襴位。譬如說二 針對工程使用者群组的證書匹配準則可能是:組織櫚位和 載明工程部的组織單位欄位。識別使用者之其它資訊也可 能被使用來定義諸多使用者群組之成員D 資訊集 3資訊集 貧訊集保持諸多個別資訊資源的收集資訊。一項資源可 -28- '仏尺夜適用中國國家標準(CNS)A4規格(210 X 297公爱) ---- ^---------k.--------訂---------線—— (锖先Μίί背&之ii意事項再填寫本頁) 48387 A7 B7 五、發明說明(26 ) 能與一個別www(全球資訊網)網頁或新聞群组(newsgro叩) —樣小’但它最常是由··網路目綠樹(Web directory tree) 及其内谷,FTP帳户,或主要Usenet(新聞網)新聞分類所 组成。在圖2之諸多伺服器其中之一伺服器中,顯示有兩 個資訊集:2 19⑴和(k)。雖然存取控制資料庫3〇 1之管理員 理應芫全決定:何種資訊被包括在一資訊集中:可是,在 一既定集合中的資訊通常就是:與課題和有意收看者 (audience)兩者都有關係的資訊。針對公司之資訊集實例Protocols' (short for SKIP) software communication protocol 3 This communication protocol will manage: public key exchange, key authentication, and dialogue 2 ^. Session encryption is performed by a transport key generated from the public and private keys of the parties that are exchanging data. The public key is included in the X.509 certificate, which is used to capture oneself | Certificate Discovery Communication Protocol " (Certificate Discovery Pr0t〇c〇1, referred to as One of the CD gates is a separate communication protocol exchanged between parties. In addition to encrypted messages, a type of message encrypted using SKIP includes: for the message—the encrypted transport key, and for the source and Identifiers of the target's certificate; ^ The recipient of the message uses the identifier of the certificate of the source of the message to indicate the location of the public key of the source; and uses its key and the source of the public key to send the secret Decryption: The message is then decrypted using the transmission key. SKIP messages are self-authenticating. 'In a sense, it contains an authentication that includes a cryptographic digest of the subcontracted information content. Title, and any kind of modification will make the abstract incorrect. For details on SKIP, see Ashar Aziz and Martin The article "Simple Key Management of Internet Protocols (SKIP)" published by Martin Patterson, which can be accessed on the Internet: 丨 February 28th, 99g, URL: http: // www. skip.org/inet-95.html. For details on the X.509 certificate, 'see the description available on the Internet: September 2, 997, URL: http: //www.rnbo.eom/ PROD / rmadiUo / p / pdoc2.htm .. In VPN 201, SKIP is also used by many access filters 203 to identify themselves and other access filters 203 in the VPN; This paper size applies to China National Standard (CNS) A'i specifications (210x 297 mm) (please read the precautions on the back of the page before filling out this page) * k Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Hydrocarbons 4483 8 7 A7 __ B7 Intellectual Property Cooperative Association of the Intellectual Property Bureau of the Ministry of Economic Affairs of the People's Republic of China. V. Description of Invention (24) And where encryption is needed, TCP / IP conversations are encrypted. When they are performing access check, many access filters The device 203 can also use a certificate for the SKIP key to identify the user. Such an identifying party It is particularly trusted 'and therefore has a relatively high level of trust β. One of the uses of this identification method by certificate is to: ,,, roamer, > 2 17 of the trusted identification methods. X.509 Certificates can be used for user identification because they associate key information with information about the user. The access filter 203 uses the following information bits from the certificate: Expiration date After this date, the certificate is invalid. • Public key: A public half-pair key that uses a private key pair, as used in Conclave (SKIP-based cryptography). • Signature of Certificate Authority: A distinguished name associated with the authority issuing the certificate. • Certificate serial number. ‘Subject name: The name of the entity to which the certificate was issued. The subject name includes the following sub-positions (the representative characters in parentheses are the general abbreviations for the unique position): 'Common name (CN): the established name of the subject, such as John & Public 0 • Country (C) : The country where the subject is located. The country code is a two-letter code specified in the X.509 specification. • Location (L): The location of the subject. This location is usually the city where the subject is located, but any location-related data may be used. -27- This paper size applies to Chinese national standard (CNS > A4 size (210 X 297 mm) ^^ 1 I-ϋ4 i ^ i ^^ 1 ^^ 1 I n- rt— 1 ^ 1 ^^ 1 ^^ 1 n ^^ 1., I ^^ 1 »n —fl— ^^ 1 _ (Please read the notes on the back before filling out this page) 448387 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 _________B7___ 5. Description of the invention (25) • Organization (〇): The group to which the subject belongs. This block is usually the name of the organization. • Organization unit (ου): The organizational unit of the subject. This field is usually the door of the subject, such as Say, the business department certificate, X · 509 allows up to four blocks in these fields. The certificate authority used with many access filters 203 will issue certificates with all of these bits. In addition, four 0U fields may be used to define additional classifications. The information used to describe users in the certificate can be used by the administrator of the database 301 and used when defining user groups. The information in the certificate correctly reflects the organizational structure of the enterprise: the certificate will not only identify the user, but JL will display it. This is based on the organization of the enterprise; to the extent that the user groups in the database 301 will reflect: organizational structure, user groups to which users belong. As will be explained in more detail later One of the ways in which members of many user groups may be defined is: by "certificate matching criteria," which defines the fields that a certificate that is a member of a given user group must have Numbers. The certificate matching criteria may be based on as few or as many of the above-mentioned niches as required. For example, the two certificate matching criteria for engineering user groups may be: organizational units and organizational units that specify the engineering department Fields. Other information identifying users may also be used to define members of many user groups. D Information set 3 Information set Poor information set holds information collected by many individual information resources. One resource can be -28- Night applicable Chinese National Standard (CNS) A4 specification (210 X 297 public love) ---- ^ --------- k .-------- Order -------- -Line-(锖 先 ΜίίBack & ii) (Write this page) 48387 A7 B7 V. Description of the invention (26) Can be compared with a www (World Wide Web) webpage or news group (newsgro 叩) — as small as it is, but it is most often caused by ... (Web directory tree) and its inner valley, FTP account, or the main Usenet news category. In one of the many servers in Figure 2, two information sets are displayed: 2 19⑴ and (K). Although the administrator of the access control database 301 should make a complete decision: what kind of information is included in an information set: However, the information in a given set is usually: both the subject and the intended audience (audience) Has related information. Examples of company-specific information sets

可能是:HR policies(HR決策),HR Personnel Records( HR 人事&己錄)’以及Public In form at ion(公用資訊)。 存取決策307 3存取決策307 概念上’存取決策307由以下格式之簡單陳述所组成: Engineers allowed access to 工程師 被容許存取 engineering data 工程資料It could be: HR policies, HR Personnel Records, and Public In form at ion. Access decision 307 3Access decision 307 Conceptually, access decision 307 consists of a simple statement in the following format: Engineers allowed access to engineers engineer engineering allowed

Internet allowed access to 網際網路 被容許存取 public web site 公用網路 首欄載明使用者群组:末欄載明資訊集。中間那欄則是 存取決策-容許或拒絕。 資料庫301允許使用者群組和資訊集的分層定義 (hierarchical definition)。譬如説,可能將工程師使用者群 組足義成包括:硬體工程師使用者群组,軟體工程師使用 者群组,以及銷售工程師使用者群组。同樣地,可能將工 程資料資訊集定義成包括:硬體工裎資料資訊集,軟體工 -29- 本纸張尺度適用中囤囿家標準(CNS)A4規格(210x 297公发) {請先閉讀背面之iit事項再填寫本頁) 訂---------線 經濟部智慧財產局員工消費合作社印5衣 ¥觀%77 A7 經濟部智慧財產局員工消費合作社印- --------- B7_五、發明說明(27) 程資料資訊集,以及销售工程資料資訊集。在使用者群組 (層次内,由繼承而獲得存取權利。於是,爲了存取核 對,屬於硬體工程師使用者群組之一使用者也會自動地屬 於工程師使用者群组。在資訊集之層次内,同樣地由繼承 而獲得存取權利。爲了存取核對,屬於硬體工程資料資訊集 (一資訊資源也會自動地屬於工程資料資訊集。於是,若 有—項赋予工程師存取工程資料的存取決策,則成爲组成 工程師的三個使用者群组其中之一使用者群組之一成員的 任何使用者都可能存取:屬於組成工程資料的三個資訊集 其中任何資訊集的任何資訊資源。在使用者群组和資訊集之 定義中使用繼承權(inheritance)會大大地減少在存取控制資 料庫301中所需的存取決策3〇7之數目。例如,在上述實例 中,單一存取決策就賦予所有的工程師存取所有的工程資 料。繼承權也會使得:實際上依據容許存取操作來定義所 有的存取決策是有可能的。繼續上述實例,若有一個不屬 於工私師”的”推銷員"(SaieSpe〇pie)使用者群组,但有一 項賦予该使用者群组存取銷售工程資料的存取決策:則成 爲"推銷員"之一成員的使用者將能夠存取銷售工程資料, 但不是軟體工程資料或硬體工程資料。 . 當然’一位使用者可能屬於一個以上的使用者群組,而 一項資訊資源則可能屬於一個以上的資訊集。也可能會有針 對使用者所屬之各種使用者群组以及資訊資源所屬之各種資 訊集的不同存取決策。當面對既適用於使用者又適用於使用 者正試圖存取之資訊資源的多重存取決策時,存取過濾器2〇3 -30- 本纸張尺度適用t S國家標準(CNS)A4規格(2]0 X 297公釐) ^^1 ϋΈ ^^1 in d 1^1 m I 1·Λ I— 1 1 ' I J— ^^1 i^i I , 1 ΙΛ 言 矣 (請先閉讀背面之注t事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 4483 8 7 A7 B7 五、發明說明(28) 會以一種限制性’而非允許性方式來應用決策: • 若多重決策容許或拒絕一使用者群組存取一·資訊集, 則拒絕存取操作的決策佔優勢。 •若一特定使用者是多重使用者群組之一成員,並且, 多重決策容許或拒絕存取資訊集;則拒絕存取操作的 決策佔優勢。 一使用者屬於何種使用者群組可能會根據用來識別使用 者的識別模式而改變。於是,若根據到當時爲止使用者已 經提供給存取過濾器203之識別模式,並沒有存取決策適 用於使用者所屬之諸使用者群组:則存取過;慮器2〇3可能 嘗識獲得附加識別資訊,並決定:附加識別資訊是否將使 用者安置在有一項關於資源的決策所針對之一使用者群组 中。存取過濾器203可能獲得附加識別資訊,如果: •使用者已經安裝使用者識別客户軟體(User Identification Client,簡稱UIC)(—種會在使用者機器上執 行並將關於使用者的識別資訊提供給存取過濾器2〇3的軟 體)。 • UIC目前正在使用者機器上執行。 .使用者已經使得他的UIC彈出(pop-up),以供進一步鑑 定之用(使用者具有一種致能這項特點的圈選框(check box) ° 若所有這些要求都成立,則存取過;慮器203將會追使使 用者之UIC彈出,並請求另外的識別資訊。將使用者供應 的任何識別資訊加以儲存。在每個新的使用者識別資訊片 -31 - 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公发) 一_____II 丁 I___ I It If 1 I I f ΙΛ. . I , I I · I I 1 I _ 矣, {請先閱讀背面之注意事項再填寫本頁) ^4838 經濟部智慧財產局員工消費合作社印製 Α7 Β7 五、發明說明(29) 段又後,存取過濾器203會執行相同的評估處理過程:直 到獲得將使用者安置在有一項允許或拒絕存取操作決策所 針對之一使用者群组中的識別資訊爲止;或者,直到使用 者放棄其請求爲止,將UIC視窗彈出。 管理決策305 3管理決策305 官理決策3〇5會落實(丨—^咖叫在vpN 2〇丨之存取控制系 统中的諸多物件之管理。包括在物件中的有:使用者群 組,資訊集,存取決策,以及此處所稱的可用資源 (available resources);那就是:服務,伺服器,存取過濾 益,以及组成VPN 201的網路硬體。物件是被—個或更多 《管理使用者群組所管理。管理―既定物件的f理使用者群 組之一成員可能會修改該物件以及它與其它物件的關係, 並可能會制定針對該物件的管理決策。就像稍後將要更加 評細説明的那樣,管理物件的管理使用者群組之一成員可 能會制?針對該物件的管理決策之事實會使得:該成員委 七妆件官理根是可能的。譬如説,管理"硬體工程師"使用 者群組的管理使用者群组之一成員可能會制定:一項將”硬 體工^師"管理權賦予,,硬體工程管理員”使用者群组的管 理決策,藉以將”硬體工程師”管理權委託給”硬體工程管 1男"。應該注意的是:管理資訊集的權利是與制定針對 資訊集之存取決策的權利分開的。—使用者群組有權制定 關於資訊集的存取決策之事實,並不會賦予使用者群組制 疋針對資訊集之管理決策的權利;反之亦然。當一存取過 _ -32- 本紙張尺度適用中關家標準(CNS)A4規格⑵Q χ视 ) I _ 〆《111.------訂·--------1 V 〈靖先閱if背面之注意事項再填寫本頁) ^48387 經濟部智慧財產局員工消費合作社印裂 A7 B? 五、發明說明(3〇 ) ’慮器203首先被建工時,單—内建安全官員(security 〇汀icer) 使用者群組就具有:管轄所有在VPN 201中的物件以及管 轄決策制定者決策306的管理權限。 著官理決策的繼承權 3 -隨著管理決策的繼承權 詹承柢隨著官理決策而運作,相同方法則是:繼承權隨 著存取決策而運作。將諸多使用者群組,資訊集,以及管 理決策所指的可用資源加以分層組織。在使用者群組内, 都是一既定使用者群組的子集合的使用者群组:都在來自 -¾既疋使用者群组的諸多使用者群组之層次中 向下的下-層級處。關於資訊集的情形相同。用與關於存 取決策相同的方式,將繼承權應用在層次内。於是,在使 用者群組層次内,管轄(conir〇丨)一使用者群组之一管理使 用者也會管轄所有的附屬者(subsidiary),包含一些使用者 群組在内。同樣地,關於資訊集層次,管轄資訊集之一管 理使用者也會管轄所有的附屬者,包含一資訊集在内;而 e轄針對--貝況集的管理決策之—管理使用者也會管轄針 對所有已包含資訊集的存取決策。 還有一種可用資源的自然層次。譬如説,層次中之一層 級是:位置。在-既定位置内,在該位置處的諸多词服器 形成向下的下-層級:而在一伺服器内,由伺服器所提供 的諸多服務則形成下一層級。具有可用資源樹之任何層級 之管轄權的管理使用者群組也會管轄所用的較低層級。譬 如説,管理決策將存取過濾器203之管轄權賦予的(諸多) -33- 本紙張尺度適用中固@家浮準(CMS)A4規格(210 X 297公釐) (锖先閱?r背面之泼音?事項再填寫本I > ,--------訂----------線, 448387 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(31 ) =理貝具有針對:在在網站下之所有㈣器 =執行之所有服務,以及由那些服務所支援艮 的管理權利。 $貝原 委託權限:圖2 5 3委託權限:圖2 5 在VPN 201中|託權限是挺容易的,因爲·管理物件 之管理使用者群组的成貝都可能修改該物件 對它的管理決策。譬如說,若—管理使用者群組 訊集1它能夠將資訊集分成兩個子集合,並且制定—此 新的官理決策,該決策賦予兩個其它使用者群组中的每個 使用料組管轄兩個子集合中的—個子集合之管理權限。 圖25顯示委託權限之-擴充實例。在圖25中,使用者 _組和其㈣件都以圓圈表示;決策㈣者決策則以方塊 表:;而決鼓關係則以不同種類的箭頭表示:實線箭頭代 表管理決^點線箭頭代表決策料決策,而虛線箭頭則 代表存取決策。k不25G1之附圖的—部份顯示當正在建立 存取過滤器203時的情形:内建,,安全官員"使用,群组 2503具有管轄所有内建物件25〇5和管轄決策制定者決策 2507之管理權限。"安全官員"使用者群組則的成員都會 使用他們的管理權限,以便:组成物件25〇5之子集合,重 新安排物件層次,以及建立決策制定者決策25〇7。 在標示2508之圖2 5的部、份中,可看出:,,安全官員,,使用 者群組2503之活動的-個活動結果。_,安全官員,,使用者群 組2503之一成員已經建立:―”工程管理員,,管理使用者群 -34- 本纸張尺度適用中®國家標準(CNS)A4規格(210 X 297公釐) -i.·---.----訂,—♦ —.— 線* (請先閱讀背面之注意事項再填寫本頁) 4483 87 經濟部智慧財產局員工消費合作社印製 Α7 Β7 五、發明說明(32) 組2509,一”工程師”使用者群組25 U,以及—”工程資料” 資訊集2 5 1 3 ·’並且已經賦予•,工程管理員"管轄”工程師” ”工程"資料的管理權限。,,安全官員"之成員也已經建立和 策制定者決策2507,使得:”工程管理員”有權制定=針對 程資料"之存取決策,如點線箭頭25 1 0所示。,,工程管理 ”之一成員已經使用該權利來制定:允許工程師25II之成 員存取在”工程資料,·2513中之資訊的存取決策,如虛線箭 頭25 12所示。於是,”安全官員”之成員已經將管轄工程坤 2511 ’工程資料2513 ’以及管轄存取工程資料的管理權限 委託給工程管理員2509。Internet allowed access to the Internet public web site Public network site The first column contains the user group: the last column contains the information set. The middle column is access decision-allow or deny. The database 301 allows a hierarchical definition of user groups and information sets. For example, the engineer user group may be adequately defined to include: a hardware engineer user group, a software engineer user group, and a sales engineer user group. Similarly, the engineering data information set may be defined to include: hardware industrial data information set, software engineering-29- This paper size applies to the Chinese Standard (CNS) A4 specification (210x 297 public) {Please first Close the iit item on the back of the book and fill in this page again.) Order --------- Printed by the Consumers ’Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ¥ 5% 77 A7 Printed by the Employees’ Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs-- ------- B7_ V. Description of invention (27) Process data information set and sales engineering data information set. In the user group (level, access is obtained by inheritance. Therefore, for access verification, a user who belongs to the hardware engineer user group will also automatically belong to the engineer user group. In the information set Within the hierarchy, the same access rights are obtained by inheritance. For access verification, it belongs to the hardware engineering data information set (an information resource also automatically belongs to the engineering data information set. Therefore, if there is-item, it gives the engineer access Engineering data access decisions, any user who is a member of one of the three user groups that make up the engineer may access: any of the three information sets that are part of the engineering data Any information resource of. Using inheritance in the definition of user groups and information sets will greatly reduce the number of access decisions 307 required in the access control database 301. For example, in the example above In the single access decision, all engineers are given access to all engineering data. The inheritance right also allows: All access decisions are possible. Continuing the above example, if there is a user group of "Salesman" (SaieSpe〇pie) that does not belong to the private and private teachers, but one item gives the user group access Decisions on access to sales engineering data: Users who are a member of "Salesman" will be able to access sales engineering data, but not software engineering data or hardware engineering data. Of course, 'a user may belong to More than one user group, and an information resource may belong to more than one information set. There may also be different access decisions for various user groups to which the user belongs and various information sets to which the information resource belongs. When faced with multiple access decisions that apply to both the user and the information resource that the user is trying to access, the access filter 203 -30- This paper standard applies to the national standard (CNS) A4 Specification (2) 0 X 297 mm) ^^ 1 ϋΈ ^^ 1 in d 1 ^ 1 m I 1 · Λ I— 1 1 'IJ— ^^ 1 i ^ i I, 1 ΙΛ Words (please close first (Read the note on the back and fill out this page) Member of the Intellectual Property Bureau, Ministry of Economic Affairs Printed by Consumer Cooperatives 4483 8 7 A7 B7 5. Invention Description (28) Decisions are applied in a restrictive rather than permissive way: • If multiple decisions allow or deny a user group access to an information set, The decision to deny access is dominant. • If a particular user is a member of a multi-user group and multiple decisions allow or deny access to the information set; the decision to deny access is dominant. Which user group the user belongs to may change depending on the recognition mode used to identify the user. Therefore, if according to the recognition mode that the user has provided to the access filter 203 at that time, no access decision applies to The user groups to which the user belongs: then accessed; the filter 203 may try to obtain additional identification information and decide whether the additional identification information will place the user in one of the decisions about a resource User group. The access filter 203 may obtain additional identification information if: • The user has installed User Identification Client (UIC) (a type that will run on the user's machine and provide identification information about the user) Software for access filter 203). • UIC is currently running on the user's machine. The user has made his UIC pop-up for further identification (the user has a check box that enables this feature ° If all these requirements are true, then access The filter 203 will chase the user ’s UIC and request additional identification information. Any identification information supplied by the user is stored. In each new user identification information sheet -31-This paper standard applies China National Standard (CNS) A4 specification (210 X 297) _____II ding I___ I It If 1 II f ΙΛ.. I, II · II 1 I _ 矣, {Please read the precautions on the back before filling in this Page) ^ 4838 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Α7 Β7 V. Description of the Invention (29) After that, the access filter 203 will perform the same evaluation process: until it is obtained that there is a permission Or deny access to the identification information in a user group targeted by the operation decision; or, until the user abandons his request, pop up a UIC window. Management decision 305 3 Management decision 305 Official decision 305 will be implemented (丨 — ^ Ca called the management of many objects in the access control system of vpN 2〇 丨. Included in the objects are: user groups, Information sets, access decisions, and available resources referred to here; that is: services, servers, access filtering benefits, and the network hardware that makes up VPN 201. Objects are managed by one or more "Managed by the management user group. Management-A member of the management user group of a given object may modify the object and its relationship with other objects, and may make management decisions for that object. As will be explained in more detail later, a member of the management user group who manages the object may be controlled? The fact that the management decision for the object will make it possible for the member to assign the official roots to the organization. For example, , Management " hardware engineer " user group management One of the members of the user group may formulate: an item that grants "hardware engineering division" management rights to "hardware engineering manager" users Group management decision to delegate the management right of "hardware engineer" to "hardware engineering manager 1". It should be noted that the right to manage the information set is separate from the right to make access decisions to the information set — The fact that user groups have the right to make access decisions on information sets does not give user groups the right to make management decisions on information sets; and vice versa. When an access is made _- 32- This paper size is applicable to the Zhongguanjia Standard (CNS) A4 specification (Q χ Vision) I _ 111 111 .-------- Order · -------- 1 V (Please note this page and fill in this page again) ^ 48387 Employee Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs printed A7 B? V. Invention Description (3〇) 'When the filter 203 was first built, the single-built security officer (security 〇 汀icer) The user group has: the management authority that governs all the objects in VPN 201 and the decision maker decision 306. The inheritance right of official decision 3-with the inheritance right of management decision Zhan Chengyi operates with official decision , The same method is: inheritance rights with access decisions It works. It organizes many user groups, information sets, and available resources referred to in management decisions in a hierarchical manner. Within a user group, it is a user group that is a subset of a given user group: Are all down and down from the hierarchy of many user groups from -¾ existing user groups. The same is true for information sets. In the same way as for access decisions, inheritance is applied at the level Therefore, within the user group level, the management user that manages one of the user groups will also govern all subsidiary, including some user groups. Similarly, with regard to the level of the information set, one of the management users who governs the information set will also govern all its affiliates, including one information set; and e, which is the management decision of-the case of the set of management-the management user will also Governs access decisions for all contained information sets. There is also a natural hierarchy of available resources. For example, one of the levels is: location. Within a given location, many verbal servers at that location form a down-level hierarchy: while within a server, many services provided by the server form the next level. A group of administrative users with jurisdiction at any level of the available resource tree also governs the lower levels used. For example, the management decision gives (many) the jurisdiction of the access filter 203 -33- This paper size is applicable to Zhonggu @ 家 浮 准 (CMS) A4 specification (210 X 297 mm) (锖 read first? R The splash on the back? Matters need to be filled in this I >, -------- Order ---------- line, 448387 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Explanation (31) = Libei has the management right to: all services under the website = all services executed and those services supported by it. $ 贝 原 trust authority: Figure 2 5 3 delegation authority: Figure 2 5 In VPN 201, it is easy to trust permissions, because the management user group of the managed object group may modify the object's management decision on it. For example, if—manage user group collection 1 it The information set can be divided into two sub-sets, and this new official decision is made, which gives each of the two other user groups the use of the set to govern the management of one of the two sub-sets Figure 25 shows an example of augmenting delegated permissions. In Figure 25, the user_group and its Documents are represented by circles; decision-makers' decisions are represented by square tables: and decision-making relationships are represented by different types of arrows: solid arrows represent management decisions ^ dotted arrows represent decision-making decisions, and dashed arrows represent storage decisions Make a decision. Part of the drawing of 25G1—shows the situation when the access filter 203 is being built: built-in, security officer " use, group 2503 has jurisdiction over all built-in objects 2505 and jurisdiction The decision-maker's administrative authority for decision 2507. "Security Officers" members of the user group will use their administrative authority in order to: form a sub-collection of objects 2505, rearrange the object hierarchy, and establish decision-maker decision-making 25〇7. In the parts and sections of Figure 25 marked 2508, it can be seen that :, security officer, user group 2503's activity-an activity result. _, Security officer, user group One of the members of 2503 has been established: "" Project Manager, Management User Group-34- This paper size applies to the National Standard (CNS) A4 specification (210 X 297 mm) -i. · ---. ---- Order, — ♦ —.— Line * (Please read the notes on the back before filling out this page) 4483 87 Printed by the Consumers ’Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs Α7 Β7 V. Invention Description (32) Group 2509, a group of 25“ engineer ”users, and — "Engineering materials" information set 2 5 1 3 · 'and has been given to •, the project manager " manages the " engineer " " engineering " data management authority., Members of the security officer " have also been established and formulated Decision 2507, so that: the "project manager" has the right to make access decisions for process data, as shown by the dotted line arrow 25 1 0. One of the members of "Project Management" has used this right to formulate: Allow members of the Engineer 25II to access the information in "Engineering Data, 2513", as shown by the dashed arrow 25 12. As a result, members of the "security officer" have entrusted the project manager 2509 with the management authority 2511 'engineering data 2513' and the authority to manage access to the engineering data.

當然’安全官員2503仍然具有管轄工程管理員2509的管 理權限;因而能夠使用該權限,以供進一步委託權限之 用。將一實例顯示在2517處。"安全官員,,2503之一成員已 經將”工程管理員"分成兩個子集合:”工程人員管理員U (Engineering Personnel Administrators,簡構 ΕΡΑ)25 19和"工 程資料管理員 ’’(Engineerng Data Administrators,簡稱 ED A)252 1。這些子集合之成員都是從工程管理員2509中繼 承而得管轄工程師” 25 11和”工程資料',25 1 3的管理權利。 EPA 251 9和EDA 2521的成員會使用這些管理權利來將管轄 "工程師” 25 11的管理權限委託給"工程人員管理員"25 19, 並將管轄11工程資料"25 13的管理權限委託給"工程資料管 理員"2521。EPA 25 19和EDA 2521的成員已經進一步使用 他們的權利來制定針對"工程資料"25丨3的存取決策以改變 存取決策,使得:針對"工程資料"的存取決策是由"工程 -35- 本紙張尺度適用中®國家標準(CNS)A4規格(210* 297公釐) • I____I / 了氣 I _ i _· — 11 I — 1^1 ^^1 - I ft^i If-l · n u n I V 1 Φ *^1 I-'^1^ 丨 · fu先閱頊背do之注ΦΡ事項再填寫本頁) 7 4 48 3$Of course, the 'security officer 2503 still has administrative authority over the project administrator 2509; therefore, this authority can be used for further delegation of authority. An example is shown at 2517. " Security Officer, a member of 2503 has divided "Engineering Administrators" into two sub-sets: "Engineering Personnel Administrators (Engineering Personnel Administrators) 25 19 and" Engineering Data Administrators " (Engineerng Data Administrators, ED A for short) 252 1. The members of these sub-collections are relayed from the project manager 2509 and have the management rights of the competent engineers "25 11 and" Engineering Materials ", 25 1 3. Members of EPA 251 9 and EDA 2521 will use these management rights to delegate the management authority of "Engineer" 25 11 to "Engineer Manager" 25 19, and to manage the management of 11 engineering data "25 13 Rights are delegated to "Engineering Data Manager" 2521. Members of EPA 25 19 and EDA 2521 have further used their rights to make access decisions against "Engineering Data" 25 25 to change access decisions such that : The access decision for "Engineering Materials" is made by "Engineering-35- This paper size is applicable ® National Standard (CNS) A4 specification (210 * 297 mm) • I____I / 了 气 I _ i _ · — 11 I — 1 ^ 1 ^^ 1-I ft ^ i If-l · nun IV 1 Φ * ^ 1 I-'^ 1 ^ 丨 · fu Please read the note on the back and then fill out this page) 7 4 48 3 $

五、發明說明(33 經濟部智祛財產局員工消費合作社印製 s理貝" 252 1所制定的,如¥占咱总 工y u泉对頭2523所示,而不是由, 工奴官理員” 25〇9所制定的, 4疋田 資料管理員"252 1。 d將該項功能委託給”工卷 現在,工程人員管理員和 用他們^ , 和工程資料管理員之成員能夠使 州他們官轄工程師,工程資料 .V ., ^ T貧料,以及針對工程資料存取決 朿的f理權利來細加區分( 作•刀(ref咖)針對工程資料之存取操 作。言如說,"工程人員管理員 .. 男又一成員可能將•,工程師', ,.田刀成:"软體工程師”和"硬體 . 定吐工私師"·,而"工程資料管 料:一成貝則可能將”工程資科,細分成”硬體工程資 料和”軟體工程資料〃。這栉 、樣做,工程資料管理員"之一 :員就可能會以賦予”軟體工程師,,存取”軟體工程資料"和 秘…“ / 缸工牙呈資料"的存取決策來替換 賦丁"工程師存取,,工程資料"的存取決策。 。簡要而t ’可説是:具有管轄—使用者群組的諸多管理 =皆對正確較義在使料群組巾之“資格(membership 負有貴任;他們可能將此貴任的任何部份委託給其它管理 員。同樣地’具有管轄一資訊集的諸多管理員皆對正確地 將資訊資源包括在資訊集内負有責任;他們可能將此責任 的任何部份委託給其它管理員。後者的管理員當然也必释 是針對某種可用資源的管理員,從該資源中可能獲得:正 在被増加到資訊集的資訊。可用資源之管理員皆對整體網 路和安全性操作負有貴任。同樣地,他們可能委託他制 貴任。最後’決策制定者管理貝都會掌握管轄存取資訊的 最後管轄權。他們可㈣自建立與特定資訊集有關的存取 -36- 本紙張尺度適用中固國家標準(CNS)A4規格(210 X 297公发) _ . ^---------^ > » (^先閱讀背面之江意事項再填寫本頁) 448387 A? _____B7 五、發明說明(34 ) 決策。從某種意義説來,決策制定者決定針對企業的整禮 資έΗ·共享決策。針對使用者群組’資訊集,以及可用資源 的管理員然後會決定建構細節。 使用諸多存取過濾器203和資料庫301的存取控制:圖4 2使用諸多存取過濾器203和資料庫301的存取控制:圖4 如圖2中所示,存取過濾器203在VPN 201中有一位置, 將它安置在使用者正在從其中請求存取資訊資源的客户機 與資訊資源存在其上的伺服器之間。於是,藉由在一使用 者與能夠提供使用者存取資訊資源的一項在伺服器上的服 務之間的通信中居間調停(interceciing),存取過滤器203能 夠控制由使用者存取資源。爲了使使用者獲得存取資訊資 源’在使用者與服務之間必須建立對話。在目前上下文 中’將術語”對話”加以廣義地定義,以便包括一些正派 (well-behaved)無連接通信協定(connectionless protocols)。 當存取過濾器203發覺使用者嘗試初啓一項具有服務的對 話時,它會決定存取操作是否應該被允許。這麼做是根 據:使用者的已知身份;資訊正在被存取的資訊資源;資 訊的靈敏度等級;以及使用者識別方法,使用者與服務之 間路徑,及所使用之任何加密技術的信賴等級。 圖4顯示:一項對話如何能夠涉及一個以上的存取過濾 器203。顯示於圖4中的對話402涉及在圖中編號爲403 (1,…5)的五個存取過濾爭203。存取過濾器203皆被設計而 使得:只需要在諸多存取過濾器203中的一個存取過濾器 中’制定是否准許使用者存取資訊資源的決策。諸多存取 -37- 本纸張尺度適用中0 0家標準(CNS)A4規格(2i0 X 297公发) (請先閱讀背面之注意事項再填寫本頁) I ί * 1^1 1 n f i t flu I I t . &Λ-45么·>-v 經濟部智慧財產局員工消費合作社印製 ^48307 Λ7 B7 五、發明說明(35 ) 過濾器203的這種特點之關鍵是它們對它們自己彼此鑑 定的能力。skip被用來做這件事。每一個存取過濾器203 都有:使存取過濾器203之密鑰與存取過濾器之名稱相結 合’並且由VPN的證書當局所簽署的一種χ.509號證書。 在資料庫301中,每個存取過濾器都具有:在νρΝ 2〇丨中的 所有其它存取過濾器的名稱和I P位址:並且,一項使用 SKIP來加密的對話一到達,每個存取過濾器就使用來自在 skip之討論中如上所述之證書的.•主體名稱"(Subject Name) 來決定:使用SKIP加密的(SKIP-encrypted)網路通信量是否 來自在VPN 2〇1中的另一個存取過濾器2〇3。 若存取過濾器接收中的對話並不是對話的目標(那就 是’存取過濾器只是執行像沿著路徑之一〗p路由器那樣的 功能而已),則存取過濾器只會從資料庫3〇1中加以驗證 (verify):目標I p位址就是在vpN 2〇丨中的某個其它存取過 濾fe 203的I P位址。如果就是這種情形,就容許對話通過 而不必附加核對。當請求來到最後存取過濾器203時,最 後存取過濾器203就使用SKIP對該請求加以解密,以便證 實:孩請求的確被第—存取過濾器2〇3所核對,進而證 實:該請求在轉接中未曾被修改。 於是,在圖4中,存取過濾器4〇3 (丨)使用它自己的存取 控制資料庫301之拷貝來決定:發起對話的使用者是否已 經存取針對該對話所載明的資訊資源。若存取過濾器 403(〇如此決定;則它會鑑定對話的—些輸出訊息,並且 必要時對它們加以加密',以便達到適當信賴等級。然後, -38- 本紙張尺度綱中家彳(CNS)A^l祕c 297公^7 (請先閱讀背面之注意事項再填寫本頁) -----^*1--------,線-* 經濟部智慧財產局員工消費合作社印製 448387 經濟邨智慧財產局員工消費合作社印袈 A7 ______ B7__ 五、發明說明(36 ) 諸如存取過遽器403(2,...,5)會允許對話繼續進行,此乃因 爲迓對活是來自存取過濾器4〇3(〇並已經利用SK][p加密; 迫而既不會使用芯們自己的存取控制資料庫3〇丨之拷貝來 對訊息加以解密,也不會對訊息加以核對。然後,存取過 濾器403(5)會對訊息加以解密,並證實:它們都被加密’ 因此皆由存取過濾器4〇3( 1)所核對:且若訊息都是原封不 動的,則將它們轉遞到包含所需資源的伺服器4〇7。在伺 服器407與使用者系統4〇 1之間傳遞之對話中的諸多訊息都 用相同方式加以處理:必要時,利用存取過濾器4〇3(5)對 它們加以加密:諸存取過濾器4〇3(2,…,4)會基於由存取過 濾器403(5)所執行的鑑定而將它們加以傳遞通過:而存取 過應器403( 1)到基於鑑定而將訊息傳遞到系統4〇 ^,並且必 要時’對該訊息加以解密0 这種技術所有效執行的是:爲存取過濾器4〇3(1)與存取 過濾器403(5)之間的對話而開關一隧道4〇5 ;因爲隧道,所 以只有最接近客户機的存取過濾器4〇3才需要執行:解 抬,存取核對,以及重新加密。而且,在諸多内部網路和 在網際網路1 2 1中,隧道都是同樣安全的。在一種大型 VPN中’存取過濾器4〇3(1)處在最佳位置中以核對存取操 作,此乃因爲:它有權存取關於發起對話之使用者的最詳 細資讯。執行在第—存取過濾器4〇1處之存取核對的技術 會進一步將存取控制責任均均分佈遍及VPN,因而容許 VPN按規模伸縮到任何规模的大小。 端對端加密:圖5 -39- 冬.·氏沧尺度過用宁圉國家標準(CNS)A4規格(21〇 χ视公 -----------1----------r--------J \ c (請先Μ讀背面之;£意事項再填寫本頁) 4483 8 7 A7 B7 經濟部智慧財產局員工消費合作社印*'ϊί 五、發明說明(37 3端對端加密:圖5 圖4之隨道只是從存取過濾器4〇3(1)延仲到存取過遽器 403(5)而已:對話之訊息在使用者所使用的系統4〇〖與存取 過遽器403(1)之間都未加密,又在存取過濾器4〇3(5)與伺 服器407之間都未加密。在極爲靈敏之資訊的情形下,從 近端存取過濾器到經由網路之路徑末端,即:在系統 403(1)與伺服器4〇7之間,可能需要鑑定和加密。 圖5顯示··怎樣使用一些存取過濾器2〇3來達成此目的。 在VPN内’除了一些存取過濾器203之外,可能和任何客 户端系統40 1或503 ’或任何伺服器系統407使用鑑定和加密 技術。當一客户端電腦利用加密技術時,它會使用$匕11?來 鑑定對話,並使用一種在客户端電腦與一被選擇存取過濾 器203之間所共享的共享機密(sharecj secret),對該對話加 以加密’然後會將已加密訊息發送到被選擇存取過濾器 203 ;藉以有效地闢建客户端與被選擇存取過濾器2〇3之 間的随道,進而使被選擇存取過濾器2〇3和第一存取過濾 器203可作存取核對之用。在第一存取過濾器2〇3處,對 訊息加以解密並執行存取核對。由於使用者之證書 和已加密訊息可供利用,故而使用者之已鑑定身份能夠被 用於存取核對。若存取操作被允許;則對訊息再加密一 次’並發送到最接近伺服器4〇7的存取過濾器4〇3(5),它會 對該訊息加以解密。若資料庫30 1包含一種針對伺服器407 的skip名稱和加密演算法(algorithrns);則必要時,存取過 遽器403(5)檢索針對伺服器4〇7的證書,並使用SKIP,以便 -40- 本紙張尺度適財關家標準iCNS)A4規格⑵〇 x 297公发) . _ . *-------^ ---------i i (請先閱ί4背面之;i意事項再填寫本頁) 448387 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(38 ) 必要時爲伺服器407而對該對話重新加密。在其它情況, 存取過濾器403(5)只是以明碼方式the clear)將訊息發送 到伺服器407。若爲伺服器407而對訊息重新加密,則伺服 器407最後會接收已加密訊息並對它加以解密。位居第一 存取過濾器203與最後存取過濾器2〇3中間的一些存取過 濾器203 ’都只是注意到該訊息是來自另一存取過濾器並 利用SKIP加密’以及將該訊息傳遞而已,如上所述。當词 服器407檢索資訊資源時,它不是以明碼方式將它發送到 存取過濾器4〇3(5),就是利用針對存取過濾器4〇3(5)的密 輪而對包含資源的訊息加以加密。然後,依相反順序,成 對地執行上述的解密和加密處理過程:從伺服器4〇7到存 取過濾器403(5);從存取過濾器4〇3(5)到存取過濾器 403(1):以及最後從存取過濾器4〇3(1;)到原始客户端系統 40 1,它會對訊息加以解密。 這種技術的效應是:在客户機與伺服器之間的路徑上構 築隧道,該随道從在最接近客户機之路徑上的存取過滤器 203延伸到在最接近伺服器之路徑上的存取過減器如。若 客户機能夠加密和解密,則隨道能夠從最接近客户機的存 取過遽器延伸到客户機;且若词服器能夠加密和解密,s!] 隨道同樣地能夠從最接近何服器的存取過渡器延伸到词服 。—旦在路徑中的第-存取過遽器2〇3已經被觸及,並 已經鑑定對話;就不需要進—步 歹加抗或解密,直到最接近 飼服器的存取過滅器203已經被觸及爲止。而且,在 存取過遽器203中的存取控制資料庫3Ql都會Μ針對:客 41 - 本纸張尺度適用中固固家標準(CNS)A4規格 ----r---I------坤衣--------訂·--------1 ir {請先閱讀背面之江意事項再填寫本頁) ^483 8 7 經濟部智慧財產局員工消費合作社印Λ,,π A7 B7 五、發明說明(39 ) 户機,伺服器,以及在路由中的諸多存取過濾器203之所 有必要的識別和認證(certiHcation)資訊。剛才描述的端對 端加密枝術之一優點是:與其集中注意力於用來連接VPN 到網際網路的諸多存取過濾器,不如將加密負擔分佈遍及 網路,藉以增強規模可伸縮性。 圖5顯示:該技術如何隨著對話5〇 1而運作,該對話隨著 漫遊者而發起,那就是:客户機503連接到VPN是經由網 際網路12 1。漫遊者503配備有SKIP,就像在一内部網路上 的目標伺服器407那樣。當SKIP被配置在漫遊者中時,就 將針對存取過濾器403 (3)的證書賦予漫遊者,並將針對漫 遊者的證書賦予存取過濾器403(3)。當漫遊者503發送一項 屬於對話的訊息時,它會將訊息定址到伺服器4〇7,並使 用它和存取過濾器403(3)共享之傳送密鑰,對該訊息加 以加密。於是,經由隧道505而將訊息鑿隧道傳送到存取 過濾器403(3)。在那裏,存取過濾器403(3)會對該對話加 以解密’執行存取核對,進而使用針對存取過濾器4〇3(5) 之一傳送密输而對該對話重新加密。在路徑中的諸多隨後 存取過濾器403容許對話通過,此乃因爲:該對話是由存 取過濾器403(3)加以鑑定;於是,至少提供隧道5〇7到存 取過濾器4〇3(5)。若目標伺服器407配備有SKIP,則存取 過濾器403(5)會將隧道延伸到目標伺服器407,如上所 述0 基於資料靈敏度的可適性加密和鑑定:圖6和7 3基於資料靈敏度的可適性加密和鑑定:圖6和7 -42- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 4^ . 訂---------,線 (諦先間請背面之注意事項再填寫本頁) 4483 8 7 A7 B7 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 五、發明說明(4〇 ) 在VPN中,在存取控制方面的一項重要工作是:決定對 話所需安全性的最小量。這挺重要的,第一是因爲:至少 必須保證該最小量;第二則是因爲:比需要還多的安全性 會浪費資源。將用來決定最小而在存取過濾器203中所使 用的諸多技術集體稱爲安全加密網路遞送(SecureV. Description of the invention (33 Printed by the Consumer Cooperatives of the Intellectual Property Office of the Ministry of Economic Affairs and printed on 252 1), as shown in Figure 2523 of the counterpart of Yu Zhanzong, but not by the official laborers. Developed by the staff ”2509, 4 Putian Data Manager " 252 1. d delegated this function to the“ Workbook. Now the Engineering Manager and the members using them ^, and the members of the Engineering Data Manager can enable the state They have jurisdiction over engineers, engineering data, V., ^ T, poor materials, and management rights for access to engineering data to make a fine distinction (for the operation of accessing engineering data.) Say, " Engineer manager .. Another member may be •, engineer ',,. Tian Daocheng: " software engineer " and " hardware. Engineering data management: 10% may divide the "engineering resources department" into "hardware engineering data" and "software engineering data". In this way, do the same, one of the engineering data managers " one: Give "software engineers, access to" software engineering data " and secrets … "/ Replacement of access to data " replacement of engineer " engineer access, and access to engineering data ". Briefly, t 'can be said to have: jurisdiction-user group Many of the management = are responsible for the "qualification" of membership groups; they may delegate any part of this responsibility to other administrators. Similarly, they have Many administrators are responsible for the proper inclusion of information resources in the information set; they may delegate any part of this responsibility to other administrators. Of course, the latter's administrators must also be responsible for the management of certain available resources May obtain from this resource: the information being added to the information set. The administrators of the available resources are responsible for the overall network and security operations. Similarly, they may entrust others to control their duties. In the end, Decision makers who manage Shell will have the final jurisdiction to govern access to information. They can establish access to specific sets of information on their own. -36- This paper standard applies the China Solid State Standards (CNS) A4 regulations. Grid (210 X 297) _. ^ --------- ^ > »(^ Please read the Jiang Yi Matters on the back before filling out this page) 448387 A? _____B7 V. Description of Invention (34) Decision In a sense, the decision maker decides on the corporate gift-sharing and sharing decision. The administrator of the user group's information set, and the available resources, then decides on the details of construction. Many access filters are used Access control of 203 and database 301: Figure 4 2 Access control using many access filters 203 and database 301: Figure 4 As shown in Figure 2, the access filter 203 has a position in VPN 201. Place it between the client from which the user is requesting access to the information resource and the server on which the information resource resides. Thus, the access filter 203 can control the access to resources by the user by interceciing in communication between a user and a service on the server that can provide the user access to information resources . In order for users to gain access to information resources, a dialogue must be established between users and services. In the current context, the term "dialog" is broadly defined to include some well-behaved connectionless protocols. When the access filter 203 detects that the user is trying to start a conversation with a service, it determines whether the access operation should be allowed. This is done based on: the user's known identity; the information resource on which the information is being accessed; the sensitivity level of the information; and the user identification method, the path between the user and the service, and the trust level of any encryption technology used . Figure 4 shows how a conversation can involve more than one access filter 203. The dialog 402 shown in FIG. 4 involves five access filtering competitions 203 numbered 403 (1, ... 5) in the figure. The access filter 203 is designed so that only one of a plurality of access filters 203 needs to be used to make a decision whether to allow the user to access the information resource. Many accesses-37- This paper is applicable to 0 standard (CNS) A4 specifications (2i0 X 297) (Please read the precautions on the back before filling this page) I ί * 1 ^ 1 1 nfit flu II t. &Amp; Λ-45 么 > -v Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ 48307 Λ7 B7 V. Description of the invention (35) The key to this feature of filters 203 is that they treat each other themselves Identification ability. skip is used to do this. Each access filter 203 has: a type of χ.509 certificate that combines the key of the access filter 203 with the name of the access filter 'and is signed by the certificate authority of the VPN. In the database 301, each access filter has: the name and IP address of all other access filters in vρN 2〇 丨; and, once a conversation encrypted using SKIP arrives, each The access filter uses the certificate from the above-mentioned certificate in the skip discussion. • Subject Name determines whether the SKIP-encrypted network traffic from SKIP comes from the VPN. 2 The other access filter in 1 is 203. If the conversation in which the access filter is receiving is not the target of the conversation (that is, the 'access filter only performs a function like a router along the path), the access filter will only retrieve data from database 3. Verify in 〇1: The target IP address is the IP address of some other access filter fe 203 in vpN 2〇 丨. If this is the case, the dialogue is allowed to pass without additional checks. When the request comes to the last access filter 203, the last access filter 203 decrypts the request using SKIP in order to confirm that the child request is indeed checked by the first access filter 203, and then confirms that: the The request was never modified during the transfer. Therefore, in FIG. 4, the access filter 403 (丨) uses a copy of its own access control database 301 to determine whether the user who initiated the conversation has accessed the information resource specified for the conversation . If the access filter 403 is determined as such; it will identify the dialogue's output messages and encrypt them if necessary 'in order to achieve the appropriate level of trust. Then, -38- CNS) A ^ l secret c 297 public ^ 7 (Please read the precautions on the back before filling this page) ----- ^ * 1 --------, line-* Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the consumer cooperative 448387 Employees' cooperative of the Economic Village Intellectual Property Bureau's consumer seal A7 ______ B7__ V. Description of the invention (36) Such as access to the device 403 (2, ..., 5) will allow the dialogue to continue because this is because迓 The action is from the access filter 403 (〇 and has been encrypted with SK] [p; forced to use the copy of the core's own access control database 3〇 丨 to decrypt the message, but also The message will not be checked. Then, the access filter 403 (5) decrypts the message and confirms that: they are all encrypted 'so they are all checked by the access filter 403 (1): and if the message Are intact, then they are forwarded to the server 407 containing the required resources. In server 407 and use Many of the messages in the conversation passed between the systems 401 are processed in the same way: if necessary, they are encrypted using the access filter 403 (5): the access filters 403 (2, …, 4) will pass them on based on the authentication performed by the access filter 403 (5): and access the responder 403 (1) to pass the message to the system 4〇 ^ based on the authentication, and When necessary, 'decrypt the message. 0 This technique effectively performs: opening and closing a tunnel 405 for the dialogue between the access filter 403 (1) and the access filter 403 (5); Because of the tunnel, only the access filter 403 closest to the client needs to be performed: de-escalation, access check, and re-encryption. Moreover, in many intranets and in the Internet 1 2 1, tunnels They are all equally secure. In a large VPN, the 'access filter 403 (1) is in the best position to check the access operation because it has access to the user who initiated the conversation The most detailed information. The technology of the access check performed at the first access filter 401 will further The access control responsibilities are distributed throughout the VPN, thus allowing the VPN to scale to any size. End-to-end encryption: Figure 5-39- Dong. · Cang scales use Ninglang National Standard (CNS) A4 specifications ( 21〇χ depending on the public ----------- 1 ---------- r -------- J \ c (please read the back first; (Fill in this page again) 4483 8 7 A7 B7 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs * '五 ί V. Description of the invention (37 3 End-to-end encryption: Figure 5 Figure 4 follows only from the access filter 4〇3 (1) Extended to accessing the device 403 (5): The message of the conversation is not encrypted between the system used by the user 40 and the accessing device 403 (1), and is being accessed again. The filter 403 (5) and the server 407 are not encrypted. In the case of extremely sensitive information, from the near-end access filter to the end of the path through the network, that is, between system 403 (1) and server 407, authentication and encryption may be required. Figure 5 shows how to use some access filter 203 to achieve this. Within the VPN ', with the exception of some access filters 203, authentication and encryption techniques may be used with any client system 401 or 503' or any server system 407. When a client computer uses encryption technology, it uses $ 11? To authenticate the conversation and uses a shared secret shared by the client computer and a selected access filter 203. The conversation is encrypted 'and then the encrypted message is sent to the selected access filter 203; thereby effectively establishing a channel between the client and the selected access filter 203, thereby making the selected access filter The filter 203 and the first access filter 203 can be used for access checking. At the first access filter 203, the message is decrypted and an access check is performed. Since the user's certificate and encrypted message are available, the user's authenticated identity can be used for access verification. If the access operation is allowed; the message is encrypted again 'and sent to the access filter 403 (5) closest to the server 407, which decrypts the message. If the database 301 contains a skip name and algorithm for the server 407; if necessary, access the server 403 (5) to retrieve the certificate for the server 407 and use SKIP to -40- This paper is suitable for financial standards iCNS) A4 size ⑵〇x 297 public). _. * ------- ^ --------- ii (please read the back of ί4 first) (I will fill in this page again if necessary) 448387 Printed A7 B7 by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of Invention (38) If necessary, re-encrypt the dialogue for server 407. In other cases, the access filter 403 (5) simply sends the message to the server 407 in clear. If the message is re-encrypted for the server 407, the server 407 finally receives the encrypted message and decrypts it. Some of the access filters 203 that are in the middle of the first access filter 203 and the last access filter 203 'all just noticed that the message came from another access filter and was encrypted with SKIP' and the message Just pass, as mentioned above. When the Serving Server 407 retrieves an information resource, it either sends it to the access filter 403 (5) in an explicit manner, or uses the secret wheel for the access filter 403 (5) to match the contained resource. Message is encrypted. Then, in the reverse order, the aforementioned decryption and encryption processes are performed in pairs: from server 407 to access filter 403 (5); from access filter 403 (5) to access filter 403 (1): and finally from the access filter 403 (1;) to the original client system 401, which decrypts the message. The effect of this technique is to build a tunnel on the path between the client and the server, which extends from the access filter 203 on the path closest to the client to the path on the path closest to the server Access the subtractor such as. If the client can encrypt and decrypt, the channel can be extended from the access server closest to the client to the client; and if the word server can be encrypted and decrypted, s!] The server's access adapter extends to the word server. -Once the first access passer 203 in the path has been touched and the conversation has been identified, there is no need to proceed-step up resistance or decryption until the access passer 203 closest to the feeder. Has been touched so far. In addition, the access control database 3Ql in the access controller 203 will be targeted at: Guest 41-This paper standard applies to the China Solid Standard (CNS) A4 specification ---- r --- I-- ---- Kun Yi -------- Order · -------- 1 ir (Please read the Jiang Yi Matters on the back before filling out this page) ^ 483 8 7 Employees of Intellectual Property Bureau, Ministry of Economic Affairs Consumption cooperative seal Λ, π A7 B7 V. Description of the invention (39) All necessary identification and certification (certiHcation) information of the client, server, and many access filters 203 in the routing. One of the advantages of the end-to-end encryption technique just described is that instead of focusing on the many access filters used to connect the VPN to the Internet, it is better to distribute the encryption burden across the network to enhance scalability. Figure 5 shows how the technology works with the conversation 501, which is initiated with the roamer, that is: the client 503 connects to the VPN via the Internet 12 1. The rover 503 is equipped with SKIP, just like the target server 407 on an intranet. When SKIP is configured in a roamer, a certificate for the access filter 403 (3) is given to the roamer, and a certificate for the roamer is given to the access filter 403 (3). When the roamer 503 sends a message belonging to a conversation, it addresses the message to the server 407, and encrypts the message using the transmission key shared by it and the access filter 403 (3). Then, the message is tunneled to the access filter 403 (3) via the tunnel 505. There, the access filter 403 (3) decrypts the conversation ', performs an access check, and then re-encrypts the conversation by sending a secret message against one of the access filters 403 (5). Many subsequent access filters 403 in the path allow the conversation to pass because: the conversation is authenticated by the access filter 403 (3); therefore, at least a tunnel 507 is provided to the access filter 403 (5). If the target server 407 is equipped with SKIP, the access filter 403 (5) will extend the tunnel to the target server 407, as described above. 0 Adaptability encryption and authentication based on data sensitivity: Figures 6 and 7 3 Based on data sensitivity Applicable encryption and identification: Figures 6 and 7 -42- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 4 ^. Order ---------, line (谛 Please fill in this page first before filling in this page) 4483 8 7 A7 B7 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of Invention (4〇) In VPN, an important work in access control : Determines the minimum amount of security required for the conversation. This is important, first because: at least the minimum amount must be guaranteed; second because: more security than needed wastes resources. Many technologies used to determine the minimum and used in the access filter 203 are collectively referred to as secure encrypted network delivery (Secure

Encrypted Network Delivery,簡稱 SEND)。在 SEND 中,存 取控制資料庫301包含針對每個資訊資源的資料靈敏度等 級β資料靈敏度等級會指示與資訊資源有關聯的保密等級 (the level 〇f secrecy),並由對資源負有貴任的安全管理員 加以指定給資訊資源。諸多等級之一模範集合是:最高機 密(Top Secret),機密(Seeret),專用(private),以及公用 (Public)。 用來指示資料靈敏度的等級也都被用來指示針對存取請 求所品的仏賴等級。如前面所描述的,唯若從下列信賴等 級中所決定的信賴等級至少與該資訊之資料靈敏度等級一 樣大,才會允許存取操作;該信賴等級有:用來識別使用 者=技術的信賴等級,存取請求經由vpN 2〇丨之路徑的信 賴辛級’或用來對在路徑上所發送的訊息加以加密之任何 加密技術的信賴等級。針對:使用者識別方法,路徑,以 力达演算的u等級都被包含在存取控制冑料庫如1 中。關於路的信賴等級’將VPN分成—些網路 個網路组件都是諸多Ip 呼 ^ 峪又連接集合,由存取過濾器 二、匕组件加以分離。每個網路组件都有—個名 賴守級。譬如說’ '網際網路組件將會有”公 -----------版-------—訂---------線 (請先閱讀背面之注意事項再填寫本頁) -43- 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(41 ) 用"信顇等級,而一内部網路組件則可能有”專用”信賴等 級。一既疋組件的信賴等級可能是基於它的實體安全性, 或者是基於组件中之加密硬體的使用。因爲將每個存取過 濾器203增加到vpN,所以將一種它與VpN之諸組件連接 的描述増加到資料庫3〇1。包括在這種描述中的都是:諸 多網路的信賴等級。因此’任何存取過濾器203都能夠使 用i的資料庫3 〇 1之拷貝來決定路校之每個組件的信賴等 級;而在一客户機與一伺服器之間,將會藉由該路徑來載 送一項對話。 使用者的信賴等級是從存取請求識別使用者所依照的方 式中所決定的。在存取控制資料庫3 0 1中,每個使用者群 组都有一種或更多與它有關聯的識別技術,而每種識別技 術則都有一種最小信賴等級。諸多基本技術爲: •經由SKIP的證書。使用者藉由在其X.509號證書中的 名稱來加以識別,該證書則和SKIP通信協定一起使 用,以便鑑定和加密通信量。 * 經由使用者識別客户軟體的證書。使用者藉由在其 x’5〇9號證書中的名稱來加以識別,該證書則經由一 種稱爲使用者識別客户軟體的特殊Conclave(秘密會議) 客户軟體模組而傳送到一些附屬存取過濾器203。使 用—種口令 / 回應機制(challenge/response mechanism), 很安全地完成這項傳送。 • 經由使用者識別客户軟體的Windows Domain ID(視窗 網域識別符)。對Microsoft Windows Domain(微軟視窗 -44 - 尽·认㈣用中國國家標準(CNS)A4規格(210 X 297公沒) II Ji .k*-------訂·--------線 (請先Μ讀背面之注意事項再填寫本1^} 483 8 7 A7 B7 經濟部智慧財產局員工消費合作社印矣 五、發明說明(42 ) 網域)註册(log in)且已經安裝使用者識別客户軟體的 使用者自動地具有其Windows身份’包括群組成員資 格,並且傳送到一些附屬存取過濾器2〇3 ^在NetBi〇s (網路基本輸入/輸出系統)通信協定的機制内,很安 全地完成網路登錄(丨ogon)。 •鑑定令牌。可能以下列兩種方式來利用鑑定令牌(諸 如:由安..免i车動力公司(security 〇ynamics Inc.)和亞贊 1公司(Axent Corp.)所製造的那些令牌):經由使用者 識別客户軟體,以在頻帶外的方式;或者,在 Telnet(遠距通信網路)和FTP(檔案傳送協定)通信協定 内,以在頻帶内的方式。 • 1 p位址及/或網域名稱。使用者之電腦的I p位址或全 限定(fully qualified)網域名稱。 在SEND之一較佳建構例中,諸多識別技術都有一種從 最高安全到最低安全的預定次序。應該將剛才列示的諸多 技術加以排列/入序,就像它們在上述列表中的那樣:最高 安全的技術都是在列表的上端。雖然識別技術的排列次序 (ordering)是有些主觀,但是卻反映了 :識別技術的通用安 全性’以及應用到使用者身份之分佈和確認的嚴密性 (ngor)。在VPN 201中的管理員隨後會使有序(〇rdered)信賴 等級與有序識別技術有關係。譬如説,若管理員使,,專用M 仏賴等級與藉由艦足令牌的識別技術有關係;則想要存取 具有"專用”靈敏度等級之一資源的使用者必須親自識別, 其方法是藉由··一種鑑定令牌,或者高於識別技術之順序 -45 - 本紙張尺度適用中0國家標準(CNS)A4規格(210 x 297公髮) (請先閱請背面之注意事項再填寫本頁) -_k·-------訂·--------'線 _ ^48387 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(43 ) 中的鑑定技術的另一種識別技術。存取過濾器的管理員同 樣地會:將在VPN中可供利用的諸多密碼演算法,從最高 安全到最低安全加以排列次序;使有序信賴等級與有序密 碼演算法有關係;將在VPN 20 1中所使用的諸多網路路徑 加以排列次序;以及使有序信賴等級與有序網路路徑有關 係s在信賴等級與關於安全性的排列次序之問的這些關係 都包括在存取控制資料庫3〇丨中,然後,構築一種信賴及 靈敏度等級與識別及加密技術有關係的SEND表。圖6是: 這樣一種SEND表之一概念性表示法。 SEND表601有三欄:一欄是表示信賴/靈敏度等級的 603 ’ 一欄是表示最小加密方法的6〇5,以及—欄是表示最 小識別方法的607。就關於欄605之諸加密方法的細節而 I ’請參看由布魯斯·史尼爾(Rr„ce Schneier)所著:”應 用在碼術”—書,該書由約翰·威利及後裔(John Wiley & Sons)圖書公司印行,美國紐約,1994年版。表中的每一列 609使信賴/靈敏度等級與連接著存取過濾器’客户機,及 词服器1路徑的最小加密等級和使用者之最小識別等級有 關聯。於是’列609(1)使”最高機密”信賴/靈敏度等級與 3DES加密演算法和經由SKIp而獲得的使用者證書有關 係。希望獲得存取具有靈敏度等級爲,,最高機密之一資源 的使用者,因此必須具有一種由Skip所認證的識別等 級:且若路徑並不具有”最高機密"信賴等級,則必須利用 3DESM法、演算法對該對話加以加密。在另一方面,如列 609(4)所示,希望獲得存取具有靈敏度等級爲„公用,,之一 -46· 本纸張尺度適用中固S家標準(CNS)A4規格(2l〇x 297公釐) f—. .—k-------1,訂·-------* 線 l ' (請先閱?F背面之注意#·項再填寫本頁) A7 #38 7 ___Βί______ 五、發明說明(44 ) 資源的使用者可能藉由任何方法加以識別’因而不必要對 該對話加以加密。 當初啓一項新對話時,在針對該對話所使用之路徑中的 第一存取過濾器203會繼續進行如下: 1 .存取過濾器203會決定正在被存取的資訊資源;並且, 在資料庫301中查出(looks up)它的靈敏度等級。 根據SEND表601,針對該靈敏度等級的最小鑑定方法會載 明:哪些識別機制可能被存取過濾器所使用,以便識 別和鑑定執行存取操作的使用者。 第一存取過ί慮器203然後會查閲(consults)資料庫30 1,以便 根據使用者所屬的使用者群组和資源所屬之資訊集來 決定:使用者是否可存取資源。 第一步驟是根據存取控制資料庫來決定:用來識別使 用者的諸多識別方法中,哪些方法具有對該資源 之靈敏度等級而言是夠高的信賴等級。 然後,第一存取過濾器203根據具有夠高的信賴等級的 每一種識別方法,使用使用者之識別資訊來查閲 資料庫301 ’以便決定:使用者所屬的使用者群 組。 第一存取過濾器203也會查閱資料庫30丨,以便決定: 資源屬於哪些資訊集。 已決定了有關的使用者群組和資訊集,第—存取過濾 器2 0 3就會查閱資料庫3 0 1,以便指出—收存取決 朿的位置’該決策決定:是否打算容許或拒絕存 -47- 本纸張尺度剌 t a i iji (CNS)A4 ^ (210 X 297 ) -------------k--------訂---------線-> (請先閱Ϊ3背面之注意事項再填寫本頁) 經 濟 部 智 慧 財 產 局 員 工 消 費 、合 作 社 印 製 A7 448387 _____B7_.________ 五、發明說明(45 ) 取對話資訊8若發覺到至少—個容許存取操作的 決策以及發覺到沒有一個拒絕存取操作的決策’ 則容許使用者存取操作:在其它情況,則是拒絕 存取操作。將步騍b ’ c及d的細節加以描述於下。 4 .若不拒絕存取操作’則第一存取過濾器203隨後會 查閲資料庫3 ΟI,以便決定組成路由的一些網路組 件,該路由是·•經由VPN ’從客户機到包含資訊資 源的伺服器。 將路由加以考慮成爲具有高達三個的邏輯分段 (logical segments); 1 ·分段(a),從客户機到第一存取過濾器203 »此分段 可能已經加密或可能未曾加密,端視客户機是否 使用SKIP而定。 2,分段(b) ’從第一存取過遽器203到最接近伺服器而 在路徑中的存取過遽器2 0 3 ;以及 3 .分段(c),從最接近伺服器的存取過濾器2〇3到伺服 器,此分段也可能已加密或可能未加密。 若分段(a)和分段(c)存在,則每個分段將由單一網路組 件组成。若客户機在第—存取過濾器上,則分段⑷將 不存在,若伺服器在最接近伺服器的存取過濾器上, 則分段(c)將不存在。若分段(b)存在,則它將由—個或 更多網路组件组成。若在客户機與伺服器之間只有— 個存取過濾器,則分段將不存在。 就每個分段而言: (请·元閱讀背面之;i意事項再填寫本頁) k·--------訂----------線 ^濟部智#1財產局員工消費合作社印製 -48- 448387 B7 烴濟部智慧財產局員工消費合作社印繁 五、發明說明(46 ) .就分,⑷而言,必須由客户機執行任何加密方 法9若分段(a)的信賴等級至少不是與資源之資料 靈,度-樣強有力:或者,若由客户機所執行的 加密方法义信賴等級至少不是與資源之資料靈敏 度一樣強有力;則拒絕存取操作^ 说刀/又(b)而g,若在路徑中之任何網路组件的最 弱信賴等級大於或等於資源之資料靈敏度,則發 达通k量而不必加密。這對應於網路本來就夠安 全用來傳送資料的情形。在上表之實例中,可能 =任何網路上傳送具有"公用"資料靈敏度等級的 ^訊資源’如列_⑷所示。,然而,諸多存取過遽 器203將會使用SKIp來鑑定對話,因而容許諸多隨 後存取過滅器通過對話而不會招致:解密,存取 核對,以及重新加密的較大開銷(overheads)。若針 對路k的最弱信賴等級小於資源之資料靈敏度, 則爲針對靈敏度等級所需之最小加密演算法而查 閲SEND表,進而使用該演算丨,_胃❼ 在力在使通4鍵路(1 ink)的安全性升級(upgra‘des), 使Έ適合於載送該既定靈敏度之資料,因而允許 由使用者存取資源。 6.就分段⑷而言,從最接近伺服器的存取過濾器203 到词服器的路徑部分,第一存取過濾器203根據資 料庫301中的資訊而決定:分段(c)以及在分段(c)中 所使用之任何加密方法的信賴等級。若路徑的這 _ -49- t Ξ1 297 ^T) J ^ --------訂---------線-I (請先Μ讀背面之注意事項再填寫本頁) 4483 8 A7 B7 五、發明說明(47 ) 個分段之信賴等級小於資訊 、貪机貝原又靈敏度等級, 並且在那種情形下,若在分p 、^ 右在刀*又(C)中所使用的加密Encrypted Network Delivery (SEND). In SEND, the access control database 301 contains a data sensitivity level β for each information resource. The data sensitivity level indicates the level of confidentiality associated with the information resource (the level 〇f secrecy). Of security administrators assigned to information resources. One exemplary set of levels is: Top Secret, Seeret, Private, and Public. The levels used to indicate the sensitivity of the data are also used to indicate the level of reliance on the access request. As described earlier, access operations are allowed only if the trust level determined from the following trust levels is at least as large as the data sensitivity level of the information; the trust levels are: used to identify user = technology trust Level, the level of trust for access requests via the path of vpN 2〇 'or any encryption technology used to encrypt messages sent on the path. Aim: The user identification method, path, and u-level calculated by Lida are included in the access control database such as 1. Regarding the trust level of the road ’, the VPN is divided into a number of networks. The network components are many IP calls, and they are connected by a set of access filters. Every network component has a name Lai Shou level. For example, '' Internet components will have "public ----------- version ------------- order --------- line (please read the first Note: Please fill in this page again) -43- Printed by A7 B7 of Consumer Cooperatives of Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (41) Use " trust level, and an internal network component may have "dedicated" trust level A trust level of an existing component may be based on its physical security, or based on the use of cryptographic hardware in the component. Because each access filter 203 is added to vpN, one of it and VpN The description of the component connection is added to the database 301. Included in this description are: the trust level of many networks. Therefore 'any access filter 203 can use a copy of the database 301 of i Determine the trust level of each component of the road school; and between a client and a server, a dialogue will be carried through this path. The user's trust level is identified by the access request from the user Determined in the way. In the access control database 301, each user group There is one or more identification technologies associated with it, and each identification technology has a minimum level of trust. Many basic technologies are: • Certificates via SKIP. Users use the certificate in their X.509 certificate. The name is used to identify it, and the certificate is used with the SKIP protocol to authenticate and encrypt the traffic. * A certificate that identifies the client software by the user. The user uses the name in his certificate x'509 Identification, the certificate is transmitted to some auxiliary access filters 203 through a special Conclave client software module called user identification client software. Using a challenge / response mechanism, This transfer is done very securely. • The Windows Domain ID of the customer software is identified by the user. For the Microsoft Windows Domain (Microsoft Windows-44-Use the Chinese National Standard (CNS) A4 Specification) (210 X 297 public) II Ji .k * ------- Order · -------- line (please read the precautions on the back before filling in this 1 ^) 483 8 7 A7 B7 Ministry of Economic Affairs Bureau Consumer Consumption Cooperative Seal V. Invention Description (42) Domain) Users who have logged in and have installed user identification client software automatically have their Windows identity 'including group membership, and send to some affiliates The access filter 203 ^ implements network registration (ogon) securely within the mechanism of the NetBi0s (Network Basic Input / Output System) communication protocol. • Authentication token. Authentication tokens may be used in two ways (such as those manufactured by security ynamics Inc. and Axent Corp.): via use The user identifies the client software in an out-of-band manner; or, in the Telnet (Long-range Communication Network) and FTP (File Transfer Protocol) communication protocols, in-band. • 1 p address and / or domain name. The IP address or fully qualified domain name of the user's computer. In a preferred construction example of SEND, many identification technologies have a predetermined order from highest security to lowest security. The technologies just listed should be sorted / ordered as they are in the list above: the most secure technologies are at the top of the list. Although the ordering of identification technology is somewhat subjective, it reflects: the general security of identification technology 'and the strictness of the distribution and confirmation of user identity. The administrator in VPN 201 then associates the ORDERED trust level with ORDER identification technology. For example, if the administrator uses the special M 仏 level to be related to the identification technology via the ship's foot token; then users who want to access a resource with a "private" sensitivity level must identify it themselves, which The method is through an authentication token, or higher than the order of identification technology. -45-This paper size is applicable to 0 National Standard (CNS) A4 specifications (210 x 297 public) (please read the precautions on the back first) (Fill in this page again) -_k · ------- Order · -------- 'line_ ^ 48387 Printed by A7 B7, Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs V. Description of Invention (43) Another identification technology of the authentication technology. The administrator of the access filter will also: arrange the many password algorithms available in the VPN from highest security to lowest security; The order password algorithm is related; the order of many network paths used in VPN 201 is arranged; and the order trust level is related to the order network path. These relationships are included in the access control information Then, a SEND table related to the level of trust and sensitivity is related to the identification and encryption technology. Figure 6 is: A conceptual representation of such a SEND table. The SEND table 601 has three columns: one column is The column 603 'indicating the reliability / sensitivity level is 605 indicating the minimum encryption method, and the column is 607 indicating the minimum identification method. For details on the encryption methods of column 605, I', see by Bruce Shi Rr ce Schneier: "Applied to Code"-Book, printed by John Wiley & Sons Book Company, New York, USA, 1994 edition. Each column 609 in the table associates the trust / sensitivity level with the minimum encryption level of the access filter 'client and the Server 1 path and the minimum recognition level of the user. Column 609 (1) then relates the "top secret" trust / sensitivity level to the 3DES encryption algorithm and the user certificate obtained via SKIp. Users who want to gain access to a resource with a sensitivity level of one of the highest secrets must have an identification level certified by Skip: and if the path does not have a "highest level of confidentiality" trust level, the 3DESM method The algorithm encrypts the dialog. On the other hand, as shown in column 609 (4), it is hoped that the access has a sensitivity level of “Public,” one of -46. This paper standard applies to the solid state standard. (CNS) A4 specification (2l0x 297mm) f —..— k ------- 1, order · ------- * line l '(Please read first? Note on the back of F # · Item refill this page) A7 # 38 7 ___ Βί ______ 5. Description of the Invention (44) The user of the resource may be identified by any method 'and therefore the conversation need not be encrypted. When a new conversation is started, the first access filter 203 in the path used for the conversation will continue as follows: 1. The access filter 203 determines which information resource is being accessed; and, in the data Library 301 looks up its sensitivity level. According to the SEND table 601, the minimum authentication method for this sensitivity level will specify which identification mechanisms may be used by the access filter to identify and authenticate the user performing the access operation. The first access filter 203 then consults the database 301 to determine whether the user can access the resource according to the user group to which the user belongs and the information set to which the resource belongs. The first step is to decide based on the access control database: which of the many identification methods used to identify the user has a trust level that is sufficiently high for the sensitivity level of the resource. Then, the first access filter 203 consults the database 301 'using the identification information of the user according to each identification method having a sufficiently high level of trust to determine: the user group to which the user belongs. The first access filter 203 also consults the database 30 in order to determine: which information set the resource belongs to. The relevant user groups and information sets have been determined, and the access filter 2 0 3 will consult the database 3 0 1 to indicate the location of the access decision. The decision decision: whether to allow or Refuse to deposit -47- This paper size 剌 tai iji (CNS) A4 ^ (210 X 297) ------------- k -------- Order ----- ---- line- > (Please read the precautions on the back of Ϊ3 before filling out this page) Employee Consumption of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by the cooperative A7 448387 _____ B7 _.________ V. Description of the invention (45) Get dialogue information The detection of at least one decision to allow access operations and the finding that there is no decision to deny access operations' allows the user to access the operation: in other cases, the access operation is denied. The details of steps 骒 b'c and d are described below. 4. If the access operation is not denied, then the first access filter 203 will then consult the database 301 to determine the network components that make up the route. The route is from the client to the containing information via the VPN. The server of the resource. Consider routing into logical segments with up to three; 1 • Segment (a), from client to first access filter 203 »This segment may or may not be encrypted, end Depends on whether the client is using SKIP. 2. Segment (b) 'From the first access server 203 to the closest server and the access server 2 0 3 in the path; and 3. Segment (c) from the closest server The access filter 203 to the server, this segment may or may not be encrypted. If segments (a) and (c) exist, each segment will consist of a single network component. If the client is on the first access filter, segmentation will not exist, and if the server is on the access filter closest to the server, then segment (c) will not exist. If segment (b) exists, it will consist of one or more network components. If there is only one access filter between the client and the server, the segment will not exist. In terms of each section: (please read the text on the back; please fill in this page for further information) k · -------- Order ---------- line # 1 Printed by the Property Cooperative Consumer Cooperatives-48- 448387 B7 Printed by the Consumer Cooperative Cooperatives of the Intellectual Property Bureau of the Ministry of Hydrocarbons, V. Invention Description (46). As far as points are concerned, any encryption method must be performed by the client 9 The trust level of subsection (a) is at least not as strong as the resource's data. Or, if the encryption method performed by the client is at least not as strong as the resource's data sensitivity; Take operation ^ Say knife / again (b) and g, if the weakest trust level of any network component in the path is greater than or equal to the data sensitivity of the resource, then the throughput k is developed without encryption. This corresponds to the situation where the network is sufficiently secure to transmit data. In the example in the table above, it may be possible to send ^ message resources with the "public" data sensitivity level on any network, as shown in column _⑷. However, many accessors 203 will use SKIp to authenticate the conversation, thus allowing many subsequent access killers to pass the conversation without incurring the large overhead of decryption, access check, and re-encryption. . If the weakest trust level for road k is less than the data sensitivity of the resource, then consult the SEND table for the minimum encryption algorithm required for the sensitivity level, and then use the calculation. (1 ink) security upgrade (upgra'des) makes it suitable for carrying data of the given sensitivity, thus allowing users to access resources. 6. As far as segmentation is concerned, the path from the access filter 203 closest to the server to the server is determined by the first access filter 203 based on the information in the database 301: segmentation (c) And the level of trust of any encryption method used in segment (c). If the path of this _ -49- t Ξ1 297 ^ T) J ^ -------- Order --------- line-I (Please read the notes on the back before filling this page ) 4483 8 A7 B7 V. Description of the invention (47) The trust level of the segments is less than the information level, the greediness level, and the sensitivity level, and in that case, if the points p, ^ are in the knife * and (C) Encryption used

方法之彳0賴寺級至*』/ T Y _ 主y不是與所需等級一樣強有 力’遠所需寺級就像在老虑杳叫.之 1豕彺芩愿貝巩資源之靈敏度等 級的SEND表中的最,丨、葚纽抓样 J瑕小f級那樣:則第—存取過濾 器2 0 3將會拒絕存取操作。 上述決定靈敏度和信賴等級的方法保證:只有當需要達 到必要的信賴等級時,存取過滤器2〇3才會使用加密方 法。在使資料庫301中之網路配置的描述保持既簡單又可 苔理的時候,此方法會減少將被加密之對話的數目。結果 是.關於VPN中的管理和效能方面,會有較好的規模可伸 縮性。 圖7提供:資訊資源的靈敏度等級,使用者識別方法的 信賴等級,以及和客户機與伺服器之間的路徑有關聯的信 賴等級是怎樣影響由使用者存取資訊資源之一實例。在圖 7中,在客户端703處一配備有SKIP的使用者初啓一項對 話701,以便獲得儲存在配備有SKIP的伺服器705處之一資 訊資源723。上述討論的分段(a)出現在圖7中的707處;分 段(b)出現在709(1 ^.,4)處;分段(c)出現在711處。資訊資 源723具有"機密"之靈敏度等級。該對話遭遇的第一存取 過濾器203是存取過濾器203 (1)。存取過濾器203 (1)使用它 的存取控制資料庫之拷貝決定資源723的靈敏度等級。此 處,使用者已經使用SKIP證書,而檢視資料庫30 1中之 SEND表601則對存取過濾器203 (1)顯示:因爲這種使用者 -50- 本紙張尺度適用中國國家標準(CNS)A4規格(21〇χ 297公爱) (請先閱讀背面之注意事項再填寫本頁) k--------訂---------線. 經濟部智慧財產局員工消費合作社印*·1^ " 448387 A7 ____ B7__ 五、發明說明(48 ) 識別方法滿足具有"機密”靈敏度等級之資訊資源的要求, 所以在707處的分段(a)具有所需信賴等級。因此’第—存 取過濾器繼續決定:在VPN中,在存取過濾器203 (1)與词 服器705之間位在709(1,,,,,4)處之分段(b)和位在711處之分 段(c)的信賴等級。分段7〇9具有—些子分段:7〇9〇), 709(2),709(3),709(4),以及 709(5) ‘·而第一存取過濾器 203 (1)會核對在資料庫3 〇 1中的這些分子分段中的每個子 分段之信賴等級。分段709(2)是網際網路12 1,所以它的信 賴等級是:"公用"’它在分段709中是最小等級。然後, 存取過滤器203 (1)使用存取控制資料庫3〇丨來核對分段7 j j 之信賴等級。它的信賴等級是:_,機密"。於是,在7〇9處 之分段(b)只是具有一種對正在存取一"機密"資訊資源7〇3 疋一對話的路徑而言是太低的信賴等級而已。要處理這個 問題,存取過濾器203 (1)必須對該話加密,以便將它提升Method 彳 0 Lai Temple level to * ”/ TY _ Master y is not as strong as the required level 'Farly required temple level is like howling in old worries. 1 1 Wish the sensitivity level of Begon resources The most in the SEND table, as shown in the figure below, is the same as that of the second class: the first-access filter 2 0 3 will deny the access operation. The above method of determining sensitivity and trust level guarantees that the access filter 203 will use the encryption method only when it is necessary to reach the necessary trust level. While keeping the description of the network configuration in the database 301 simple and manageable, this method reduces the number of conversations to be encrypted. As a result, there will be better scalability for management and performance in VPNs. Figure 7 provides an example of how the sensitivity level of information resources, the trust level of user identification methods, and the level of trust associated with the path between the client and the server affect the access to information resources by users. In FIG. 7, a user equipped with SKIP at the client 703 initiates a conversation 701 in order to obtain one of the information resources 723 stored at the server 705 equipped with SKIP. Segment (a) discussed above appears at 707 in Figure 7; segment (b) appears at 709 (1 ^., 4); segment (c) appears at 711. The information resource 723 has a sensitivity level of " confidential ". The first access filter 203 encountered by this conversation is the access filter 203 (1). The access filter 203 (1) determines the sensitivity level of the resource 723 using a copy of its access control database. Here, the user has already used the SKIP certificate, and the SEND table 601 in the viewing database 30 1 shows to the access filter 203 (1): Because this user -50- This paper size applies the Chinese National Standard (CNS ) A4 specification (21〇χ 297 public love) (Please read the notes on the back before filling this page) k -------- Order --------- line. Intellectual Property Bureau of the Ministry of Economic Affairs Employee Consumption Cooperative Seal * · 1 ^ " 448387 A7 ____ B7__ V. Description of the Invention (48) The identification method meets the requirements of information resources with " confidential " sensitivity level, so section (a) at 707 has the required Trust level. Therefore, the "first-access filter continues to determine: in VPN, the segment between access filter 203 (1) and servlet 705 at 709 (1 ,,,,, 4) (B) and the trust level of segment (c) at 711. Segment 709 has some sub-segments: 7009), 709 (2), 709 (3), 709 (4) , And 709 (5) 'and the first access filter 203 (1) checks the trust level of each of the sub-segments of these molecular segments in the database 301. Segment 709 (2) is Internet 12 1, all Its trust level is: " Public " 'It is the lowest level in segment 709. Then, the access filter 203 (1) uses the access control database 3〇 丨 to check the trust level of segment 7 jj Its trust level is: _, confidential ". Therefore, the subsection (b) at 709 only has a path for accessing a " confidential " information resource 703 to a conversation Speech is too low a trust level. To deal with this, the access filter 203 (1) must encrypt the speech in order to raise it

到必要的k賴等級。第一存取過濾器2〇3 (丨)會查閲SEND 表601 ’以便決定需要何種加密方法;而列609(2)則指示: DES加岔方法是足夠的。於是,第一存取過濾器203 (1)會 使用忒演算法來對該對話加密’進而將它發送到存取過濾 器 203 (5)。 在圖7中’連接著客户機7〇3到存取過濾器刊”丨)的分段 707具有一種對資源之靈敏度等級而言是夠高的信賴等 級,於是客户機703不必對其請求加以加密。當不是這種 馅況時’唯右客户機7〇3已經使用一種其信賴等級資源之 靈敏度等級而言是足夠的加密方法來對請求加密,存取過 -51 - 本纸張尺度刺中Θ國家標規格<2K) x 297公g {請先閱筇背面之注意事項再填寫衣頁) hr ] !— - -1 · -"--h· - ^ - I - Jn — __I --- — ' 經濟部智慧財產局員工消費合作社印製 48387 A7 B7 五、發明說明(49 ) 濾器203 (1)才會賦予客户機·^3存取操作。爲此緣故’在 圖5中的漫遊者503必須是配備有SKIP的。由於漫遊者5们 經由網際網路121來存取•存取過濾器4〇3(3)的資訊;故而 漫遊者503的諸多請求可能從未具有高於,,公用,,的信賴等 級,除非將它們加以加密;並且,爲了完全存取在 中的資源,漫遊者503就必須使用一種加密方法,諸如:由 SKIP所提供的一種方法,其信賴等級對最高靈敏度等級 而言是足夠的。在存取過濾器2〇3的一些實施例中,存取 過遽器可能以-種與它在較佳實施例中使用來協商使用者 識別模式類似的方式’和客户機協商打算使用在請求中的 加密技術。 針對存取控制資料庫301之管理員界面的總覽:圖8到12 3針對存取控制資料庫3〇1之管理員界面的總覽:圖8到12 存取決策依據使用者群组和資訊集來定義存取操作;因 此,在可能定義存取決策之前,管理員必須定義使用者群 組和資訊集1争怎樣完成此事顯示於圖8中。定義使用者 群組涉及了步骤803到807 :首先定義使用者,然後 用者群組,然後再將使用者指定料#使用者料。定^ 資訊集涉及了步秘_到813:首先定義資源,然後定^ 訊集,然後再將資源指定到資訊集。當針對在一項決;中 所涉及的使用者群组和資訊集而已經完成此事時,、^夠 建立存取決策,如在815處所示。如前面㈣“^ p針對諸多使用者㈣和資訊集之存取決策的權利都由 決東制定者決策所決定的;可是用來定義和夹定使用者群 52- 參紙張尺度適用中國國家標準(CNS)A4規格(2】〇 X 297公爱 (請先閱讀背面之注意事項再填寫本頁) 『A + I -- 1 a^i I * 1^1 I-1 *1 ^^1 線 經濟部智慧財產局員工消費合作社印製 448387 經濟部智慧財產局員工消費合作社印5λ A7 ----------B7_____ 五、發明說明(50 ) 组〈成員資格和資訊集,以及用來爲它們而制定管理決策 的權利卻都是由管理決策所決定的。 ::像從削述中能夠看出的那樣,使用者界面通常被用來 疋義在兩個實體或關於它們的集合之間的關係。針對存取 控制貝料&庫301之圖形使用者界面(graphical userTo the necessary level. The first access filter 203 (丨) consults the SEND table 601 'to determine what encryption method is needed; and column 609 (2) indicates that: the DES bifurcation method is sufficient. Thus, the first access filter 203 (1) will use an algorithm to encrypt the conversation 'and send it to the access filter 203 (5). The segment 707 'connecting the client 703 to the access filter journal' in Figure 7) has a level of trust that is sufficiently high for the sensitivity level of the resource, so the client 703 does not have to add Encryption. When this is not the case, the right-only client 703 has used an encryption method that is sufficient for the sensitivity level of its trust-level resource to encrypt the request, accessing -51-this paper scale Chinese Θ national standard specifications < 2K) x 297gg {Please read the precautions on the back of the 再 and then fill in the clothing page) hr]! —--1 --- — 'Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 48387 A7 B7 V. Description of the invention (49) Filter 203 (1) will only be given to the client · 3 access operations. For this reason' in Figure 5 The roamer 503 must be equipped with SKIP. Since the roamers 5 access and access the information of the filter 403 (3) via the Internet 121, many requests of the roamer 503 may never have a high level. In the public, unless they are encrypted; and, for full access Resources, the rover 503 must use an encryption method, such as: a method provided by SKIP, whose trust level is sufficient for the highest sensitivity level. In some embodiments of the access filter 203 The access controller may negotiate the user identification mode in a manner similar to the one it uses in the preferred embodiment, and the client negotiates the encryption technology intended to be used in the request. For the access control database 301, Overview of the administrator interface: Figures 8 to 12 3 Overview of the administrator interface for the access control database 3001: Figures 8 to 12 Access decisions define access operations based on user groups and information sets; therefore, Before it is possible to define an access decision, the administrator must define how user groups and information sets can accomplish this. This is shown in Figure 8. Defining a user group involves steps 803 to 807: first define the user, and then use User group, and then assign the user to user # user feed. Defining the information set involves the step _ to 813: First define the resource, then define the information set, and then assign the resource to the information set. When When the user group and the information set involved in a decision have been completed, ^ is enough to establish an access decision, as shown at 815. As before, "^ p is for many users" And access rights to the information set are determined by the decision of the decision maker; however, it is used to define and pinpoint the user group. 52- Reference paper size applies Chinese National Standard (CNS) A4 specification (2) 0X 297 Gongai (Please read the precautions on the back before filling this page) "A + I-1 a ^ i I * 1 ^ 1 I-1 * 1 ^^ 1 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 448387 5λ A7 ---------- B7_____ of the Intellectual Property Bureau of the Intellectual Property Bureau of the Ministry of Economy It is determined by management decisions. :: As can be seen from the recap, user interfaces are often used to define the relationship between two entities or collections about them. Graphical user interface for access control materials & library 301

InterfaCe ’簡稱GUI)的通用形式對應於該工作。顯示圖包 括兩個視窗,每個視窗都包含打算使彼此有關係的一些實 體之表示〉去’而冑係則㈣選擇實體和需要之所在來定義 的’因而定義關係。 定義使用者群組:圖9 3定義使用者群组:圖9 圖9 α示用來殖民(populating)和定義使用者群組的顯 不圖901。在顯示圖中的視窗9〇3包含目前定義的使用者群 組之一分層顯示圖;視窗903與那些用來顯示由微軟公司 (Microsoft C〇rporati〇n)所製造的Wind〇ws %商標之作業系 ,·先中的ia案層次之視窗相似。在視窗9〇3中,使用著顯示 圖灿之管理使用者具有管理權所針對的諸技用者群組 都王現黑色;而其它使用者群组則都呈現灰色。在兩個視 ® :上的是兩個按鈕帶(butt〇n bars) : 91 i和915。按鈕帶 91〗列示:用來修改存取控制資料庫3〇1的一些可利用顯示 圖,而按鈕帶915則列示:可能在那些顯示圖上執行的— 些杈作。於是,在按鈕帶911中標示”使用者群组"的按鈕 被凸顯出,因而指示:顯示圖9〇1是用來殖民和定義使用 者群组的一個顯示圖。關於按鈕帶915,當視窗9〇3是現用 -53- 本纸張尺度適用中國國家標牟(CNS)A‘l規格(21G X 297公爱y ------------------------訂.--------線 > (請先間讀貨面之注意事項再填寫本頁) 4 48387 A7 B7 經濟部智慧財產局員工消費合作社印" 五、發明說明(51 ) 狀態時’有權管理一使用者群組之一管理使用者可能會修 改使用者群組,其方法是:在視窗903中選擇使用者群 組:並使用在按鈕帶9 1 5中的"刪除”(delete)按鈕來删除使 使用者群組;或者’使用"新増”(new)按紐來增加並命名 位在層次中的被選擇使用者群组之下的一個新使用者群 組。當管理使用者點按(clicks):應用"(appiy)按鈕921時, 存取過濾器2 0 3就會修改它的存取控制資料庫3 〇 1之拷貝, 以便證實何種東西在顯示圖901上;並且將修改資訊傳播 到:在VPN中的所有存取控制資料庫3〇 1之拷貝。 視窗909顯示使用者。藉由識別在集合中之使用者所依 照的方式’將使用者之一集合指示於顯示圖中。在此情形 下,使用者都是藉由I P位址來識別,而他們則都會以j p 位址之範圍出現在顯示圖中。按鈕帶913指示:能夠顯示 在視窗909中之其它種類的識別方法。就像利用視窗9〇3那 樣’當視窗是現用狀態時,能夠使用"新增"和"刪除"兩個 按鈕來增加和刪除使用者。要將由使用者識別資訊所載明 的(諸多)使用者指定給一使用者群组,GUI之使用就會選 擇:一使用者群组,如在917處所顯示的,以及識別資訊 之一集合,如在919處所顯示的;然後再使用在按鈕帶913 中的”增加到使用者群组_,(add to group)按鈕,將識別資訊 之集合增加到使用者群组,就像由以下事實所顯示的那 樣:在919處之被選擇I p位址之範圍現在會出現在位於9 i 7 處之被選擇使用者群組之下的層次中。本操作之效應是: 使諸多使用者成爲”研發"(R&D)使用者群组的成員,該使 -54- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) --------------1 I ^--------訂·--------線"、 ^閱讀背面之注音?事項再填寫本頁} 44838 7 經濟部智慧財產局員工消費合作社印^ί A7 B7 五、發明說明(52 ) 用者的對話都具有列示在9 17處的來源I P位址;並且,當 使用者點按:"應用"按鈕時,於是所有存取控制資料庫 301之拷貝都被修改。 圖10顯示:用來定義資訊集的顯示圖1001,此處,視窗 1003包含—種資訊集的分層列表,而視窗1005則包含一種 可用資源的分層列表。用與使用者群组之列表相同的方法 來制定:資訊集的分層列表,以及可用使用者群组的分層 列表。再者’顯示圖丨〇〇丨之使用者有管理權限加以管轄的 資訊集和可用資源都呈現黑色;而在列表上的其它項目則 都呈現灰色。在視窗100丨中,可用資源爲:網際網路和組 成VPN 201的兩個位置。在一種更加開發的VpN 2〇1中, 可用資源的列表應該指示:在位置處的伺服器,在伺服器 中的服務,以及由服務所提供的資訊項。譬如説,若服務 提供一種目錄樹,則應該藉由—個路徑名稱(pathname)來 指示包含在目綠樹中的資訊項;該路徑名稱會載明目錄樹 之根部(root),並且會使用通配字元(wiidcard仏“扣匕⑷來 載明在目錄樹之根部以上的一些檔案。當將一資源增加到 一伺服器時,可能經由視窗1〇〇5來定義資源。於是,已經 疋義了資源,可能用與一使用者識別資訊被指定给一使用 者群組相㈣方式來將—資源指定给—資訊集。再者,點 m㈣會使顯示@1QQI中的改變傳播到所有存取 控制資料庫3 0 1之拷貝。 圖1丨顯不:用來定義決策的顯示圖丨1〇i。將哪一類型的 決策正在被定義加以載明於按鈕帶m3中;如在那裏所指 -55- 本纸張尺度過用中國园家標準(CNS)A4規格(210 297公釐) — .11 —---------- *------—訂·--------1 \ {請先閱讀背面之注意事項再填寫本頁) 4483 8 經濟部智慧財產局員工消費合作社印*'《 A7 B7 五、發明說明(53 ) 示的,顯示圖110丨正在定義存取決策3所有的決策顯示圖 都具有相同的通用格式:一視窗丨丨03,它包含使用者群組 之一分層顯示圖:一視窗U05,它包含可能定義決策所針 對的物件層次之一顯示圖:以及—決策定義視窗丨1〇7,它 包含一些存取決策定義1108。在物件層次中,顯示圖u〇 1 之使用者有權定義決策所針對的物件都呈現黑色;而其它 的則呈現灰色β在顯示圖1 101中,正在被定義的是存取決 策,所以物件都是資訊集。 每個存取決策定義都有四個部份: .一現用(active)圈選框1117,它指示由決策定義所定義 的存取決策是否現用的,即:正在被用來控制存取操 作: •存取決策正在被定義所針對的使用者群组1 119 ; *存取決策正在被定義所針對旳資訊集1 12 3 :以及 ,存取操作櫚位Η 2 1,它指示存取操作是否被容許或拒 絕,藉以定義存取決策。 選單帶(menu bar)1109和按鈕帶ms允許決策制定者決策 容許如此做的那些管理員加以編輯,增加,刪除,以及啓 動(activate)或撤除(deactivate)—種被選擇決策定義丨1〇8。 每個決策定義1108的現用圈選框1Π7允許管理員啓動或撤 除選擇決策定義Π 08 ;存取操作欄位丨1 2 1允許管理員選擇 容許或拒絕作爲決策。在按鈕帶π丨5中的|,硎除”按鈕允許 管理員刪除一項被選擇決策:而,,新增,.按鈕則允許管理員 刎定一種新決策定義11 〇 8 ;要執行此事,管理員會選擇· ---- ^ ---------Jtr· ---------I » (請先閱請背面之注意事項再填寫本頁) -56 - 44838 7 經濟部智慧財產局具工消費合作社印製 A7 B7 五、發明說明(54 ) 在視窗Π 03中之一使用者群組以及在視窗丨丨〇5中之一資訊 集:然後會按”新增"按鈕。新的存取決策定義1 1〇8出現在 顯TF圖I 1 〇7中:並且’管理員能夠编輯新的存取決策定 義,如剛才所描述的。要將改變應用到存取控制資料庫 301,並將它傳播到所有的存取過濾器2〇3 ;管理員會點按 在"應用”按鈕1125上。 顯示圖ποι也包含一種決策評估者工具程式(p〇Hcy evaluatortoo丨),它讓管理員看出:存取決策定義的目前集 合怎樣決定針對一既定使用者群組或資源集的存取操作。 當管理員點按:按知帶1113中的”決策評估,,(p〇ncy evaluation)按鈕,並從顯示圖n〇3中選擇一使用者群组 時·’該工具程式就會顯示:被選擇使用者群组呈現藍色: 決策定義允許使用者群组存取而在顯示圖UQ5中的所有資 訊集呈現綠色:而其餘的則呈現紅色:與哪些資訊集可能 被使用者群組存取之決定有β㈣所有決策定義都被凸^ 相同的顏色集合中》若管理員選擇一資訊集1 ' 的:情;然後,評估者工具程式會顯示:被選擇資訊集。 現篮色,能夠存取資訊集的所有使用者群組呈現綠色= f餘:則呈現紅色,因而也會凸顯出1有 我。使用者也能夠選擇-項決策。在那種情形了 = ,現藍色’而受決策影響的使用者群組和資訊集= 主現監色或紅色,就像由決策所決定的 ' Γ> 另外選擇-個以上的:使用者群組,資#。使用者能夠 那種情形下,評估者工具程式對每項 $ ,朿。在 、穴東顯示:應用到所 57- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公发 ί碎-^閱^背面之注意事項再填寫木頁)InterfaCe's (GUI for short) corresponds to this work. The display diagram consists of two windows, each of which contains representations of entities intended to be related to each other, while the system does not select the entity and the place where it is needed to define it, thus defining the relationship. Defining user groups: Fig. 9 3 Defining user groups: Fig. 9 Fig. 9 α shows a display 901 for populating and defining user groups. Window 903 in the display map contains a layered display of one of the currently defined user groups; window 903 and those used to display the Wind〇ws% trademarks manufactured by Microsoft Corporation (Microsoft Corporation) The operation system is similar to the first-level IA case-level window. In the window 903, all the user groups targeted by the management user that Tu Can's management user is using are displayed in black; all other user groups are displayed in gray. On the two views ®: Two button bars (91i and 915). Button tape 91 lists: some available displays used to modify the access control database 3101, while button tape 915 lists: those that may be performed on those displays — some operations. Thus, the button labeled "User Group" in the button strip 911 is highlighted, thus indicating that the display figure 901 is a display diagram for colonizing and defining the user group. Regarding the button strip 915, when Windows 903 is currently used -53- This paper size applies to China National Standards (CNS) A'l specifications (21G X 297 public love y ------------------ ------ Order .-------- line > (Please read the precautions on the front of the goods before filling out this page) 4 48387 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs " 2. Description of the invention (51) When the status is' right to manage one of the user groups, the management user may modify the user group, the method is: select the user group in the window 903: and use the button with 9 Click the "delete" button in 1 5 to delete the user group; or use the "new" button to add and name the selected user group in the hierarchy A new user group of. When the management user clicks the (clicks): Apply (appiy) button 921, the access filter 2 0 3 will modify its access control A copy of the database 301 to verify what is on the display map 901; and to propagate the modification information to: a copy of all the access control database 301 in the VPN. The window 909 displays the user. By The way to identify users in a collection is to 'indicate one collection of users in the display. In this case, users are identified by IP addresses, and they are all identified by jp addresses. The range appears in the display. The button with 913 indicates: other types of identification methods that can be displayed in window 909. As with window 903, 'When the window is currently in use, you can use "Add" and " Delete " Two buttons to add and delete users. To assign the (many) users specified by the user identification information to a user group, the use of the GUI will choose: a user group , As shown at 917, and a collection of identification information, as shown at 919; then use the "add to group" button in the button strip 913 to add the identification information The set is added to the user group, as shown by the fact that the range of the selected IP address at 919 now appears below the selected user group at 9 i 7 In the hierarchy, the effect of this operation is: make many users become members of the "R & D" user group, which makes -54- this paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -------------- 1 I ^ -------- Order · -------- line ", ^ Read the phonetic on the back? Please fill in this page again for the matter} 44838 7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ ί A7 B7 V. Description of Invention (52) The user's dialogue has the source IP address listed at 9 17; and, when used When the user clicks the " Apply " button, all copies of the access control database 301 are modified. Figure 10 shows a display diagram 1001 used to define an information set. Here, window 1003 contains a hierarchical list of information sets, and window 1005 contains a hierarchical list of available resources. It is formulated in the same way as the list of user groups: a hierarchical list of information sets, and a hierarchical list of available user groups. Furthermore, the information set and available resources that the user has management authority to manage in the display diagram 丨 〇〇 丨 are shown in black; all other items on the list are shown in gray. In Windows 100, the available resources are: Internet and two locations that make up VPN 201. In a more developed version of VpN 201, the list of available resources should indicate: the server at the location, the services in the server, and the information items provided by the service. For example, if the service provides a directory tree, the information item contained in the green tree should be indicated by a pathname; the path name will specify the root of the directory tree and will use A wildcard character ("wiidcard" is used to indicate some files above the root of the directory tree. When adding a resource to a server, it is possible to define the resource through window 105. So, it has been The resource is defined, and the resource may be assigned to the information set in a way that is similar to a user identification information assigned to a user group. Furthermore, clicking m㈣ causes the changes in the display @ 1QQI to be propagated to all storages. Take a copy of the control database 3 01. Figure 1 丨 Display: display diagram for defining decisions 丨 10i. Which type of decision is being defined and specified in the button band m3; as shown there Refers to -55- This paper has passed the Chinese Gardener's Standard (CNS) A4 specification (210 297 mm) — .11 —---------- * ------— Order ·- ------- 1 \ (Please read the notes on the back before filling this page) 4483 8 Member of Intellectual Property Bureau, Ministry of Economic Affairs Printed by the Industrial and Consumer Cooperatives * "A7 B7 V. Description of the invention (53), display diagram 110 丨 Defining access decision 3 All decision display diagrams have the same general format: a window 丨 丨 03, which contains the use of Hierarchical display of one of the user groups: a window U05, which contains one of the object levels for which decisions may be defined: and-a decision definition window 1107, which contains some access decision definitions 1108. In the object In the hierarchy, the user of the display map u〇1 has the right to define the objects to which the decision is directed, while the others are gray. In the display map 1 101, the access decision is being defined, so the objects are Information set. Each access decision definition has four parts: An active checkbox 1117, which indicates whether the access decision defined by the decision definition is active, that is, it is being used to control the access decision. Fetch operations: • The access group is being defined for the user group 1 119; * The access decision is being defined for the user information set 1 12 3: and, the access operation is located 2 1, which indicates the storage Fetch operation Allow or deny to define access decisions. Menu bar 1109 and button strip ms allow decision makers to decide which administrators are allowed to edit, add, delete, and activate or deactivate ) —Selected decision definitions 丨 108. The active circle check box 1Π7 of each decision definition 1108 allows the administrator to start or remove the selection decision definition Π 08; access the operation field 丨 1 2 1 allows the administrator to choose to allow or Reject as a decision. The |, delete button in the button with π 丨 5 allows the administrator to delete a selected decision: while, the new,. Button allows the administrator to define a new decision definition 11 〇8; To do this, the administrator will choose · ---- ^ --------- Jtr · --------- I »(Please read the notes on the back before filling in this page ) -56-44838 7 Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Industrial Cooperatives A7 B7 V. Description of the invention (54) One of the user groups in window Π 03 and one of the information sets in window 丨 丨 05: Then press the "Add" button. A new access decision definition 1 108 appears in the display TF graph I 1 07: and the 'administrator can edit the new access decision definition, as just described. To apply the change to the access control database 301 and propagate it to all access filters 203; the administrator will click on the "Apply" button 1125. The display also contains a decision evaluator Tool program (p〇Hcy evaluatortoo 丨), which allows administrators to see how the current set of access decision definitions determines access operations for a given user group or resource set. When the administrator clicks: When you click the "p〇ncy evaluation" button in 1113 and select a user group from the display diagram n03, the tool program will display: The selected user group is blue: The decision definition allows user group access and all the information sets in the display UQ5 are green: and the rest are red: The decision as to which information sets may be accessed by the user group is β. All decision definitions are Convex ^ in the same color set "If the administrator selects an information set 1 ': Situation; then, the evaluator tool program will display: The selected information set. The current basket color, all user groups that can access the information set are green = f surplus: it is red, so it also highlights 1 have me. The user is also able to select -items. In that case, =, now blue 'and the user groups and information sets affected by the decision = the main monitor color or red, just like the' Γ > determined by the decision. In addition, select more than one: user Group, information #. The user can, in that case, the evaluator tool program treat each item $, 朿. In and Dongdong show: Applicable to the Institute 57- This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 public hair 碎 broken-^ read the notes on the back and fill in the wooden pages)

經濟部智慧財產局員工消費合作社印製 .44838 7 Α7 Β7 五、發明说明(55 ) 有的被選項,以及那些決策的效應。評估者工具程式能夠 藉由點按在按鈕帶1113中的決策許估"按鈕來關斷(truned off) ’而顏色和凸顯功能(highlights)則能夠藉由點按在按 紅帶1115申的11重新設定評估"(reset evaiuati〇n)按紅來關 斷,以便針對一項新的決策評估而準備。 圖12顯示:顯示圖1201被使用來將關於一存取過遽器 203的資訊輸入到存取控制資料庫301。視窗1203顯示:存 取過遽器203之一分層列表;當視窗是現用狀態時,可能 使用在按鈕帶1209中的"新增"和"刪除"兩個按鈕來增加或 刪除存取過濾器。視窗1205被用來輸入或顯示關於存取過 濾器203的資訊。在視窗Π07中的顯示圖是藉由點按在按 紅帶1207中之一按4s來決定的;如按紅所顯示的,能夠使 用在$見窗1207中的顯示圖,以便:輸入並檢视關於諸多存 取過漉器203之網路連接的資訊,輸入並檢視關於那些連 接之信賴等級的資訊,針對可用伺服器和服務而掃描網 路,針對存取過濾器203中所檢測的問題而建立警戒資訊 (alerts) ’載明針對軟體的可選擇參數,以及載明存取控制 資料庫301改變的分配順序。》警戒資訊建立"(alert setup:( 的凸顯功能指.示·顯示於圖1 2中的顯示圖1205是用來顯示 並建立警戒資訊的顯示圖》· 用來發明資源的使用者界面:圖1 8和2 4 3用來發明資源的使用者界面:圖1 8和2 4 VPN 201的使用者都有一種用來察看在VPN 201内何種資 源可供他們利用的界面。在此處稱為IntraMap(映像内)界 _____- 58- 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐) I ------------4%^.--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 44838 7 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(56) 面(IrmaMap 是 罔路立力—公司(Internet Dynamics,Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs.44838 7 Α7 Β7 V. Description of Invention (55) Some options and the effects of those decisions. The evaluator tool program can be turned off by clicking the decision button " button in the button belt 1113, and the color and highlights can be applied by clicking on the red belt 1115 11Reset evaluation " (reset evaiuati〇n) Turn off according to the red in order to prepare for a new decision evaluation. FIG. 12 shows: FIG. 1201 is used to input information about an access controller 203 into the access control database 301. Window 1203 displays: a hierarchical list of one of the accessors 203; when the window is active, the two buttons "Add" and "Delete" in the button strip 1209 may be used to add or delete Access filter. The window 1205 is used to input or display information about the access filter 203. The display in window Π07 is determined by clicking on one of the red buttons 1207 and pressing 4s; as shown in red, the display in window 1207 can be used to: enter and check Enter and view information about the trust level of those connections based on information about the many network connections that have accessed the 203, scan the network for available servers and services, and detect problems detected in the access filter 203 The alert information (alerts) is established to specify optional parameters for the software and to specify the allocation order changed by the access control database 301. "Alert setup: (" alert setup: ("highlights the function instructions. The display shown in Figure 12 shows the display of 1205 is used to display and create the display of the warning information." User interface for inventing resources: Figures 18 and 24 User interfaces for inventing resources: Figures 18 and 24 Users of VPN 201 have an interface to see what resources are available to them in VPN 201. Here It is called the IntraMap (intra-image) boundary ___- 58- This paper size applies to the Chinese National Standard (CNS) A4 specification (210 χ 297 mm) I ------------ 4% ^ .- ------- Order --------- line (please read the notes on the back before filling this page) 44838 7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Invention Description ( 56) IrmaMap (Internet Dynamics,

Incorporated)之一商標)的界面,至少會對每位使用者顯 示··屬於使用者可能根據針對使用者所屬之使用者集合的 存取決策來存取之資訊集的資源。在其它一些實施例中, intraMap也可能將資源的靈敏度等級以及使用者之識別方 法的信賴等級加以考慮。 藉由一種小爪哇程式(JaVaTM appiet)來建構界 面,該程式是在任何配備有java的全球資訊網(www)瀏覽 器上執行的。使用網路瀏覽器,使用者能夠掃描圖形顯示 圖,以便:尋找並存取可供使用者利用的資源:或者,請 求存取目前不是可供使用者利用的資源。由使用者存取資 源是由應用到使用者和資源的諸多存取決策所決定。圖 1 8顯示:由IntraMap界面所產生顯示圖18〇1。IntraMap顯 示圖1801的左侧顯示:資源列表18〇3 :而顯示圖的右側則 顯示:尋找(Find)攔位1807,排序(Sort)區段18〇9,服務 (Services)區段 1811,以及描述(Descripti〇n)欄位 1813。藉 由點按"輔助"(Help)按鈕1815而使使用intraMap的線上輔 助程式(on-line help可供利用)。 資源列表1 803顯示:針對正在使用IntraMap界面的使用 者而言’在VPN 20 1中之可供利用的資源和資訊。這種列 表疋分層的。使用者能夠藉由點按在分支上的„ + "和"_ „ 標記來擴展(expand)或縮減(collapse)”樹"的分支。在列表 中的每個登載項(entry)1804都會包括資源名稱。用來顯示 登載項之顏色則指示:使用者具有何種存取操作D若登載 -59- 本紙張尺度適用中國國家標準(CNS)A4規柊(210 X 297公发) 裝--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 44838 經濟部智慧財產局員工消費合作社印$Λ A7 B7 五、發明說明(57 ) 項I 804被顯示呈現藍色:則使用者具有—種針對資源的現 用超通信鏈路(hyperlink) ’並可能點按資源兩次,以便將 它顯不出來《若資源被顯示呈現黑色,則雖然它也可供使 用者利用,但卻沒有超通信鏈路可供利用,所以必須使用 一種分離應用程式來檢索資源。雖然被.顯示呈現灰色的資 源都不是直接地可供使用者利用,但是如果使用者選擇一 項資源’ IntraMap界面就會開啓一對話盒(dialog box):允 許使用者將请求存取操作的電子郵件(e_mail)發送給管理 員’該管理員對資源所屬之資訊集的存取決策負有貴任。 然後’管理員必要時可能修改存取及/或管理決策,以便 賦予使用者存取操作。管理員可能進一步賦予資源,,隱藏„ 特性(hidden property)。當資源具有該特性時,唯若使用者 屬於存取決策允許存取資源所屬之一資訊集之一使用者群 組’資源才會出現在IntraMap界面1801中。若資源不具有 隱藏特性’則它總會出現在IntraMap界面1801中。在其它 情況,它不會出現。資源可能具有一項比包含在它的登載 項1 804中的描述還要詳細的描述。當使用者選擇資源時, 該項描述就被顯示於描述欄位181 3中。 除了資源列表1803之外,IntraMap顯示圖丨丨還奋顯示 兩個專業化(specia丨ized)資源列表在1805處。 • M何者最新’’(What’s New) 1806顯示:來自企業内之其 它部門的最近資訊告示(postings)。若管j里員已經賦予 使用者存取”何者最新”之網頁,則使用者可能將一項 新資源之URL(共通資源指標)公告在那裏。 -60 * 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公发^ ---Λ衣·-------訂·--------'線 * t (請先閱is背面之注意事項再填寫本頁> 448387 A7 B7 五、發明說明(58 ) •"何者最受歡迎"(What's Hot) 1 808基於資源多久才被 存取’顯示出企業之最受歡迎的資訊資源。 在18 11處的服務類型控制表會讓使用者過濾一些按照提 供'k源的服務類型而打算顯示在資源列表1 g〇3中的資源, 在服務類型控制表1 811中,每種服務類型都有一個圈選 框。若該框被圈選,則包括該服務類型且與此服務有關聯 的資源都會出現在資源列表中。在其它情況,與此服務有 關聯的資源都不會出現在資源列表中。 intraMap界面讓使用者按照:資訊集,位置,或服務來 排序資源列表1803。要執行這件事,使用者會選擇他想要 的方式來排序在排序欄位1 8 〇 9中的資源列表。使用者也可 能會載明資源種類(categories)被使用在排序欄位中的順 序。該界面還具有一種搜尋功能。要執行搜尋功能,使用 者會將一搜尋字串(search string)輸入"尋找"欄位1 807中。 然後依照載明於排序攔位1 8〇9中的順序,加以搜尋針對關 於字串之諸資源的資源列表和資源描述。搜尋功能只是找 尋全邵或邵份的字组匹配(worci matches)而已。情形不是 挺靈敏的’顯示出第一次匹,就可能使用一些功能鍵,以 便指引(navigate)到其它的匹配。當然,若使用者尚未核對 在服務類型欄位1811中之一服務類型,則該服務類型的諸 多資源在排序或搜尋操作中都未涉及。 圖2 4顯示:IntraMap界面之一建構例2401。對於VPN 201 的使用者,IntraMap界面以網頁出現,該網頁是由正在圖 2之存取過濾器203 (c)上執行的報表管理程式209所提供的 -61 - 本纸張尺度適用中固@家標準(CNS)A4規格(210 * 297公发) (請先閱讀背面之注意事項再填寫本頁)Incorporated (a trademark of Incorporated)), at least for each user is displayed. · Resources that belong to the information set that the user may access according to the access decision for the user set to which the user belongs. In other embodiments, intraMap may also consider the sensitivity level of the resource and the trust level of the user's identification method. The interface is constructed by a Java program (JaVaTM appiet), which is executed on any World Wide Web (www) browser equipped with java. Using a web browser, users can scan graphic displays to: find and access resources available to users: or request access to resources that are not currently available to users. Access to resources by users is determined by many access decisions that apply to users and resources. Figure 18 shows: The display generated by the IntraMap interface is Figure 1801. The left side of the IntraMap display map 1801 shows: the resource list 1803: and the right side of the display map shows: Find 1807, Sort section 1809, Services section 1811, and The Description field is 1813. By clicking the "Help" button (Help) 1815, you can use the on-line help program of intraMap (available on-line help). The resource list 1 803 shows: For users who are using the IntraMap interface, the resources and information available in VPN 20 1 are available. This list is not hierarchical. The user can expand or reduce the branches of the tree " by clicking on the "+ " and " _" tags on the branches. Each entry in the list is 1804 The name of the resource will be included. The color used to display the posted items indicates: what access operations the user has. D If posted -59- This paper size applies the Chinese National Standard (CNS) A4 Regulations (210 X 297). -------- Order --------- line (please read the notes on the back before filling this page) 44838 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs $ Λ A7 B7 V. Description of Invention (57) Item I 804 is displayed in blue: the user has a kind of current hyperlink for the resource and may click the resource twice to make it invisible. "If the resource is displayed and presented Black, although it is also available to users, but there is no hyper communication link available, so a separate application must be used to retrieve the resources. Although the resources shown in gray are not directly available to users Use, but if the user chooses one Item Resource 'IntraMap interface will open a dialog box: Allow the user to send an email (e_mail) requesting an access operation to the administrator' The administrator has responsibility for the access decision of the information set to which the resource belongs Your responsibility. Then the 'administrator may modify the access and / or management decisions, if necessary, to give the user access. The administrator may further assign resources, and hide hidden properties. When the resource has this characteristic, the resource will only appear in the IntraMap interface 1801 if the user belongs to a user group that is an information set of an information set to which the access permission belongs. If the resource does not have the hidden feature ’, it will always appear in the IntraMap interface 1801. In other cases, it does not occur. A resource may have a more detailed description than the description contained in its publication 1804. When the user selects the resource, the description is displayed in the description field 1813. In addition to the resource list 1803, the IntraMap display map also shows two specialized resource lists at 1805. • What ’s New 1’1806 shows: recent information postings from other departments within the enterprise. If the administrator has given the user access to the "Which is the latest" web page, the user may post a URL (common resource indicator) of a new resource there. -60 * This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 public hair ^ --- Λ clothes · ------ order · -------- 'line * t ( Please read the notes on the back of is before filling in this page > 448387 A7 B7 V. Invention Description (58) • " Which is the most popular " (What's Hot) 1 808 Based on how long the resources have been accessed, it shows the company The most popular information resource. The service type control table at 18 11 allows users to filter some resources that are intended to be displayed in the resource list 1 g03 according to the service type of the 'k source'. In 1 811, each service type has a circled box. If the box is circled, resources that include the service type and are associated with this service will appear in the resource list. In other cases, this service has The associated resources will not appear in the resource list. The intraMap interface allows the user to sort the resource list by information set, location, or service 1803. To perform this, the user will choose the way he wants to sort in Sort resource list in field 1 809. Users may also Indicates the order in which categories are used in the sort field. The interface also has a search function. To perform a search function, the user enters a search string into the " find " field 1 807. Then search the resource list and resource description for the resources related to the string according to the order specified in the sorting block 1 809. The search function is only to find the word matching of the whole or Shao Fen (worci matches). The situation is not very sensitive. 'The first match is displayed, it is possible to use some function keys to navigate to other matches. Of course, if the user has not checked one of the service type fields 1811 Service type, then many resources of this service type are not involved in the sorting or search operation. Figure 24 shows a construction example 2401 of the IntraMap interface. For users of VPN 201, the IntraMap interface appears as a web page. The report management program 209 running on the access filter 203 (c) in FIG. 2 provides -61-This paper size is applicable to China Solid @ 家 standard (CNS) A4 specification (210 * 297 public hair) (Please read the notes on the back before filling this page)

I i 1 * n I— ! - I I 經濟部智慧財產局員工消費合作社印製 4483 8 7 A7 ---- B7 一· 一 五、發明說明(59 ) (請先sals背面之注意事項再填寫本頁) 諸多資源中的一種資源。在VPN 20{中之—使用者;或 者’甚至於一般大眾(那就是:成爲網際網路使用者群組 足一成員的某人)都可能用與他可能被賦予存取任何其它 資源相同的方式,被賦予存取IntraMap界面。就像從下列 描述中將會顯而易見的那樣,針對IntraMap的網頁可能是 在VPN 201中的任何伺服器上。建構例24〇丨具有:在工作 站(workstation)2403中’由使用者所使用以便審視(look at)I i 1 * n I—!-II Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4483 8 7 A7 ---- B7 I. Fifth, the invention description (59) (please fill in the precautions on the back of sals first Page) One of many resources. In VPN 20 {-the user; or 'even the general public (that is: someone who is a full member of the Internet user group) may use the same as he may be given access to any other resource Mode, given access to the IntraMap interface. As will be apparent from the description below, the web page for IntraMap may be on any server in VPN 201. Construction example 24〇 丨 has: in a workstation 2403 'used by a user to look at

IntraMap的組件;在對工作站24〇3而言是局部的存取過濾 器203(1 )中的组件;以及在存取過濾器2〇3 (c)中的组件, 該存取過濾器是報表管理程式2〇9會在其上執行的存取過 濾器。當然’存取過濾器203(c)也可能執行一種局部存取 過濾器那樣的功能《局部存取過濾器203 (I)是藉由VPN 201而連接到報表存取過濾器203 (c),而工作站2403則是藉 由區域網路(LAN)2 13而連接到局部存取過濾器203 (I)。 線· 經濟部智慧財產局員^-消費合作社印製 就像稍後將要更加詳細説明的那樣,所有的存取過濾器 203都具有一種分層架構(layered architecture)。最底層級 是一種網際網路分包資訊(IP)過濾器24 1 9,它只是處理網 際網路分包資訊標題而已。分包資訊過濾器24 19讀取在網 際網路分包資訊標題中的來源和目標位址,並將一套規則 應用到分包資訊。就像由規則所決定的那樣,I P過濾器不 是接受它們,捨棄它們;就是進一步在VPN 20 1中路由指 引著它們。該規則也會決定:在存取過瀘器203内,打算 怎樣路由指引諸多被接受分包資訊。架構中的下一層級是 _ 服務代理伺服器(service proxies)2427。服務代表伺服器會 -62- 本紙張尺度適用中囷國家標準(CNS)A4規格(210 X 297公釐) 448387 A7 B7 經濟部智Μ財產局員工消費合作社印製 五、發明說明(6〇 取針對諸如全球資訊網(WWW)之服務的通信量,並執行 關於通彳&量的存取核對。若存取過濾器203提供服務本身 或執行針對提供服務之一伺服器的存取核對,則IP過濾器 2 419會將針對服務的分包資訊發送到針對服務之一服務代 理伺服器2427。服務代理伺服器使用存取控制資料庫301 來執行針對服務的通信協定層級之存取核對。譬如説,針 對網路(Web)服務的服務代理伺服器可能檢查:正在提出 一項針對既定網頁的請求之使用者是否有權存取該網頁。 下一個更南層級是服務層級2425 ;若有關的服務代理伺服 器允許一项請求且存取過濾器也是針對該服務的伺服器, 則打算處ί里前往在服務層級2425處之服務的請求。在網頁 之情形中,該服務應該指出網頁的位置,並將它轉回給請 求者。在IntraMap中,涉及兩種服務:web(網路)服務和 IntraMap服務。在圖2401中’ Web服務以WebS 2423出現。 針對WebS 2423的代理伺服器是WebP 242 1 ;爲了在下列描 述中將會變得顯而易見的諸多理由,IntraMap服務只有一 個代理伺服器:IntraMap 2417 »此外,存取控制資料庫 301包括IntraMap資訊2422,它是一種在存取控制資料庫 301中之資訊的最佳化版本(optimized version),可作 IntraMap顯示圖的基礎用β 關於在存取過濾器203 (c)與存取過濾器203 (I)之間的 IntraMap建構例的主要差異是:存取過濾器203 (c)包括一 種具有IntraMap小爪哇程式2411之拷貝的全球資訊網網頁 241 0。當從存取過滤器203 (I)下載(downloaded)到工作站 -63- 本紙張尺度適用中國國家標準(CNS)A4規格(210 * 297公爱) --------- f I ! -----------1 訂·--------*線— I {請先閱請背面之江意事項再填寫本頁) 4483 8 7 A7 B7 五、發明說明(61 ) 2403中的網路瀏覽器2429時,小爪哇程式24 11會產生指向 IntraMap词服器2425的請求,進而使用由intraMap伺服器 2425所轉回的結果來產生intraMap顯示圖I 801 〇 操作如下對於工作站2403的使用者,IntraMap可能以 針對網頁之一通信鏈路出現。於是,要使用IntraMap,使 用都會啓動針對1:1的以30網頁241〇之一通信鍵路。在工作 站2403中的網路/劉覽器2429會對啓動通信鏈路作回應,就 像它應該對啓動針對網頁之任何其它通信鏈路作回應那 樣:它提出一項針對網頁的請求,並將該請求發送到通信 鍵路中所和示的词服器。在針對IntraMap之通信鏈路的情 形中’因爲通仏鏈路載明在存取過遽器203 (c)中的網路伺 服器2423 ’所以請求會經由局部存取過濾器2〇3⑴和vpN 201而前往存取過濾器2〇3 (c)。就像對於VPN 201中之一資 源的任何其它存取操作那樣,局部存取過濾器2〇3 (1)會執 行針對IntraMap網頁請求的存取核對。由於該請是針對網 頁’故而由網路代理伺服器242 1來完全存取核對。在大多 數的VPN 201中,對於在VPN 201中的任何使用者而言, IntraMap網頁2410將是可存取的;於是,存取控制資料庫 3 0 1指示:具有一有效I p來源位址的任何使用者都可能存 取 IntraMap網頁 24 10。 當存存取過遽器203 (c)中收到請求時,I p過渡器2419就 會將它轉遞到網路代表伺服器2421,它依序地將請求轉遞 到網路词服器2423 ’它藉著將IntraMap小爪唾程式2411下 載到工作站2403中的網路瀏覽器2429而對該請求作回應, -64- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公g ) (請先閱is背面之泫意事項再填寫本頁) 1 n I—r n 一°JI (^1 I I I I '^'^rKr . 烴濟部智慧財產局員工消費合作社印製 4483 8 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(62 ) 其中:IntraMap小爪哇程式24丨1開始在網路潮皆 φ 執行。在執行期間,它會將一項請求發送到針對論⑽叩 資訊2422的IntraMap代理伺服器2427。像所有的小爪哇程 式一樣,IrmaMap小爪哇程式2411會將請求發送到它所處 的伺服器’在這種情形下,就是存取過濾器⑽⑷。然 而,就像對於來自工作站2403的任何其它存取操作那樣’ 請求會藉由局部存取過濾器203⑴而前進。瞧,intraMap 代理词服器2427會檢測出請求被定址料取過遽器2〇3⑷ 中的IrmaMap代理伺服器2427 ’而不是將請求發送到存取 過遽器203 (c);從局部存取過遽器2〇3⑴中的存取控制資 料庫301之局部拷貝中獲得IntraMap資訊2422 ;過濾該資 訊,使得它載明:只會存取那些屬於使用者所屬的諸多使 用者群組所針對的資訊集之資源來產生列表243 1 ;進而經 由LAN 213,將它轉回給IntraMap小爪哇程式2411,該程 式隨後使用列表2431來產生IntraMap顯示圖18〇1。在產生 顯示圖方面,小爪哇程式2411會應用載明於請求中的任何 存取過濾器,也會排序如請求中所載明的列表。列表243 i 不但指π可供利用的資源,而且包含需要用來提取诉沈⑴ :貝源的訊。於疋,若資源具有—種超通信鏈路’則將超 通信链路包括在列表中;若它是一種雖然使用者目前不會 存取,但是使用者卻可能請求存取所針對的資源,則列表 包括:針對資源之管理員的名字和電子郵件地址。 存取控制資料庫3 〇 1之細節:圖1 3到1 7 3存取控制資料庫3〇1之細節:圖I 3到i 7 -65- 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) I I I I ^^1 __ _ 1— τ^ρ -Γ I * f— HI I I ^^1 ^~· II 11 ^^1 ^^1 --- I_I - . I I. (請先閱讀背面之注意事項再填寫本頁) 448387 A7 B7 五、發明說明(63 ) 在存取過漉器203之一較佳實施例中,在兩個層級處加 以建構存取控制資料庫30 1 : —個層級是由圖形使用者界 面所使用,以便操縱存取控制資料庫30i ;而另一個層級 則是使用在實際存取核對中。使用由微軟公司所發展出的 Microsoft Jet商標之資料庫系統來建構第一層級。第二層 級則是使用一些根據第一層級資料庫所編譯的記憶體映射 檔案(memory mapped files,簡稱MMF)加以建構的。下列 討論將會描述第一層級建構例’並且說明包含在其中的資 訊怎樣被使用在存取核對中。在研讀這項討論中,應該記 得:實際存取核對是使用MMF加以完成的,就像稍後將要 詳細描述的那樣。 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 就像對於大多數資料庫系統的情形那樣,Microsoft jet 商標之資料庫系統具有一種圖表,那就是:資料庫之遝輯 結構的一種描述。圖1 3到1 7都是:由針對存取控制資料 庫301之圖表的Microsoft Jet商標之資料庫系統所產生的顯 示圖。圖1 3顯示:針對定義諸多使用者群组之資料庫的 一部份的圖表1301。顯示圖由兩種要素组成:在資料庫中 的表之類別"(classes of tables) 1303的表示法,以及顯示 屬於表之某些類別的兩種表之間關係的"通信鏈路"丨3〇5的 表π法。表之類別的表示法顯示:在13 1〇處的類別名稱; 以及在1308處,將被包含在屬於該類別的每一種表中的,資 料欄位。每一種表的實例都有一種由資料庫系統所指定的 識別符(ID)。在表中的其它資料會隨著表之類別而變化。 藉著使用在第一表中之第二表的ID來建立一種在屬於表 -66 -Components of IntraMap; components in access filter 203 (1) that are local to workstation 2403; and components in access filter 203 (c), the access filter is a report The access filter on which the hypervisor 209 will run. Of course, the access filter 203 (c) may also perform a function like a local access filter. "The local access filter 203 (I) is connected to the report access filter 203 (c) through VPN 201. The workstation 2403 is connected to the local access filter 203 (I) through a local area network (LAN) 2 13. Line · Member of Intellectual Property Bureau of the Ministry of Economic Affairs ^ -Printed by Consumer Cooperatives As will be explained in more detail later, all access filters 203 have a layered architecture. At the lowest level is an Internet Subcontracting Information (IP) filter 24 19, which deals with only the header of Internet Subcontracting Information. The subcontracting information filter 24 19 reads the source and destination addresses in the Internet subcontracting information header and applies a set of rules to the subcontracting information. As determined by the rules, IP filters do not accept them and discard them; they further route them in VPN 20 1 to guide them. This rule will also determine how to route the received subcontracting information in the access server 203. The next level in the architecture is _ service proxies 2427. Service representative server meeting -62- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 448387 A7 B7 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs For traffic of services such as the World Wide Web (WWW), and perform access check on traffic & volume. If the access filter 203 provides the service itself or performs access check on one of the servers providing the service, Then the IP filter 2 419 sends the subcontracting information for the service to one of the service-oriented service proxy servers 2427. The service proxy server uses the access control database 301 to perform protocol-level access check for the service. For example, a service proxy server for a web service may check whether the user who is making a request for a given web page is authorized to access the web page. The next souther level is the service level 2425; if relevant Of the service proxy server that allows a request and the access filter is also for the service server, it is intended to go to the service at service level 2425 In the case of a web page, the service should indicate the location of the web page and return it to the requester. In IntraMap, two services are involved: web (network) service and IntraMap service. In Figure 2401 'Web The service appears as WebS 2423. The proxy server for WebS 2423 is WebP 242 1; for many reasons that will become apparent in the description below, the IntraMap service has only one proxy server: IntraMap 2417 »In addition, the access control database 301 includes IntraMap information 2422, which is an optimized version of the information in the access control database 301. It can be used as the basis for the IntraMap display map. About the access filter 203 (c) and storage The main difference in the IntraMap construction example between the filter 203 (I) is that the access filter 203 (c) includes a World Wide Web page 2410 with a copy of the IntraMap Java program 2411. When the access filter 203 (I) Downloaded to the workstation-63- This paper size applies to the Chinese National Standard (CNS) A4 specification (210 * 297 public love) --------- f I! ------ ----- 1 order — I {Please read the matter on the back, please fill in this page first) 4483 8 7 A7 B7 V. Invention description (61) When the web browser 2429 in 2403, the Java program 24 11 will generate a pointer to IntraMap The request from the server 2425, and then use the results returned by the intraMap server 2425 to generate an intraMap display I 801. The operation is as follows. For the user of the workstation 2403, IntraMap may appear as a communication link for a web page. Therefore, if you want to use IntraMap, you will start one of the 30 pages 2410 communication links for 1: 1. The network / web browser 2429 in workstation 2403 will respond to the initiation of the communication link, just as it should respond to initiation of any other communication link to the web page: it makes a request for the web page, and The request is sent to the word server shown in the communication link. In the case of a communication link for IntraMap 'because the communication link specifies the web server 2423 in the access server 203 (c)', the request passes through the local access filter 203 and vpN 201 and go to the access filter 203 (c). Just like any other access operation to one of the resources in VPN 201, the local access filter 203 (1) performs an access check for IntraMap webpage requests. Since the request is directed to the webpage ’, the web proxy server 2421 completes the access check. In most VPN 201, the IntraMap webpage 2410 will be accessible to any user in VPN 201; therefore, the access control database 3 0 1 indicates that it has a valid IP source address Any user of may access the IntraMap webpage 24 10. When the request is received in the storage access server 203 (c), the IP transitioner 2419 forwards it to the network representative server 2421, which sequentially forwards the request to the network server. 2423 'It responded to the request by downloading the IntraMap Claw Program 2411 to the web browser 2429 in the workstation 2403, -64- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 G) (Please read the notice on the back of is before filling out this page) 1 n I—rn 1 ° JI (^ 1 IIII '^' ^ rKr. Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Hydrocarbons 4483 8 Economy Printed by the Intellectual Property Bureau employee consumer cooperative A7 B7 V. Invention description (62) Among them: IntraMap Java program 24 丨 1 began to be implemented in the Internet tide. During the execution, it will send a request to the target theory ⑽ 叩 IntraMap proxy server 2427 of information 2422. Like all Java programs, IrmaMap Java program 2411 sends requests to the server it is in. 'In this case, it is an access filter.' However, , Just like any other access from workstation 2403 Do that 'The request will advance through the local access filter 203'. Voila, the intraMap proxy server 2427 will detect that the request was addressed by the IrmaMap proxy server 2427 in the address fetcher 203 'instead of sending the request Sent to the access controller 203 (c); IntraMap information 2422 is obtained from a local copy of the access control database 301 in the local access controller 203; the information is filtered so that it states: Access the resources belonging to the information set targeted by the user groups to which the user belongs to generate the list 243 1; and then transfer it back to the IntraMap Java program 2411 via LAN 213, which then uses the list 2431 to generate IntraMap displays Figure 180. In terms of generating the display map, the Java program 2411 will apply any access filters specified in the request, and will also sort the list as specified in the request. List 243 i not only means that π may be Resources for use, and contain the information needed to extract v. Shen: Beiyuan. Yu Xi, if the resource has a type of hypercommunication link ', the hypercommunication link is included in the list; if it is a The user currently does not have access, but the user may request access to the targeted resource. The list includes: the name and email address of the administrator of the resource. Access control database 3 〇1 details: Figure 1 3 to 1 7 3 Details of the access control database 3001: Figure I 3 to i 7 -65- This paper size applies to the Chinese National Standard (CNS) A4 (210 x 297 mm) IIII ^^ 1 __ _ 1— τ ^ ρ -Γ I * f— HI II ^^ 1 ^ ~ · II 11 ^^ 1 ^^ 1 --- I_I-. I I. (Please read the notes on the back before filling this page) 448387 A7 B7 V. Description of the Invention (63) In a preferred embodiment of the access controller 203, an access control database 30 1 is constructed at two levels: one level is used by a graphical user interface To manipulate the access control database 30i; the other level is used in the actual access check. The first level is constructed using the Microsoft Jet trademark database system developed by Microsoft Corporation. The second level is constructed using memory mapped files (MMF) compiled from the first level database. The following discussion will describe a first level construction example 'and show how the information contained therein can be used in access checking. In studying this discussion, you should keep in mind that the actual access check is done using MMF, as will be described in detail later. Printed by the Intellectual Property Office of the Ministry of Economic Affairs, Consumer Cooperatives. As is the case with most database systems, the Microsoft Jet trademark database system has a diagram that is: a description of the edited structure of the database. Figures 13 to 17 are display diagrams generated by the Microsoft Jet trademark database system for the diagram of the access control database 301. Figure 13 shows a diagram 1301 for a portion of a database that defines many user groups. The display diagram consists of two elements: the notation of "classes of tables" 1303 in the database, and the "communication link" that shows the relationship between the two tables that belong to certain categories of the table ; 丨 30 table method. The notation of the category of the table shows: the name of the category at 13 10; and at 1308, the data field that will be included in every table belonging to that category. Each instance of the table has an identifier (ID) assigned by the database system. The other information in the table will change depending on the type of table. By using the ID of the second table in the first table to create a belonging table -66-

44838 7 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(64 ) 之第一類別的第一表與屬於表之第二類別的第二表之間的 通信鏈路,反之亦然。於是,通信鏈路1 305顯示:能夠將,' 使用者群组樹"類別表1307中的一些表和"使用者群組,,類 別表1 309中的一些表加以鏈接。某些通信鏈路在它們的兩 個未端處都有數字。該數字指示:在數字所在之末端處, ;亥表可能具有的通信鍵路數目°於是,連接著類別表13 〇 9 和類別表13 0 7的通信鏈路具有:在針對類別表13 〇 9之末端 處的數字1,以及在針對類別表1 307之末端處的數字①; 因而指示:類別表1309之諸實例中的任何數目的id都可 能出現在類別表1 307之一實例中:但是,類別表13〇7之一 實例中的只有一個I D才可能出現在類別表1309之一實例 中。 使用者群组表:圖1 3 3使用者群组表:圖1 3 使用者群組表1301包含針對資料庫301中的每個使用者 群組之使用者群組類別表1309。在、使用者群組"類別表 1 3 09中’特別有興趣的資料包括:群組名稱,它是群組之 字元串(character-string)名稱;群组描述,它是群组之字元 串描述;以及預先定義的資訊,它指示其中成爲群组之一 成員的使用者是否爲:一位管理員,即,能夠制定管理決 策;一位安全官員,即’能夠制定決策制定者決策;或者 一位單純的資訊使用者。使用者群組表13〇 1會進—步將諸 多使用者群组组織成一種層次列表--不但爲了繼承權,而 且爲了顯示於圖9之視窗903中的使用者群組之分層顯示 -67- 本紙張尺度適用中i國家標準(CNS〉A4規格(210 X 297公t ) ------------— * x^·-------^ I--------,線 r、 (請先閱讀背面之注意事項再填寫本頁) 44838 7 經濟部智慧財產局員工消費合作社印製 A7 ------B7____ 五、發明說明(65 ) 圖’因而使使用者之識別方法與使用者群組有關聯,以及 使警戒貧訊與使用者群組有關聯,組織成層次列表是藉由 使用者群組樹"類別表1 3〇7中的一些表來完成的。”使用 者群組樹"類別表中的每一種表都會將"使用者群组"類別 表中之一表鏈接到一種母(parent)使用者群組(也是u使用 者群組"之類型)。對於一種特定"使用者群組"表而言,多 重"使用者群组樹,,表可能存在,端視一特定使用者群组出 現在其中之位置的數目而定。 就像已經提及的那樣,有五種不同的方式用來識別至一 存取過濾器203之使用者:藉由丨口位址範圍,藉由一種全 限疋網際網路網域名稱’藉由在Microsoft Wind〇ws商標之 作業系統中的使用者身份,藉由一種鑑定令牌,以及藉由 證書。針對藉由證書來識別使用者之表的類別表(table classes)被顯示在1321處。針對藉由I P位址範圍來識別使 用者之表的類別表被顯示在13 17處;針對藉由I p網域來識 別使用者之表的那些類別表被顯示在13 19處;針對藉由 Microsoft Windows商標之作業系統I D (識別符)來識別使用 者之表的那些類別表被顯示在13 15處;以及針對藉由鐘定 令牌(在圖中’標示為智慧卡)來識別使用者之表的那地ι類 別表被顯示在1323處。最後,類別表Π25會定義:針對與 使用者群組有關而用於警戒之資訊的一些表。"使用者群 组••類別表1309中之一表,可能使它與針對用來識別使用 者之任何方式的任何數目的表有關聯。就像此事音謂著那 樣*可能同時用很多不同的方式來識別—既定使用者。 -68 - 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公复) (請先Μ讀背面之注意事項再填寫本頁) ^·-------^----------疲' 4483 8 7 Α7 -—-__ Β7 五、發明說明(66 ) 經濟部智慧对產局員工消贄合作社印製 爲了執行存取核對,存取過濾器203必須決定:正在提 出请求之使用者屬於哪些使用者群组。該請求包括使用者 識別方法’因而識別方法是決定之起點。在使用者群組表 1301中的一些表都會允許存取過濾器203 :根據識別方法 來決定使用者屬於哪些使用者群组,並且根據那些使用者 群组來決定一些決定使用者所屬之其它使用者群組的分層 關係。假定使用者是藉由IP位址加以識別,存取過濾器 203藉由尋找"Ip位址範圍定義,,類別表(在13 17中)中的— 個或更多的表而開始運作’該類別表定義:包括使用者之 I P位址在内的I P位址之範圍。這些表中的每一種表都有 一條指向"I P位址範圍”類別表(在13丨7中)的通信鏈路,該 類別表使” I P位址範圍定義"類別表中所定義的範圍與— 使用者群組I D有關係,就對應於I p位址範圍的使用者群 組而T,它依序地可作爲一條指向"使用者群組類別表 1 309的通信鏈路之用。"使用者群組"類別表13〇9中的每_ 種表都有一條指向”使用者群組樹_,類別表! 3〇7的通信缝 路’因此能夠順著一些通信鏈路而指向針對—些使用者鮮 组的"使用者群組,,類別表,因而由j p位址所載明的—些 使用者群組都會繼承存取權利。於是,在處理過程結東 時’ I P過濾器203已經指出所有使用者群組的位置,它們 都與決定使用者是否可能存取資源有關。而且,I p過渡器 203根據請求而瞭解:怎樣識別使用者;並根據請求而能 夠決定:應該指定何種等級給用於請求中的使用者識別方 法β將使用者群組表1301中的資訊加以編譯進入mmf(記 -69- 本紙張尺度適用中國國家標準(CNS)A4規格(210 * 297公发) 483 8 7 A7 B7 經 濟 部 智 慧 貝才 產 局 員 工 消 費 合 社 印 η 五、發明說明(67 憶體映射檔案)中。當使用者初啓對話時,使用者會 提供-種使用者識別方法给在對話路徑上的第一存取過淚 器2〇3 ;存取過遽器203使用具有_F的使用者識別方 法,以便作出-項等效於以上所説明之—決定的決定。於 是,存取過遽器2〇3能夠決定:對於-既定使用者識別方 法而言,它是否識別有權存取資訊之一使用者;它是何種 使用者識別方法;因此它具有何種信賴等級;以及使用者 屬於哪些使用者群,组。於是,使用者群组表咖包含了·· 針對-項存取決策1108之使用者部份所需的所有資訊。 資訊集表:圖1 4 3資訊集表:圖1 4 圖14顯示:針對定義資訊集的_些表之圖表剛。這些 :會使諸多資訊集(在圖14中的資源群組)與组成它們的 s源有關係’並與資源之網路位置有關係;並且也會將諸 多資訊集组織成:在圖丨〇中之1〇〇3處所顯示之資訊集的 分層列表。在存取控制資料庫3〇i中的每個資訊集都是由” 資源群組”類別表丨4G3所表示。藉由表M19而將資源群组 滷別表中的些表加以組織成一種針對繼承權和顯示目的 勺層w >訊集與掌握中組成它的—些資源之間,以及虚 ,儲存它們在其中而在v p N中的—些位置之間的關係都是: 資匕源群组單元(resource group elements)類別表14〇7中的 _ ’斤建立的。可此將"資源群組"類別表鏈接到It資源 ^組早’’類別表中的任何數目的表。將資源群组單元” 颂引表中之—表鏈接到諸多類別表:’,網站單元”(Site (請先閱璜背面之iiti項再填寫本頁) -~k--------訂---------線.44838 7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. The communication link between the first table of the first category of the invention description (64) and the second table of the second category of the table, and vice versa . Thus, the communication link 1 305 shows that some tables in the 'user group tree' category table 1307 and "user groups" and some tables in category table 1 309 can be linked. Some communication links have numbers at both ends of them. The number indicates: at the end of the number, the number of communication keys that the watch may have. Therefore, the communication link connecting the category table 13 009 and the category table 13 0 7 has: at the category table 13 009 The number 1 at the end of it, and the number ① at the end of category table 1 307; thus indicating that any number of ids in the instances of category table 1309 may appear in one instance of category table 1 307: but Only one ID in one instance of the category table 1307 may appear in one instance of the category table 1309. User group table: Figure 1 3 3 User group table: Figure 1 3 The user group table 1301 contains a user group category table 1309 for each user group in the database 301. In the "User Groups" category table 1 3 09, 'The data of particular interest include: group name, which is the character-string name of the group; group description, which is the group's A string description; and pre-defined information indicating whether the users who are members of the group are: an administrator, that is, capable of making management decisions; a security officer, that is, capable of making decision makers Decision-making; or a mere information user. The user group table 1301 will further organize many user groups into a hierarchical list-not only for inheritance rights, but also for the hierarchical display of user groups shown in window 903 in FIG. 9- 67- This paper size applies to the national standard of China i (CNS> A4 specification (210 X 297 male t) ------------— * x ^ · ------- ^ I-- ------, line r, (Please read the notes on the back before filling this page) 44838 7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 ------ B7____ V. Description of the invention (65) Figure 'so that the user identification method is associated with the user group, and the alert message is associated with the user group, organized into a hierarchical list by the user group tree " category table 1 307 Some tables in the "user group tree" category table will link one of the "user group" category tables to a parent user group (Also the type of u user group). For a specific "user group" table, multiple "user group tree", the table may Here, it depends on the number of places in which a particular user group appears. As already mentioned, there are five different ways to identify users to an access filter 203: by丨 Port address range, by a fully-qualified Internet domain name 'by user identity in the operating system of the Microsoft Windows trademark, by an authentication token, and by a certificate. Table classes that identify the user's table by the certificate are displayed at 1321. Class tables for the table that identifies the user by the IP address range are displayed at 13 17; for the IP network Those category tables whose fields identify the user's table are displayed at 13 19; those category tables for the user's table identified by the operating system ID (identifier) of the Microsoft Windows trademark are displayed at 13 15; and The category table for the user's table identified by the clock token (labeled as a smart card in the figure) is displayed at 1323. Finally, the category table Π25 defines: Yu Jing Some tables of information. &Quot; User Groups • One of the category tables 1309 may make it relevant to any number of tables for any way to identify users. As the matter says That way * may be identified in many different ways at the same time-the intended user. -68-This paper size applies the Chinese National Standard (CNS) A4 specification (210 x 297 public). (Please read the precautions on the back before filling in this Page) ^ · ------- ^ ---------- Tired '4483 8 7 Α7 -—-__ Β7 V. Description of Invention (66) The wisdom of the Ministry of Economic Affairs on the elimination of cooperatives of employees of the Production Bureau In order to perform an access check, the access filter 203 must decide which user groups the user requesting belongs to. The request includes a user identification method 'so the identification method is the starting point for the decision. Some tables in the user group table 1301 will allow access to the filter 203: according to the identification method to determine which user groups the user belongs to, and according to those user groups, determine some other uses that determine which user the user belongs to Hierarchical relationship of the group. Assuming that the user is identified by an IP address, the access filter 203 starts to work by looking for one or more tables in the "IP address range definition," category table (in 13 17). The category table defines: the range of IP addresses including the user's IP address. Each of these tables has a communication link to the " IP address range " category table (in 13 丨 7), which makes the "IP address range definition " category table defined The range is related to the user group ID, which corresponds to the user group of the IP address range and T, which in turn can be used as a communication link to the " user group category table 1 309. use. " User Group " Each of the _type tables in the category table 1309 has a pointer to the "user group tree_, category table!" The communication path of 307 is therefore able to follow some communication links And pointing to the "user groups", "user groups," and the category table, which are specified by the jp address, these user groups will inherit the access rights. Therefore, when the process ends, 'The IP filter 203 has pointed out the location of all user groups, and they are all related to determining whether the user is likely to access the resource. Moreover, the IP transitioner 203 knows on request: how to identify the user; Decide: what level should be assigned to the user identification method used in the request β Compile the information in the user group table 1301 into mmf (note -69- This paper size applies the Chinese National Standard (CNS) A4 specification ( 210 * 297) 483 8 7 A7 B7 Printed by the Consumers' Association of the Intellectual Property Management Bureau of the Ministry of Economic Affairs. 5. The invention description (67 memory mapping file). When the user starts the conversation, the user will provide- Seed The user identification method gives the first accessor device 203 on the conversation path; the accessor device 203 uses a user identification method with _F in order to make-items equivalent to those described above. Decision. Therefore, the access controller 203 can decide: for a given user identification method, whether it recognizes a user who has access to the information; what user identification method it is; and therefore it has What level of trust; and which user groups and groups the user belongs to. Therefore, the user group table contains all the information needed for the user part of the -access decision 1108. Information set table: Figure 1 4 3 information set table: Figure 1 4 Figure 14 shows: the table for defining the information set of the table is just. These: will make many information sets (resource groups in Figure 14) and the s source that composes them "Related" and have a relationship with the network location of the resource; and will also organize many information sets into: a hierarchical list of information sets shown at 1003 in Figure 丨 0. In the access control database Each information set in 3〇i is classified by the "resource group" Table 丨 4G3. Through Table M19, the tables in the resource group table are organized into a layer for inheritance and display purposes w > between the resources and the resources that make up it, and Virtual, they are stored in it and the relationship between some positions in vp N are: The resource group element category (resource group elements) category table 407 is established by _ "jin. But this will be & quot The resource group " category table links to any number of tables in the It resource ^ groups category table. Link the resource group unit to the table—the table links to many category tables: ', site unit' (Site (please read the iiti item on the back of 璜 before filling this page)-~ k -------- Order --------- line.

297公釐) 4 483 8 7 A? B7 經濟部智慧財產局員工消費合作社印*'农 五、發明說明(68 ^鳴)⑷1,,!服務"1413,以及”資源” 1409"中的任何 =表。針對資料庫30丨中所表示的每一項資源都會有” 源通別表。包括在該表中的有:資源之i D :其名稱; 針對提供資源的服務之ID ;針對定義資源的靈敏度等級 心:冑源描述;資源管理員的電子郵件地址;以及一 種隐藏旗標(hidden flag),它指示著IntraMap是否應該將資 源顯不給不屬於一些有權存取資源之使用者群组的使用 者IntraMap界面會獲得它需要的資訊,該資訊關於來自 針對資源之"資源"表的—項資源。 兩種類別表:"網站單元"和"服務"中的一些表,以及兩 種類別表:網站”415和,,词服器"丨417中的一些表都是屬 於描述著在VPN中之資訊位置的類別表1421。針對在 中的每一個實體位置都會有"網站"類別表:針對在vpN中 的每一個词服器都會有”飼服器"類別表:以及針對在vpN 中的每一項服務都會有"服務”類別表。在,,網站單元,,類別 表中的些表中的通仏鏈路都會使諸多網站與諸多伺服器 有關係:在"伺服器”類別表中的—些表中的通信鏈路都會 使諸多伺服器與它們提供的諸多服務有關係:以及在”服 務"類別表中的一些表中的通信鏈路都會使諸多服務與它 們寄宿(host)的諸多資源有關係。 在決定被請求資源屬於何種資訊集方面,存取過濾器 203就從請求中的資訊開始。該請求被包含在一種1?分包 資訊中,因此具有:一標題和一主體(b〇dy)。在標題中, 有:一IP位址,它載明在虚擬專用網路2〇1中之一位置, -71 - 本纸張尺度適用中國國家標準(CNS)A4規格(210x297公发) -------------^·-------^ ---------•線· I (請先閱讀背面之注意事項再填寫本頁) 44838 7 A7 經 濟 郤 智 慧 財 產 局 消 費 合 作 社 印 製 五、發明說明(的) 以及在該位置處之一词服器;一埠號,它載明關於伺服器 之-項服務。而在本體中,财:以通信協定所規定的形 式呈現之資源描述。譬如説,若請求是針對一網頁,則資 源描述將是資源之URL。存取過濾器2〇3使用丨p位址來指 出"網站"類別表的位置,使用在該表中的通信鍵路來指出 "網站單元"類別表I4U的位I。該表使網站與針對網站處 之諸伺服器的何服器ID(識別符)有關係;並且,存取過 遽器203會使用飼服器ID來指出針對網站之諸词服器…词 服器”類別表1417中的一些表的位t。然後,它能夠再使 用IP位址來指出對應於載明在請求中之词服器的,,飼服器" 類別表的位置;並且能夠順著從,,词服器,,表到釺對服務之 =務]別表中的一些表的諸多通信鏈路:進而能夠使用 來自π求的埠號來尋找適當的”服務"表。—旦它已經發與 適當的,,服務,,表,它就能夠順著指向"資源"類別表^9 = 的-些表的諸多通信鏈路’並指出對應於請求中之 ”資源,’表的位置。從那裏,會有—條指向"資源群组單元" 類別表Η07的通信鍵路,該表使諸多資源與針對它 之資訊集的-些資源群组織別符有關係。諸多資 ^ 別符依序地載明”資源群組"類別表U03中的—此表,而ί =表都有指向"資源群組樹”類別表中的一些表的諸多通= 鏈路,因而能夠決定:載明力枝+· ; ^ 取Λ在印求中之資源所屬的諸多 源群組的層次。已經完成那些事,存取過遽器如 發覺:與決定該請求是否應該被准許有關的―: 組。針對資源的”資源"表還包含針對資源之靈敏i等級 請先Μΐί背面之注S事項再填寫本頁) --------訂----- 線 本纸張尺度適用中國國家標準(CNS)A4規輅 -72- 4 4 8 3 8 7 _____B7_____ 五、發明說明(70 ) 再者,將資訊集表1401中的資訊加以編輯進入MMF中。當 請求來到在使用者與提供資源的伺服器之間路徑中的第一 存取過濾器203時,第一存取過濾器203就會使用MMF樓 案’以便作出一項邏輯上等效於剛才所描述之一決定的決 定。於是’在檢視包含來自使用者群組表丨3〇1和資訊集表 1401之資訊的MMF檔案之後,代理伺服器就已經決定:使用 者識別方法的信賴等級,資訊資源的靈敏度等級,使用者所 屬的一些使用者群組,以及資訊資源所屬的一些資訊集。 決策表:圖1 6 3決策表:圖1 6 圖1 6顯示:使用於存取控制資料庫30丨中,用來定義存 取決策的一些表;包括在這些決策中的有:存取決策,管 理決策,以及決策制定者決策: •存取決策使使用者群组與資源群组有關係; •管理決策使其成員都是管理員之一使用者群組與下列 其中之一有關係: 1.另一使用者群组 2 . —資訊集 3 . —資源 · 經濟部智慧財產局員工消費合作社印製 -« --------訂---------線' r . 4 在VPN中之一位置(網站) 5 . —存取過濾器203或其它伺服器 6 . —項服務 •決策制定者決策使管理員之使用者群組與資訊集有關 係。 * 73 - 本纸張尺度適用中國國家標準(CNS)A4規格(2〗0 x 297公发) ί 483 8 7 五、發明說明(71 ) 每項決策都會使"左侧,’與”右側"有關係,左側總是”使 用者群組,,類別表1309,而右側則端視決策種類而定,可 能是•”資源”類別表1409, ”資源群組”類別表14〇3(表示 ,訊集)’"網站"類別表1415,"服務"類別表1413,u词服 器’,類別表14Π,或者·,使用者群組,,類別表13〇9。於是, 決策諸表1601分成三太群組:左側諸表16〇3,決策諸表 1605,以及右側諸表16〇9,改變決策的權利是分層性的: 一使用者群組之成員能夠改變存取決策,就像由針對該群 组之官理決策所決定的那樣,該群纽之”使用者群组”表指 示著^它是諸多管理員中之一類型的—種群組。依序地, 那些#理員可能載明與他們的子網域(sub d〇main)有關的 其他管理決策。 對應於二種決策,在決策諸表丨6〇5中有三個類別表:屬 存取決策_’(P0丨丨cies Access)類別表161 1,"管理員決策” (Policies AdmimSter)類別表]613 ,以及,’決策制定者決策" (Policies P〇ncy Maker)類別表1691的一些表。所有的這些 類別表共享很多特點;它們都包含:針對決策之左側的使 用者群组表之ID,針對表示載明在決策之右側中項目的 表(Ϊ 〇 ’決策(存取操作被容許或被拒絕)的一種指示, 決策是否預先定義的且無法被删除的一種指示,以及決策 疋σ'爲目如現用的一種指示。類別表之間的差異是:何者 可能在決策之右側上,因而就是指向在右側上諸多實體的 通L鍵路’在存取決策和決策制定者決策的情形下,右側 實體都只是資訊集而已,因此,,,存取決策Μ和”決策制定 _____ -74- 本纸張尺度賴中_家標準(CNS)A4規 χ 297公爱) (請先閱讀背面之注意事項再填寫本頁) -版--------訂·--------線, 經濟部智慧財產局員工消費合作社印製 4 483 8 7 Α7 Β7 五、發明說明(72 ’夬爪兩種類別表中的一些表都只包含指向資源群組》 類別表中的一些表的諸多右側通信鏈路而已;而,,管理員 決策_類別表中的一些表則可能包含指向下列替換性的:|· 使用者群組"類別表,”資源群组,,類別表,,,網站"類別 表’ ”词服器"類別表,,,服務”類別表,以及Κ資源"類別 表中的一些表的諸多右側通信鏈路。 賦予由管理決策右側上的使用者群组所載明的使用者群 組管轄由右側所載明的諸多實體之集合的權利會有所變 化,體種類而定,如下表中所顯示的: 左側 右側 使用者 群組 任何一個 1被容許"存取操作的意義 使用者群组的成貝都能夠建立針對目標或已包 括項目的管理決策。這樣會容許責任之委託權 (請先閱讀背面之注意事項再填寫本頁) 使用者 群組 使用者群 组 經 濟 部 智 慧 財 產 局 貝 工 消 費 合 作 社 印 η 使用者 群組 資訊集 使用者群組的成員都能夠管理目標使用者群 组,包括一些套疊式(nested)使用者群組。被 容許的管理,包括:將目標使用者群組加以删 除,移動,及拷貝;將它套疊在另一使用者群 组中;增加成員給它:以及將其它—些使用者 群組套疊在其中 使用者群组的成員都能夠管理資訊集,包括 些套疊式資訊集。被容許的管理,包括:將 目標資訊集加以刪除,移動,及拷貝;將它套 叠在另-資訊集中;增加㈣给它; 它一些資訊集套疊在其中。 ’、 本紙張尺度剌 (CNS)A4 (2J0 X 297^7 k--------訂---------線 448387 A7 B7 五、發明說明(73) 經濟部智慧財產局員工消費合作社印製 使用者 群组 網站 使用者群組成員都能夠管理網站,包括:來 f可用資源”列表(所有的存取過遽器,侦服 器,服務,以及資源)’在網站之下的一些單 元。被谷沣的官理,包括:將網站加以刪除和 移動;將它增加到資訊集;以及增加一些位置 和存取過濾器给它β爲了定義一些新的存取過 濾器’管轄企業内部網路位置的管轄權是必需 的。 使用者 群组 存取過滤 器 使用者群組的成員都能管理存取過濾器,包 括:來自"可用資源,,列表(所有的伺服器,服 務,以及資源),在存取過濾器之下的一些單 元。被容許的管理,包括:將存取過濾器加以 刪除和移動;將它増加到資訊集;以及增加一 些伺服器或服務給它。 使用者 群組 伺服器 使用者群組的成員都能夠管理伺服器,包括: 來自可用資源”列表(所有的服務和資源在伺 服器之下的一些單元。被容許的管理,包括: 將伺服器加以刪除和移動;將它增加到資訊 集;以及增加一些伺服器或服務給它。 使用者 群组 服務 使用者群組的成員都能夠管理服務,包括:來 自'•可用資源"列表(所有的資源),在服務之下 的一些資源。被容許的管理,包括:將服務加 以删除,移動,及拷貝;將它增加到資訊集; 以及增加一些資源给它。 使用者 群组 資源 使用者群組的成員都能夠管理資源。被容許的 管理,包括:將資源加以刪除,移動,及拷 貝;以及將它增加到資訊集。 I I I·-------------- (靖先閱讀背面之注意事項再填寫本頁) · ,線 76- 本紙張尺度適用中固固家標準(CNS>A4規格(210 X 297公釐) 448387 A7 B7 五、發明說明(74 ) 下表描述:各0 05 &理使用者群组出現在決策制定者決策左 側上時,賦子& —-----理使用者群组的權利。 左側 右側 使用者 群组 資訊集 ”被容許"存取操作的意義 使用者群Μ的成員都能夠管理•用來控制由任 何使用者群組包括一些套疊式資訊集在内的資 訊集的諸多存取決策。他們也可能將資訊集和 其後裔(descendants)中的任何資訊集包括在 決策制定者決策中。 經濟部智慧財產局具工消費合作社印製 如上述資訊集表之討論中所指出的,正在執行存取枝對 的代理伺服器能夠使用,,使用者群组”表和”資訊集”表來尋 找:在正在提出存取請求之使用者所屬的使用者群组,以 =在被存取之資訊資源所屬的資訊集:並且也能夠使用 ^ 來夫疋·使用者識別方法的信賴等級,以及資訊資 源靈敏度等級。代理伺服器隨即能夠使用"存取決策”表來 尋我使用者所屬的任何一個使用者群組是否可能存取資 訊資源所屬的任何一個資訊集。若發覺任何—個這樣的使 用者群组;則使用者可能存取資訊集,如果請求之信賴等 級與資訊資源之t敏度等級-樣高的話。要決定請求之信 賴等級’代理词服器就必須決定:正在被使用之任何加密 技術的信賴等級,及/或正在被用於存取操作而在VPN201 中之路徑的信賴等級。這項資訊可在顯示於圖! 7中的存 取過濾器諸表1 701中加以獲得,並描述於下。若存取決策 或存取請求之靈敏度等級不允許存取操作:則該訊息不予 理會,因而將它所屬的任何對話加以棄置^當請求是由成 -77- 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---:---------r --------1r*---------,線 (請先Mla背面之注意事項再填S本頁) ^48387 A7 B7 五、發明說明(75) 爲存取資料庫30 1之一管理使用者群组之一成員的使用者 所提出的一項請求時,存取核對處理過程實質上是相同 的:只可惜:當存取操作被允許時,根據以上所宣示的規 則,它可能會導致修改資料庫。該項修改隨後將被傳播到 VPN 201中之所有其它的存取過濾器203。 伺服器表:圖1 7 3伺服器表:圖1 7 圖1 7顯示:針對對在VPN中的諸多伺服器之操作而言都 是特別重要的一些表之圖表。在VPN中,有三種伺服器: • 陽春伺服器(plain servers) 這些是:有資源儲存在其 上並藉由執行服務來存取資源的伺服器。 • 存取過濾器203。 • 決策管理程式飼服器。這些是··會附帶地統合 (coordinate)和分配資料庫301,及/或產生關於VPN的 操作和狀態的一些報表的存取過濾器2〇3。 存取過濾器203可能附帶地執行像一種陽春伺服器那樣 的功能。 針對在VPN中的每一個伺服器都會有”伺服器"類別表 141 7。在針對每個飼服器之表中的資訊,包括:词服器之 I D,名稱,在Windows NT商標之作業系統中的網域,其 網際網路名稱,它是否爲—存取過濾器2〇3且附帶地爲一 決策伺服器’存取資訊是否只有經由存取過濾器2〇3才可 以獲得,以及它是否在VPN之内。若伺服器爲一存取過遽 器203,它會附帶地具有一種存取過濾器203提供給在vpn -78- 本纸張尺度適用中舀國家標準(CNS)A4規格(210 X 297公芨) (請先ΜΪ5背面之注意事項再填寫本頁) _k--------訂---------線. 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印制尽 父概8 7 A7 _ B7 五、發明說明(76 ) 201中之其它實體的身份識別(identity),以供鑑定和加密 之用。在一較佳實施例中,該身份識別是:由SKIP所使 用之針對存取過濾器的X.509號證書。X.509號證書也包 括:針對存取過濾器203的公用密鑰。公用密鑰可能屬於 很多個名稱空問(name space)中的一個;名稱空間識別符 (name space ID,簡稱NSID)是一種針對公用密錄·之名稱空 間的識別符:而主密输識別符(mester key ID,簡稱MKID) 則是識別在名稱空間内的公用密鑰。也包括在表中的是: 一條指向”證書當局”類別表1 711的通信鏈路,該義別表會 指示發行針對存取過濾器之X.509號證書的證書當局。當 然’與存取過遽器不同的一些词服器也都有X,5〇9號證 書·’並且,在那種情形下’它們的”伺服器’’表將會具有词 月良器之NSID和MKID。 在VPN中的每一個陽春伺服器都會有一項或更多服務在 其上執行。譬如説’一項FTP(檔案傳送協定)服務會根據 TCP/IP成套協定(protocol suite)中的檔案傳送協定來存取 在伺服器上的檔案(資源)。針對陽春词服器的"伺服器"類 別表14 17中的每一種表都有:指向定義在伺服器上可供利 用的服務和資源之一群表的諸多通信鏈路。如在1719處所 顯示的,這些表包括:"服務”類別表1413,它表示服務; "資源11類別表1409 ’它表示經由服務而供利用的資源:以及 _·服務定義π類別表1715,它會定義服務。 +針對圖1 7諸表中的其餘部份則顯示:包含存取過遽器 203所用之資訊的一些圖表。其類別表均顯示在17〇5處的 -79- 本纸張尺度適用中因國家標準(CNS)A4規格(210 X 297公爱) ^i— b^i— Λ in A·^— t I k (靖先wtf背Sr之注音?事項再填寫本頁) 448387 經濟部智慧財產局員工消費合作社印製 A: B7 五、發明說明(77 ) 一些表都會包含:都是一些用來分配資料庫3〇ι及/或用來 產生報表的決策管理程式而由存取過濾器2〇3所使用的資 訊:其類別表均顯示在17 17處的一些表都會包含:關於針 對正在被一既定存取過濾器203執行之軟體的諸多可選擇 參數的資訊:其類別表均顯示在丨709處的那些表都會包 含:關於代理伺服器及其它軟體模組的資訊,諸多存取過 德器203都會使用該模組來執行在存取過濾器2〇3中的通 信協定層級之存取核對:而在Π〇7處的—些表則都會包 含:關於針對使用者識別方法和加密種類的信賴和靈敏度 定義的資訊。 由參考數字1 7〇8所指示的一些表都會包含:關於存取過 撼器203所屬之vpn的資訊。存取過濾器2〇3使用此資訊來 路由指引對話:並且也會用來決定:針對—既定對話,正 在被使用之路徑的信賴等級。”路由選擇表"(R0uting table) 類別表1 72 1會定義:列示指向可從存取過濾器2〇3存取資 訊之所有網路的諸多目前路由的一些表。當那些路由改變 時’ Θ表就會被自動地更新。11附屬網路"(Attached Network) 類別表Π23會定義一些表,該表指示··對每個存取過濾器 203而言’存取過濾器2〇3目前所附屬的一些網路;該類 別表中的一些表都會包含指向”網路定義”類別表丨723中的 一些表的諸多通信鏈路,該類別表依序地包含指向"信賴 等級定義(trust definitions)類別表1707中之一定義之一通 信鏈路’而該類別表則會指示網路的信賴等級=在此群組 中的最後類別表是"點對點連接”(p〇int t0 Point Connection) -80- 本纸張尺度適用中0舀家標準(CNS)A^^j1〇x 297公发^ ~ I-' (I I I t— - - I—. 1 . - ί > ) I n - ] \^t __________ _ __ J f {碕先Mis背面之沍意事項再填寫本頁) 448387 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(78 ) 類別表1713,它會定義:描述可經由VpN存取資訊的兩個 存取過;慮器2 〇 3之間連接的一些表。有針對來源和目標存 取過濾器203的每種組合的一種表,以及指向一種載明在 來源和目標兩個存取過濾器2〇3之間路徑之信賴等級的信 賴等級定義之一通信鏈路。在此表中的信賴等級是基於針 對橫過路徑之訊息所使用的加密技術。 如前面所説明的’"使用者群組"表1301和,,資訊集,,表 1401會提供存取過濾器203所需的資訊,以便決定:決策 諸表1 60 1中的存取決策是否允許存取操作;並且,也會提 供:關於正在被存取之資源的靈敏度等級的資訊。存取過 濾器諸表170 1會附帶地提供存取過濾器203所需的資訊, 以便決定:正在由對話所採取而在VPN中之路徑的最小信 賴等級’以及一些可用加密演算法的信賴等級。於是,若 存取過濾器203決定:正想要存取一既定資源之一既定使 用者屬於有權存取該既定資源所屬的資訊集之一使用者群 組,並且決定:用於使用者之識別方法的鑑定等級並不低 於針對資源之靈敏度等級所需的鑑定等級•則存取過濾器 203能夠進一步決定:路徑之信賴等級是否夠高;且若信 賴等級不夠高,則存取過濾器203藉由選擇一種具有所需 信賴等級的加密演算法並對該對話加以加密,就能夠將信 賴辛級彳疋升舄需要量。 可用資訊表:圖15 3可用資訊表:圖15 圖1 5顯示針對可用資訊諸表1501的圖表。該表皆由存取 -81 - 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公茇 (請先閱ti背面之注音?事項再填寫.各頁) -1— ] d n Γ * _ SI m I- - -- u I - -V6兔 448387 A7 ______B7 五、發明說明(79 ) ίίτ先閱讀背面之注意事項再填寫本頁) 過濾器203所使用,以便產生可用資源顯示圖丨〇〇5,如圖 1 0中所示。在1502處所顯示的一些類別表都會使每個词 服器與Έ的服務有關係,並與由服務所提供的資源有關 係。在1504處所顯示的—些類別表會將諸多可用資源加以 组織成一種針對繼承權目的的層次:並且也會被使用來產 生在1005處所顯示的分層列表;進而藉由順著從,,網站單 元"表到伺服器"表的諸多通信鏈路,存取過濾器2〇3就 能夠決定:網站,伺服器,服務,以及資源的層次。在 1 503處的一些類別表,最後會建立—種存取過濾器2〇3的 分配樹(distribution tree)。就像稍後將要更加詳細說明的 那樣,當存取控制資料庫30 I被修改時,由那些表所定義 的樹就會決定:修改被分配到一些存取過滹器所依照的順 序β 修改存取控制資料庫30 1 :圖1 9' 3修改存取控制資料庫301 :圖1 9 經濟部智慧財產局員工消費合作社印 如前面所提及的’每個存取過濾器203都會有一種屬於 在圖2之存取過濾器203 (a)中之主決策管理程式2〇5的存取 控Μ資料庫301之拷貝的精確gi丨本(exact duplicate)。圖1 9 顯示:怎樣修改存取控制資料庫3 0 1的那份拷貝,以及,乍、 樣將修改資訊從存取過濾器203 (a)分配到其它存取過減器 203。圖19顯示:具有主決策管理程式205的存取過淚器 203 (a);以及另一個存取過濾器2〇3⑴,在該處,使用工 作站之一管理員正在修改存取控制資料庫3 〇 1。需要用來 分配和同步修改資訊的訊息1909都是使用SKIP加以加密 -82- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公t ) 4483 8 7 經濟部智慧財產局員工消货合作社印製 A7 B7 五、發明說明(8〇 ) 的,並且經由V P N 2 0 1,使用一種稱爲”專用通信服務,, (private communications service,簡稱 PCS)的通信協定加以 發送。每個存取過濾器都會有很多存取控制資料庫〖的 拷貝。任何存取過遽器203最少限度都有兩種拷貝:活資 料庫(live database,簡稱LDB)1907,它是目前正在被用來 執行存取核對的資料庫;以及鏡像資料庫(mirr〇r, 簡稱MDB)1 905 ’它是:能夠被切換入内,打算用來代替 活資料庫1907的資料庫之一拷貝。於是,存取過遽器 203 (a)具有:一 MDB 1905(a)和一LDB 1907(a);而存取過減 器 203 (i)則具有:MDB 1905⑴和LDB 1907⑴。 若一存取過濾器203正在被管理員使用來修改存取控制 資料庫301,則它將會附帶地具有至少一個工作資料庫 (working database,簡稱WDB)1903。工作資料庫是:不是 正在被用來控制存取操作的資料庫之一拷貝,因而能夠由 管理員加以修改。管理員會使用—種經由網路而連接到存 取過遽器之一工作站或p C (個人電腦)而這麼做。工作站 或P C會顯示上述的管理圖形使用者界面,進而管理員使 用GUI(圖形使用者界面)來做出像由一些管理決策所致能 那樣的諸多改變。這些改變可能影響到儲存在存取控制資 料庫3 01中的任何方面的資訊。如以上所指示的,其中货 多改變都是在存取或管理決策方面的改變,因而管理員能 夠使用決策評估特點來察看改變之效應。當管理員對變^ 感到滿意時,他就會點按:”應用"桉鈕:因而將諸多改热 刀配到所有的存取過滤器’並納入每個存取過;慮器的活資 -83- 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐) J [ 1 .-’V I . — . . t ίίΓ先閱讀背面之注意事項再填寫本頁) 448387297 mm) 4 483 8 7 A? B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs * 'Agricultural V. Description of Invention (68 ^ Ming) ⑷ 1 ,,! Service "1413", and any of the "resources" 1409 "tables. For each resource indicated in the database 30, there will be a "source identification table." Included in the table are: i D of the resource: its name; ID for the service providing the resource; sensitivity level for defining the resource Heart: description of the source; email address of the resource manager; and a hidden flag, which indicates whether IntraMap should show the resource to users who do not belong to some user groups who have access to the resource The IntraMap interface will get the information it needs about the resource from the "Resources" table for resources. There are two types of tables: "Site Units" and "Services" tables, and There are two types of tables: Websites "415" and "Some of the tables in Serving Server" 417 belong to the category tables 1421 describing the location of information in the VPN. There will be a "Website" category table for each physical location in the: "Feeder" category table for each servlet in vpN: and a list of each service in vpN There is a "Service" category table. Now, the communication links in some tables in the category table and the website table will make many websites related to many servers: in the "server" category table, the communication links in some tables will use Many servers are related to the many services they provide: and the communication links in some tables in the "Services" category table will make many services related to the many resources of their host. In determining what information set the requested resource belongs to, the access filter 203 starts with the information in the request. The request is contained in a 1? Subcontracting message and therefore has: a header and a body (body). In the title, there is: an IP address, which is specified in one of the positions in the virtual private network 201, -71-This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210x297 public)- ----------- ^ · ------- ^ --------- • Line · I (Please read the notes on the back before filling this page) 44838 7 A7 Printed by the Consumer Cooperatives of the Bureau of Economics and Intellectual Property, V. Invention Description (of the invention) and a server at that location; a port number, which specifies one of the services of the server. In the ontology, Cai: a resource description presented in the form prescribed by the communication protocol. For example, if the request is for a web page, the resource description will be the URL of the resource. The access filter 203 uses the p address to indicate the location of the " website " category table, and uses the communication keys in the table to indicate the " site unit " bit I of the category table I4U. This table relates the website to the server ID (identifier) of the servers at the website; and, the access server 203 uses the server ID to indicate the server for the website ... T "of some tables in the" Category "category table 1417. Then, it can use the IP address to indicate the location of the" Category Table "corresponding to the server listed in the request; and Follow the communication links of some tables in the following tables: from the server, the server to the server, to the service of the service: and then use the port number from π to find the appropriate "service" table. -Once it has issued the appropriate, service, and table, it will be able to follow the many communication links pointing to the " resource " category table ^ 9 = of these tables and indicate the "resources" corresponding to the request "The location of the table. From there, there will be a communication link to the" Resource Group Unit "category table Η07, which makes many resources different from some of the resource groups for its information set. There is a relationship. A lot of resources indicate in sequence the "resource group" category table U03—this table, and the = table all refer to a number of tables in the "resource group tree" category table Pass = link, so you can decide: set the strength of the branch + ·; ^ take the level of many source groups to which the resource in Λ belongs. After those things have been done, access to the device as found: and decide what Whether the request should be granted related: Group. The "resources" table for resources also contains the level of sensitivity for resources. Please note the S item on the back of the page before filling out this page) -------- Order- ---- The size of thread paper is applicable to Chinese National Standard (CNS) A4 Regulations-72- 4 4 8 3 8 7 _____B7_____ V. Description of the invention (70) Furthermore, the information in the information set table 1401 is edited into the MMF. When a request comes to the first access filter 203 in the path between the user and the server that provided the resource, the first access filter 203 will use the MMF case to make a logical equivalent to One of the decisions just described. So 'after viewing the MMF file containing the information from the user group table 301 and the information set table 1401, the proxy server has decided: the trust level of the user identification method, the sensitivity level of the information resource, the user User groups to which they belong, and information sets to which the information resource belongs. Decision table: Figure 1 6 3 Decision table: Figure 1 6 Figure 16 shows: some tables used in the access control database 30 to define access decisions; included in these decisions are: access decisions , Management decisions, and decision makers' decisions: • Access decisions make user groups related to resource groups; • Management decisions make their members one of the administrators. User groups are related to one of the following: 1. Another user group 2. —Information collection 3 — —Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Resources and Economy-«-------- Order --------- Line ' r. 4 is a location (website) in the VPN 5.-Access filter 203 or other server 6.-Service • Decision maker decision Makes the administrator's user group related to the information set. * 73-This paper size is in accordance with Chinese National Standard (CNS) A4 (2〗 0 x 297) ί 483 8 7 V. Description of the invention (71) Each decision will make the "left side," and "right side " There is a relationship, the left side is always "user group," category table 1309, while the right side depends on the type of decision, it may be "" resource "category table 1409," resource group "category table 1403 ( Display, newsletter) '" website " category table 1415, " service " category table 1413, u word server', category table 14Π, or ·, user group, category table 1309. Therefore, the decision tables 1601 are divided into three groups: the left table 1603, the decision tables 1605, and the right table 1609. The right to change decisions is hierarchical: members of a user group can change access decisions As determined by the administrative decision for the group, the "user group" table of the group indicates that it is one of many types of managers-a group. In turn, those # 理 员 may specify other management decisions related to their subdomain. Corresponding to two kinds of decisions, there are three category tables in the decision tables 丨 605: Category Access Decision _ '(P0 丨 丨 cies Access) Category Table 161 1, " Administrator Decisions (Policies AdmimSter) Category Table] 613, and some of the 'Policies Po ncy Maker' category tables 1691. All these category tables share many characteristics; they all include: the ID of the user group table to the left of the decision , An indication of a table (Ϊ 〇'decision (access operation is allowed or denied) indicating a list of items in the right side of the decision, an indication of whether the decision is predefined and cannot be deleted, and decision 疋 σ ' It is a kind of indication as it is currently used. The difference between the category tables is: which may be on the right side of the decision, and thus is the L-link to many entities on the right side in the case of access decisions and decision makers' decisions The entities on the right are just information sets. Therefore, the access decision M and "decision making _____ -74- This paper is based on the _ Home Standard (CNS) A4 Regulation χ 297 public love) (Please read the back first Please fill in this page again for attention)-Version -------- Order · -------- Line, printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4 483 8 7 Α7 Β7 V. Description of the invention ( 72 'Some of the two category tables only include pointers to the right side of some of the tables in the resource group's category tables; however, some tables in the administrator's decision_ category table may contain pointers The following alternatives: | · user group " category list, "resource group," category list, ", website " category list '" vocabulary " category list, ", service" category list, and ΚResource " Many of the right-hand communication links in some tables of the category table. The right given to the user group specified by the user group on the right side of the management decision to govern the collection of many entities specified on the right side There are changes, depending on the type of body, as shown in the following table: Any one of the user groups on the left and the right 1 is allowed &access; the meaning of the access operation User groups can be created to target or include items Management decisions. This will allow responsibility User delegation rights (please read the precautions on the back before filling out this page) User Group User Group User Group Economy Group Intellectual Property Bureau Shellfish Consumption Cooperative Association Print User Group Information Set User Group members can Manage target user groups, including nested user groups. Allowed management includes: deleting, moving, and copying target user groups; nesting it on another user Groups; add members to it: and nest other user groups in which members of the user group can manage information sets, including some nested information sets. Allowed management includes: deleting, moving, and copying the target information set; nesting it in another information set; adding it to it; nesting some information sets in it. ', This paper size 剌 (CNS) A4 (2J0 X 297 ^ 7 k -------- Order --------- line 448387 A7 B7 V. Description of invention (73) Intellectual property of the Ministry of Economic Affairs Bureau Consumer Consumption Co-operative Printed User Group Website User Group Members are able to manage the website, including: "available resources" list (all access devices, servers, services, and resources) 'on the website Some of the units below. The official management of Gu Yan includes: deleting and moving the website; adding it to the information set; and adding some location and access filters to it β in order to define some new access filters 'Jurisdiction over corporate intranet locations is required. User Group Access Filters Members of the user group can manage access filters, including: from " available resources ,, lists (all servers Filters, services, and resources), some units under the access filter. Permitted management includes: deleting and moving the access filter; adding it to the information set; and adding some servers or services Give it. Use Members of the group server user group are able to manage the server, including: From the Available Resources list (all services and resources are some units below the server. Permitted management, including: Delete the server And mobile; add it to the information set; and add some servers or services to it. User group service Members of the user group are able to manage the service, including: from the 'Available Resources' list (all resources ), Some resources under the service. Allowed management includes: deleting, moving, and copying the service; adding it to the information set; and adding some resources to it. User Group Resource User Group All members can manage resources. Allowed management includes: deleting, moving, and copying resources; and adding it to the information set. III · -------------- (jing Read the notes on the back before filling in this page) ·, line 76- This paper size applies to the China Solid Goods Standard (CNS > A4 specification (210 X 297 mm) 448387 A7 B7 V. Invention Explanation (74) The following table describes: When each 0 05 & management user group appears on the left side of the decision maker's decision, the right of the user group is assigned to the user group on the left. "Group information set" is allowed " The meaning of the access operation The members of the user group M can manage the various access decisions used to control the information set by any user group, including some nested information sets They may also include information sets and any information sets from their descendants in the decision makers' decision-making. The Intellectual Property Bureau of the Ministry of Economic Affairs, the Industrial and Consumer Cooperatives, printed as indicated in the discussion of the above information set table, The proxy server running the access branch pair can use the "user group" table and the "information set" table to find: in the user group to which the user who is making the access request belongs, == is being accessed The information set to which the information resource belongs: and it can also use ^ to trust the level of user identification method and the sensitivity level of the information resource. The proxy server can then use the "Access Decision" table to find out whether any user group to which my user belongs may access any information set to which the information resource belongs. If any one of such user groups is found The user may access the information set if the requested trust level and the t-sensitivity level of the information resource are as high as possible. To determine the requested trust level, the proxy server must decide: any encryption technology being used And / or the trust level of the path in VPN 201 that is being used for access operations. This information can be obtained in Table 1 701 of the access filter shown in Figure 7 and described in If the sensitivity level of the access decision or access request does not allow the access operation: the message is ignored and any dialogue it belongs to is discarded ^ When the request is made by -77- This paper standard applies to China Standard (CNS) A4 specification (210 X 297 mm) ---: --------- r -------- 1r * ---------, line (please (Notes on the back of Mla before filling in this page) ^ 48387 A7 B7 Explanation (75) When a request is made for a user who is a member of one of the management user groups in the access database 30, the access check process is essentially the same: only a pity: when the access operation When allowed, it may result in changes to the database according to the rules announced above. This modification will then be propagated to all other access filters 203 in VPN 201. Server list: Figure 1 3 3 Server Table: Figure 17 Figure 17 shows a chart of some tables that are particularly important for the operation of many servers in a VPN. In a VPN, there are three types of servers: • Plain servers These are: servers that have resources stored on them and access resources by executing services. • Access filter 203. • Decision management program feeders. These are ... coordinated and allocated Database 301, and / or an access filter 203 that generates some reports on the operation and status of the VPN. The access filter 203 may additionally perform functions like a Yangchun server. For each of the VPN's One SERVER will have a "server " category table 1417. The information in the table for each feeder includes the ID, name of the server, the domain in the operating system of the Windows NT trademark, its Internet name, whether it is—access filter 2 〇3 and incidentally a decision server's access information can only be obtained through access filter 203, and whether it is within the VPN. If the server is an access controller 203, it will additionally have an access filter 203 provided for vpn -78- This paper standard applies to the National Standard (CNS) A4 specification (210 X 297 public) ) (Please note the back of M5 before filling out this page) _k -------- Order --------- line. Intellectual Property Bureau of the Ministry of Economic Affairs Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Employee Consumer Cooperatives printed out their father's profile 8 7 A7 _ B7 V. Identity of other entities in the description of invention (76) 201 for identification and encryption. In a preferred embodiment, the identification is: X.509 certificate used by SKIP for the access filter. The X.509 certificate also includes a public key for the access filter 203. The public key may belong to one of many name spaces; the name space ID (NSID) is an identifier for the name space of public secrets: and the master secret identifier (Mester key ID, MKID for short) is the public key that is identified in the namespace. Also included in the table are: A communication link to the "Certificate Authority" category table 1 711, which indicates the certificate authority issuing the X.509 certificate for the access filter. Of course, 'some servers different from the access server also have X, 509 certificates.' And, in that case, their 'server' table will have the NSID and MKID. Each Yangchun server in the VPN will have one or more services running on it. For example, 'An FTP (File Transfer Protocol) service will be based on the TCP / IP suite of protocols (protocol suite) File transfer protocol to access files (resources) on the server. The "server" category table 14 for the Yangchun server has each of the following: points to the definitions available on the server Many communication links to a group table of services and resources. As shown at 1719, these tables include: " Services " category table 1413, which represents services; " Resources 11 category table, 1409 'which represents for use via services Resources: and _ · Service Definition π Category Table 1715, which will define services. + For the rest of the tables in Fig. 17, it is shown: some charts containing information used to access the controller 203. The category table shows -79 at 1705- This paper size is applicable due to the national standard (CNS) A4 specification (210 X 297 public love) ^ i— b ^ i— Λ in A · ^ — t I k (Jingxian wtf back Sr phonetic? Matters please fill out this page) 448387 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A: B7 V. Description of Invention (77) Some tables will contain: All are used to allocate the database 3〇ι and / or the decision management program used to generate the report and used by the access filter 203: its category tables are displayed at 17 17 some tables will contain: Take the information of the many optional parameters of the software executed by the filter 203: the category tables are displayed at 709 and those tables will contain: information about proxy servers and other software modules, many of which have been accessed by the German device 203 Use this module to perform protocol-level access check in access filter 203: and some tables at Π07 will contain information about the trust and authentication methods for user identification methods and encryption types. Information on sensitivity definitions. Some tables indicated by the reference numeral 1708 will contain information about access to the VPN to which the shaker 203 belongs. The access filter 203 uses this information to route the conversation: and it is also used to determine: the level of trust that the given conversation is using for the path. "Routing table" category table 1 72 1 will define: a list of many current routes pointing to all networks that can access information from access filter 203. When those routes change 'Θ table will be updated automatically. 11 Attached Network " (Attached Network) category table Π23 will define a number of tables that indicate ... For each access filter 203' Access filter 2〇 3 Some of the networks that are currently attached; some tables in this category table will contain many communication links to some tables in the "Network Definition" category table, and 723, which will sequentially contain pointers to the " trust level One of the definitions in the trust definitions category table 1707 defines a communication link ', and this category table indicates the trust level of the network = the last category table in this group is " point-to-point connection " (p〇int t0 Point Connection) -80- Applicable to Chinese Standards (CNS) A ^^ j1〇x 297 issued by this paper standard ^ ~ I- '(III t—--I—. 1.-Ί >) I n-] \ ^ t __________ _ __ J f (碕 Please fill in this page first on the back of Mis) 448 387 Printed by A7 B7, Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs 5. Description of the Invention (78) Category table 1713, which will define: two accesses describing the information that can be accessed via VpN; the connection between the filter 2 03 Some tables. There is a table for each combination of source and target access filters 203, and one of the trust level definitions pointing to a trust level specifying the path between the source and target access filters 203 road. The level of trust in this table is based on the encryption technology used for messages crossing the path. As explained earlier, the "" User Groups" table 1301 and, information set, table 1401 will provide the information required by the access filter 203 in order to decide: the decision is made in the access decision in Table 1 60 1 Whether access is allowed; and, information about the sensitivity level of the resource being accessed is also provided. The access filter tables 170 1 will additionally provide the information needed to access the filter 203 in order to determine: the minimum trust level of the path in the VPN being taken by the conversation 'and the trust level of some available encryption algorithms. Therefore, if the access filter 203 decides that a given user who wants to access a given resource belongs to a user group that has access to the information set to which the given resource belongs, and decides that: The identification level of the identification method is not lower than that required for the sensitivity level of the resource. Then the access filter 203 can further determine whether the path's trust level is high enough; and if the trust level is not high enough, the access filter 203 By selecting an encryption algorithm with the required level of trust and encrypting the conversation, the trust level can be increased to the required amount. Available information table: Figure 15 3 Available information table: Figure 15 Figure 15 shows a chart for the available information tables 1501. The tables are all accessed by -81-This paper size is applicable to Chinese National Standard (CNS) A4 specifications (210 X 297 gong (please read the note on the back of ti? Matters before filling in. Each page) -1—] dn Γ * _ SI m I---u I--V6 Rabbit 448387 A7 ______B7 V. Description of the Invention (79) ίτ Read the precautions on the back before filling out this page) Filter 203 is used in order to generate a display map of available resources 〇5, as shown in Figure 10. Some of the category tables shown at 1502 will make each server related to the service of the Έ and related to the resources provided by the service. Shown at 1504—these category tables organize many available resources into a hierarchy for inheritance purposes: and are also used to generate a hierarchical list shown at 1005; further, by following Many communication links from the unit "list to server" list, the access filter 203 can determine: the level of website, server, service, and resource. At some category tables at 1 503, a distribution tree of access filter 203 is finally created. As will be explained in more detail later, when the access control database 30 I is modified, the tree defined by those tables is determined: the order in which changes are assigned to some accessors is modified by β Access Control Database 30 1: Figure 1 9 '3 Modify Access Control Database 301: Figure 1 9 Employee Consumer Cooperatives of Intellectual Property Bureau of the Ministry of Economic Affairs printed as mentioned earlier' Each access filter 203 will have one An exact duplicate of the copy of the access control database 301 belonging to the master decision management program 205 in the access filter 203 (a) of FIG. 2. Fig. 19 shows how to modify the copy of the access control database 301, and, at first, to distribute the modification information from the access filter 203 (a) to other access subtractors 203. Figure 19 shows: the access filter 203 (a) with the master decision manager 205; and another access filter 203 (3), where an administrator using one of the workstations is modifying the access control database 3 〇1. The messages that need to be used to allocate and synchronize information 1909 are encrypted using SKIP-82- This paper size is applicable to China National Standard (CNS) A4 (210 X 297 g) 4483 8 7 A7 B7 was printed by the Cargo Cooperative Fifth, the description of the invention (80), and it was sent via VPN 201 using a communication protocol called "private communications service (PCS)." There will be many copies of the access control database for the filter. There are at least two copies of any access controller 203: a live database (LDB) 1907, which is currently being used to execute Access to the verified database; and mirror database (mirror, MDB for short) 1 905 'It is: a copy that can be switched into, intended to replace one of the databases of the live database 1907. The router 203 (a) has: an MDB 1905 (a) and an LDB 1907 (a); and the access decrementer 203 (i) has: MDB 1905 () and LDB 1907 (). If an access filter 203 is being Used by the administrator to modify the storage Control database 301, it will additionally have at least one working database (WDB) 1903. The working database is: it is not a copy of one of the databases being used to control access operations, so it can be copied by Modified by the administrator. The administrator will do this by using a network connected to one of the workstations or PCs (personal computers) that access the computer. The workstation or PC will display the management graphical user interface described above, and The administrator uses a GUI (graphical user interface) to make many changes as enabled by some management decisions. These changes may affect any aspect of the information stored in the access control database 301. As described above As instructed, the change in cargo is a change in access or management decisions, so the administrator can use the decision evaluation feature to see the effect of the change. When the administrator is satisfied with the change ^, he clicks: " Application " Eucalyptus button: Therefore, many heat-removing knives are allocated to all access filters' and included in each access filter; the cost of the filter is -83- In accordance with Chinese National Standard (CNS) A4 (210 χ 297 mm) J [1 .- ’V I.

經濟部智慧財產局員工消f合作社印5 五、發明說明(81 ) 料庫中。 將更新所有活資料庫的處理過程稱爲:資料庫同步和分 配。该處理過程有三個階段: .首先’將修改資訊從產生它們之所在的存取過遽器 2〇3(此處,就是存取過濾器2〇3(i))發送到主資料庫所 屬的存取過濾器203 (此處,就是存取過濾器2〇3(a))。 •在那種情況,將諸多改變納入主資料庫中。完成此事 的方法是:將諸多改變納入鏡像資料庫i 9〇5(a)中,然後 將活資料庫1907(a)和鏡像資料庫丨9〇5〇)交換 (swapping) ’然後再改變新鏡像資料庫1 9〇5(a)。 •然後’將諸多改變從主決策管理程式分配到其它存取 過遽器。 在每個存取過濾器2〇3處,用與利用存取過濾器2〇3 (a) 相同的方式來完成同步。在VPN 201之存取過濾器203中 做出改變所依照的順序是由分配樹丨5丨丨所決定,使用存取 過濾器顯示圖120 1依序地將它建立起來。具有主決策管理 程式205的存取過濾器203總是樹的根部。依照預設方式 (default) ’安裝在VPN 201中的第一存取過濾器203具有主 決策管理程式205。當安装了其它存取過濾器203時,就會 將它們増加到樹中,作爲主決策管理程式的孩子們 (children)。 主決策管理程式會將諸多改變循序地分配給它的孩子 們β當每個子(child)存取過濾器203都收到它的分配資訊 時,它隨後就再分配給它的孩子們》這意謂著:一種自頂 -84- 本纸張尺度適用中國國家標準(CNS)A4規格(210 * 297公发) 先閱讀背面之注音?事項再填寫本頁) T___ ^6 線 經濟部智竑財產局員工消費合作社印製 448387 A7 ---------B7 五、發明說明(¾ ) 層分又出很多分支(branches)的淺型(sha丨丨ow)分配樹完成一 個分配周期將會比一種自頂層分又出很少分支的深型 (deep)分配樹還快。適當存取資訊的管理員能夠重新配置 分配樹’以使分配更加有效。 若兩位管理員已經修改在不同的工作資料庫〖9〇3中的相 同資訊段(譬如説’存取過濾器定義),則會發生同步衝 突。當此事發生時,主決策管理程式205就會決定:要將 哪個修改資訊納入存取控制資料庫3〇1中β 使存取控制資料庫3 〇 1最佳化:圖2 1和2 3 3使存取控制資料庫301最佳化•圖2丨和2 3 雖然藉由管理圖形使用者界面(GUI) 1915適合於持續儲 存和使用;但是對於使用在即時存取核對中而言,資料庫 301並不是最佳化的。就像將要更加詳細説明於下那樣, 存取過濾器203會使資料庫301中的資料最佳化,那是運 轉時間(run-time)存取核對所需的,進而用來產生針對 IntraMap的顯示圖。每次在存取過濾器203中收到資料庫 301之一新拷貝的時候,它都會執行最佳化(〇ptimiZati〇n)。 依照它們的最佳化形式,資料庫3 01是諸多記憶體映射標 案(MMF)之一集合,其中以一種允許快速存取的形式來儲 存存取決策資訊。之所以如此稱爲MMF,是因爲:雖然它 們都被當作正常檔案來產生,但是隨後卻都附屬於一程式 的記憶體空間,並且都是藉由一些記憶體操作,而不是擋 案操作加以存取的。藉由使用MMF檔案來達成進一步最佳 化,以便產生一些規則:藉由I P來源和目標位址以及針對 -85- (請先Μ讀背面之注意事項再填寫本頁) — II-----線Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs, Cooperative Cooperative Press 5 5. Invention Description (81) in the library. The process of updating all live databases is called: database synchronization and distribution. There are three stages to this process: First, the modification information is sent from the access filter 2 03 (here, the access filter 2 03 (i)) where they are generated to the master database. The access filter 203 (here, the access filter 203 (a)). • In that case, incorporate many changes into the master database. The way to do this is to incorporate many changes into the mirror database i 905 (a), and then swap the live database 1907 (a) and the mirror database 丨 9505) and then change New mirror database 190 (a). • Then ‘distribute many changes from the master decision manager to other access controllers. At each access filter 203, synchronization is done in the same way as with access filter 203 (a). The order in which changes are made in the access filter 203 of VPN 201 is determined by the allocation tree 丨 5 丨 丨, and the access filter display diagram 120 1 is used to build it in order. An access filter 203 with a master decision manager 205 is always the root of the tree. The first access filter 203 installed in the VPN 201 by default has a master decision manager 205. When other access filters 203 are installed, they are added to the tree as children of the master decision manager. The master decision management program assigns many changes to its children in sequence. When each child access filter 203 receives its allocation information, it then assigns it to its children. Says: A kind of self-top-84- This paper size is applicable to China National Standard (CNS) A4 specifications (210 * 297). First read the phonetic on the back? Please fill in this page for more information) T___ ^ 6 Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Online Economy A shallow allocation tree will complete an allocation cycle faster than a deep allocation tree with few branches from the top. An administrator with proper access to information can reconfigure the allocation tree 'to make allocation more efficient. If two administrators have modified the same information section (for example, the 'access filter definition') in a different working database [903], a synchronization conflict will occur. When this happens, the master decision management program 205 decides: which modification information is to be included in the access control database 3 〇 β to optimize the access control database 3 〇1: Figure 2 1 and 2 3 3Optimize the access control database 301 • Figures 2 丨 and 2 3 Although the management graphical user interface (GUI) 1915 is suitable for continuous storage and use; but for use in real-time access check, the data The library 301 is not optimized. As will be explained in more detail below, the access filter 203 optimizes the data in the database 301, which is required for run-time access checks, and is then used to generate the IntraMap Show graph. Every time a new copy of the database 301 is received in the access filter 203, it performs an optimization (0ptimiZation). According to their optimized form, the database 301 is a collection of many memory mapping schemes (MMFs), in which access decision information is stored in a form that allows fast access. The reason why it is called MMF is that although they are generated as normal files, they are subsequently attached to the memory space of a program, and are all operated by some memory, not by file operations. Access. Further optimization is achieved by using MMF files in order to generate some rules: by IP source and destination addresses and against -85- (please read the notes on the back before filling this page) — II ---- -line

本纸張尺度適用中國國家標準(CNS)A4規格(21〇χ 297公釐) 'J 448387 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(Μ ) 存取操作被容許或拒絕的埠號,使用該規則來執行訊息之 低層級過濾操作β 圖顯示:MMF檔案23〇3之一實例。正被談論的 檔案是:DBCertifiCatesbyUSerGr〇uP(藉由使用者群組來識 別的資料庫"證書,·)檔案2丨〇1,它將用來識別屬於諸多特 定使用者群組的證書之證書匹配準則加以映射到:針對由 證書匹配準則所載明的諸多使用者群組的記錄,在資料庫 3W中的一些識別符。於是,樓案21〇1允許具有會識別已 經使用SKIP加以加密之一訊息之來源的證書之一代理伺 服器快迷決定:由證書加以識別之使用者所屬的諸多使用 者群組。在較佳實施例中,證書匹配準則是:x.509號證 書中的〇(組織)’ 0U(组織單位),及(:八(證書當局)欄位。 所有的MMF檔案2303都有相同的通用形式,有兩個主要 部份:標題部份2103,它包含正被峡射所根據的資訊:以 及資料部份2105,它包含正被映射所指向的資訊。標題 21〇3包含諸多登載項(entries)21〇7之一列表。每個登載項 ,會包含:正被映射所根據之一數値(在這種情形下,就 疋澄書匹配準則(CMC)21〇9):以及指向在資料部份21〇5中 =-記錄的指標(pc)inter)21 i i,它包含正被映射所指向的 β Λ (在這種情形下,就是:針對由CMC 2丨〇9加以識別之 使用者所屬的諸多使用者群组,在資料庫3〇丨中的諸多識 別符2U3之一列表21丨5)。在標題2 1〇3中的諸多登載項都 是依照正被映射所根據的資訊(此處,就*CMC 21〇9)加以 排序的,使得:可能使用諸多標準快速搜尋演算法來 n J - H ^1 ¢ .- 1^— ^^1 I II · 1 - * - I I I . 1 ^^1 一 I l I - - - -I n ft t 、 (請先閱讀背面之;i意事項再填寫本頁) -86 - 448387 經濟部智慧財產局員工消f合作社印製 A7 B7 五、發明說明(84 ) 對應於一既定if書匹配準則集合之一登載項2丨〇7的位置a 圖23 A,B及C提供:被使用在存取過濾器2〇3之一建構 例中的諸多MMF檔案2301之一完整列表β根據表中所提供 之諸檔案内容的描述’這些檔案與資料庫中的一些表 之間的關係將會顯而易見的。每個MMF檔案2303都是由表 中之一登載項所表示,該表指示檔案名稱及其内容。將諸 多檔案細分成下列群組:23 11,23 13,23 19,232 1,2323, 以及2422。特別感興趣的一些檔案有:DBUsers(資料庫1'使 用者")樓案2307和DBResources(資料庫"資源’’)樓案2309, 它們都描述決策;DBCertificatesByUserGroup(藉由使用者 群组來識別的資料庫”證書,,)檔案21〇1,它是詳細顯示於 圖 2 1 中的 MMF捨案;DBResourcelDbyServicelD(藉由 IP 名 稱來識別的資料庫"資源識別符")檔案23 15,它會使資源的 URL (共通資源指標)與資源ID (識別符)有關係: 08尺680111'0655>^16 5 0111^61〇(藉由資源1〇來識別的資料庫"資 源")擋案23 17,它會使資源與資源群組有關係;以及 DBTrustTable(資料庫_’信賴等級表”)檔案2325,它會建構 SEND表 601。 而且,下列檔案都被用來編譯規則: DBServerlDByNameFile(藉由I P名稱來識別的資料庫"伺服 器I D "檔案) DBIPAndTypeByServerlDFile(藉由伺服器ID來識別的資料 庫"I P位址和類型”) DBServicePortToProxyPortFile(資料庫"服務埠對代理词服 -87- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) .Γ r I --------訂---------,線' I. (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 4 48 3 ; 7 A7 __ B7 五、發明說明(85 ) 器埠"檔案) DB AttachedNetworksByServerIDFile(藉由词服器 I D 來識別 的資料庫"附屬網路"擋案) DBRoutingTab丨eFile(資料庫11路由選擇表”檔案) DBRoutingTablebyServerlDFile(藉由伺服器 I D 來識別的資 料庫”路由選擇表”檔案) 在IntraMap資訊2422中的諸多檔案,最後被被過濾,以 便產生列表243 1,然後再利用intraMap小爪哇程式2411將 它下載到客户端以供使用。 存取過濾器203之細節:圖20 3存取過濾器203之細節:圖2 0 圖20是一種存取過濾器203的架構2001之一方塊圖。在 顯示於圖2 0中的建構例中,與一些NIC(網路界面卡)卡 2013不同的所有存取過濾器2〇3组件都是以軟體方式來建 構的建構例中的軟體會在微軟公司所製造的windows N丁商標之作業系統下執行。軟體组件分爲兩大類:在作 業系统之使用者層級2003處’當作應用程式執行的那些組 件’以及在作業系統之核心層級(kernel level)2〇〇5處所執 行的那些組件。就大體而論,在核心層級處所執行的程式 會執行:I P層級存取核對,以及加密和鑑定;而在使用者 層級處所執行的那些程式則會執行應用層級存取核對。也 包括在使用者層級組件中的是:管理存取控制資料庫3〇1 的軟體,以及根據存取控制資料庫3〇i而產生針對丨p層級 存取核對之諸MMF和規則的軟體。下列討論將從核心層級 -88- - tA--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 本'紙張尺度適a中阁闭宕 ^ ^ r C / 0 r 5 \ 丁 ^ Ί I - Μ 公 4483 8 A7 B7 五、發明說明(86 ) 且件h is ’繼續討論與存取控制資料庫3 〇 1有關的使用者 層級組件,然後將會討論針對通信協定層級存取核對的 件。 核心層級组件 3核心層級組件 網路界面卡(Network Interface Card,簡稱NIC)2013 :這 些是安裝在存取過濾器203中的乙太網路(ethernet)和令牌 環卡(token ring card)。一般說來,配置((;〇1^41^^)有三種 網路卡。一種是爲:針對網際網路,針對一種廣域網路 (wide area network,簡稱WAN)201 1,或者針對連接到另— 存取過濾器203之一網路的界面而配置的。另一種是爲針 對所有客户端電腦的界面2 0 0 7而配置的;而第三種則是爲 針對提供TCP/IP服務之諸伺服器的界面2009而配置的。若 不必要將一存取過濾器203置於諸多客户機與伺服器之 間’則可能只有兩種NIC 20 13 : —種針對WAN 20 1 1,而另 一種則針對LAN(區域網路)。若在存取過濾器2〇3之位置 處並沒有伺服器存在,或者’若所有的局部客户機都有權 存取所有的局部資訊資源是可接受的;則不必要將存取過 濾器置於其間。 經濟部智慧財產局員工消費合作社印製 塡隙軟體(SHIM)2017 :在安裝時,將一種填隙(士⑻軟 體模組插入Windows NT商標之作業系統的兩個層級(NDIs 和TDIS層級)之間。這樣會造成針對特定通信協定的所有 通信量都會通過S ΗIΜ 2 01 7。在建構例中,針對τ c P /1P通 信協定的所有通信量都會通過SHIM 201 7,而非TCP/IP通 -89- 本纸張尺度適f中舀國家標準(CNS)A4規格(210 X 297公窆) 448387 經濟部智慧財產局員工消f合作社印製 A7 ___B7____ 五、發明說明(87 ) 信協定之通信量則從NIC直接前往一些適當的其它核心模 組。SHIH 2017必要時會調用(invoke) SKIP模组來處理 tcp/ip通信協定之通信量。 SKIP模組2〇21 :經由SKIP 2 02 1來發送所有的I p網路通 信量。若輸入分包資訊不是SKIP類型,即··不需要由 SKIP來執行鑑定和解密服務;則SKIP模组202 1會將它傳 遞到I P過濾器模組2 0 1 9。同樣地,若不打算對輸出分包資 訊加以加密,則SKIP模組2021會將它直接發送到適當的 NIC 2013,以供傳輸之用。雖有SKIP類型之分包資訊,但 在SKIP模组2021中的鑑定符(authenticat〇r)2024可作爲鑑定 一項對話之用;而加密器/解密器2022則可作爲對在一種 對話層級處的資訊加以加密和解密之用。可能利用:任意 數目的其它存取過濾器203,使用SKIP的一些伺服器,以 及使用SKIP的一些客户機來完成鑑定以及加密/解密。鑑 定和加密演算法都是基於SEND參數,針對輸出分包資 訊’由I P過濾器模組2019加以設定的;或者,都是在輸入 分包資訊内加以載明的。 SKIP模组202 1會爲與它對談的每個其它網站維持足夠的 狀態資訊,使得:對於大多數的SKIP類型之分包資訊而 言,它能夠維持高速操作。分包資訊有時候會,•被停留·· (parked) ’而附加處理(共享機密及暫時密鑰(teinporary key) 計算)則會被執行。在使用者空間2003中的"skipd_,模组 2037會執行這種額外處理。 I P過濾器2019 : I P過濾器根據一套規則而操作,該規則 -90- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公发) 1 _ ^1 - - I 1^1 I - - - I —I JA · I I 1 - .- ---- or , li t— - - - 1 i (請先閱讀背面之注意事項再填寫本頁) 448387 A7This paper size applies the Chinese National Standard (CNS) A4 specification (21〇χ 297 mm) 'J 448387 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (M) The access operation is allowed or denied Port number, use this rule to perform low-level filtering of the message β Figure shows an example of MMF file 2303. The file in question is: DBCertifiCatesbyUSerGr〇uP (Database identified by user group " Certificate, ... " File 2 丨 〇1, which will be used to identify certificates that belong to a number of specific user groups The matching criteria are mapped to: some identifiers in the database 3W for records of many user groups specified by the certificate matching criteria. Thus, Building Case 2101 allows a proxy server fan with a certificate that will identify the source of a message that has been encrypted using SKIP: many user groups to which the user identified by the certificate belongs. In a preferred embodiment, the certificate matching criteria are: 0 (organization) '0U (organization unit) in the x.509 certificate, and (eight (certificate authority) fields. All MMF files 2303 have the same There are two main parts of the general form: the title part 2103, which contains the information being mapped by the isthmus: and the data part 2105, which contains the information being pointed to by the mapping. The title 2103 contains many publications A list of entries 2107. Each entry will contain: the number by which it is being mapped (in this case, the CMC Matching Criterion (CMC) 21〇9): and Point to the index (pc) inter) 21 ii in the data part 21〇5, which contains β Λ which is being pointed to by the mapping (in this case, it is: for the identification by CMC 2 丨 09 Among the many user groups to which the user belongs, one of the identifiers 2U3 in the database 3o 丨 is listed in 21) 5). Many of the entries in Title 2 103 are sorted according to the information on which they are being mapped (here, * CMC 21〇9), making it possible to use many standard fast search algorithms to n J- H ^ 1 ¢ .- 1 ^ — ^^ 1 I II · 1-*-III. 1 ^^ 1 one I l I----I n ft t (This page) -86-448387 Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs, printed by the cooperative, A7 B7 V. Description of the invention (84) Corresponds to the position of one of the items in the set of matching rules of a given if book 2 丨 〇7a Figure 23 A , B and C provide: a complete list of many MMF files 2301 used in one of the access filter 203 construction examples β According to the description of the file contents provided in the table 'These files and databases The relationship between some tables will be obvious. Each MMF file 2303 is represented by one of the entries in the table, which indicates the file name and its contents. Subdivide the files into the following groups: 23 11, 23 13, 23 19, 232 1, 2323, and 2422. Some files of particular interest are: DBUsers (Database 1'Users) Building Case 2307 and DBResources (Database " Resources '') Building Case 2309, both of which describe decisions; DBCertificatesByUserGroup (by user groups To identify the database "certificate," file 2101, which is the MMF project shown in Figure 21 in detail; DBResourcelDbyServicelD (database identified by IP name " resource identifier ") file 23 15, it will make the URL (common resource indicator) of the resource and the resource ID (identifier): 08 feet 680111'0655 > ^ 16 5 0111 ^ 61〇 (database identified by resource 10) " resource ") Case 23 17, it will make the resource and resource group related; and DBTrustTable (database_'trust level table ') file 2325, it will construct the SEND table 601. Furthermore, the following files are used to compile the rules: DBServerlDByNameFile (database identified by IP name " server ID " file) DBIPAndTypeByServerlDFile (database identified by server ID " IP address and type ”) DBServicePortToProxyPortFile (Database " Service Port-to-Proxy Serving-87- This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm). Γ r I -------- Order ---------, line 'I. (Please read the notes on the back before filling this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4 48 3; 7 A7 __ B7 V. Description of the invention ( 85) Device port " File) DB AttachedNetworksByServerIDFile (Database identified by server ID " Subordinate network " File) DBRoutingTab 丨 eFile (Database 11 routing table "file) DBRoutingTablebyServerlDFile (by server Database "route selection table" files identified by the device ID) Many files in the IntraMap information 2422 were finally filtered to generate the list 243 1 and then use the intraMap mini Java program 24 11 Download it to the client for use. Details of the access filter 203: Figure 20 3 Details of the access filter 203: Figure 20 Figure 20 is a block diagram of an architecture 2001 of an access filter 203. In the construction example shown in FIG. 20, all access filter 203 components different from some NIC (network interface card) cards 2013 are constructed in software. The operating system manufactured by the company is under the trademark N of Windows. Software components are divided into two categories: those components that execute as applications at the user level 2003 of the operating system and those that execute at the kernel level 2005 of the operating system. By and large, programs executed at the core level perform: IP-level access checks, as well as encryption and authentication; those executed at the user level perform application-level access checks. Also included in the user-level component are: software for managing the access control database 3001, and software that generates MMFs and rules for p-level access checks based on the access control database 30i. The following discussion will be from the core level -88--tA -------- Order --------- line (please read the precautions on the back before filling this page) This' paper size is moderate a The cabinet is closed ^ ^ r C / 0 r 5 \ Ding Ί Ί I-Μ 公 4483 8 A7 B7 V. Description of the invention (86) and the item h is' continue to discuss the user related to the access control database 3 〇1 Hierarchical components, and then discussions on communication protocol-level access checks. Core-level components 3 Core-level components Network Interface Card (NIC) 2013: These are the Ethernet and token ring cards installed in the access filter 203. Generally speaking, there are three types of network cards ((; 〇1 ^ 41 ^^). One is: for the Internet, for a wide area network (WAN) 201 1, or for connecting to another — Configured to access the network interface of one of the filters 203. The other is configured for the interface 2 0 7 of all client computers; the third is designed to provide TCP / IP services The server interface is configured in 2009. If it is not necessary to place an access filter 203 between many clients and servers, there may be only two NICs 20 13: one for WAN 20 1 1 and the other For LAN (Local Area Network). If no server exists at the location of access filter 203, or 'if all local clients have access to all local information resources, it is acceptable; It is not necessary to put an access filter in between. Printed Gap Software (SHIM) 2017 by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs: When installing, insert a gap filler (Shiji software module into the Windows NT trademark operation Two levels of the system (NDIs and TDIS levels This will cause all traffic for a specific communication protocol to pass S ΗIM 2 01 7. In the construction example, all traffic for the τ c P / 1P communication protocol will pass SHIM 201 7 instead of TCP / IP通 -89- This paper is in accordance with the National Standard (CNS) A4 specification (210 X 297 public) 448387 Printed by the cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 ___B7____ V. Description of Invention (87) Letter of Agreement The traffic goes directly from the NIC to some appropriate other core modules. SHIH 2017 will invoke the SKIP module to handle the traffic of the TCP / IP communication protocol when necessary. SKIP module 2021: via SKIP 2 02 1 To send all IP network traffic. If the input subcontracting information is not SKIP type, that is, SKIP does not need to perform authentication and decryption services; SKIP module 202 1 will pass it to the IP filter module 2 0 1 9. Similarly, if the output subcontracting information is not intended to be encrypted, the SKIP module 2021 will send it directly to the appropriate NIC 2013 for transmission. Although there is SKIP type subcontracting information, But the identifier in SKIP module 2021 (Authenticat〇r) 2024 can be used to identify a conversation; the encryptor / decryptor 2022 can be used to encrypt and decrypt information at a conversation level. Possible use: any number of other access filters The server 203 uses some servers of SKIP and some clients of SKIP to perform authentication and encryption / decryption. The authentication and encryption algorithms are based on the SEND parameter and are set by the IP filter module 2019 for the output subcontracting information; or both are specified in the input subcontracting information. The SKIP module 202 1 will maintain sufficient status information for every other website it talks with, so that it can maintain high-speed operation for most SKIP-type subcontracting information. Sometimes subcontracted information will be parked, and additional processing (shared secret and temporary key calculation) will be performed. In userspace 2003 & skipd_, module 2037 performs this additional processing. IP Filter 2019: The IP filter operates according to a set of rules, the rule -90- This paper size is applicable to China National Standard (CNS) A4 specifications (210 X 297 public) 1 _ ^ 1--I 1 ^ 1 I---I —I JA · II 1-.- ---- or, li t—---1 i (Please read the notes on the back before filling this page) 448387 A7

經濟部智慧財產局員工消費合作社印" 五、發明說明(88 ) 是:資料庫服務2029之一组件的規則編譯程式,根據存取 控制資料庫3 01中的存取決策加以制定的。I p過濾器的— 些基本功能都是用來: 1 將通信量傳遞到TCP/IP堆叠。 2 阻擋通信量-將針對特定I P位址的通信量明確地棄 置’並且是根據針對緊急情沉的諸多特別規則。 3 棄置通信量-將既不和任何規則匹配又不被任何決策 所容許的通信量明確地棄置β 4 代理處理通信量-不是將通信量遞送到被指示目標, 而是將它路由指引到在目前機器上之一代理伺服器應 用程式。 5 執行網路位址轉換-將可能是非法的内部I ρ位址改變 成合法的I Ρ位址9 6 . 一建立典法由規則嚴格地決定存取控制操作所針針的 一項新對話,就會將決策遞給p.r Jpf(被討論於下)。一 般說來,迈是針對可能被決策或被前述之νρΝ鑿隧道 操作特點所容許的對話。 IP過濾器2019基於下列資訊而執行這些功能: 由規則編譯程式所產生的規則; 來源和目標I P位址和i阜號; 關於輸入分包資訊的加密,或者不加密;以及 關於輸出分包資訊的所需加密和鑑定。 與資料庫3 0 1有關的組件 3與資料庫301有關的组件 •91 - 本纸fe尺度遇用中囵囿豕標準(CNS)A4規格(210 X 297公爱) - ------ ^ *-------訂--------» rr f (请先閱讀背面之注意事項再填寫本頁) 448387 A7 B7 五、發明說明(89 ) 共享目錄(Shared Directory)2028 : VPN 201使用什麼存取 過/慮器2 0 3都會保持駐留其中的單一存取控制資料庫3 〇 1。 在一既定存取過濾器203中之資料庫30 1的所有版本都被 維持在共享目錄2028中。共享目錄2028也包含每個存取過 :慮器203的登綠樓案(丨0g f丨丨。 專用連接服務(Private Connect Service,簡稱pcs)模组 2025 , PCS模组2025提供在VPN 201中的"存取過渡器對存 取過滅器通«所有這樣的'通信都會通過具有 ^自己的I p埠號’而其訊息則必須被加密。藉由pcs訊息 來實行的一些特定功能有: • 分配樹管理; • 資料庫3 0 1之分配.和同步; • 路由選擇表1721之檢索和分配; • Windows網域和使用者資訊之檢索; • 網路掃描; • 登錄内容之檢索;以及 •由報表及其它子系統所使用之諸樓案的傳送。 ISDB管理程式2027 : ISDB管理程式207會管理資料庫 301 °它和pcs都是唯一針對在每個存取過濾器203中的資 料庫301之諸拷貝的界面。它包含用來讀寫在資料庫301 之諸拷貝中之所有表的軟體。 赏料庫(DB)服務和規則编譯程式2〇29 :資料庫服務模組 2029會產生諸多MMF檔案2301。每次在存取過濾器2〇3中 收到資料庫301之一新拷貝的時候,它都會這麼做。它利 -92- 本纸張尺度適用中S國家標準(CNS)A4規格(210 x 297公釐) (琦先^详背面之注意事項再填寫本頁^ 丨^i-------訂·---- 線 經濟部智慧財產局員工消費合作社印*'< 4483 8 經濟部智慧財產局員工消費合作社印袈 A7 B7 五、發明說明(9〇 ) 用由ISDB管理程式2027所提供的功能來讀取針對一既定存 取過濾器203 (I)的活資料庫1907(1)並產生諸多MMF 2301。 資料庫服務模組2〇29之一组件是規則编譯程式,它會根據 諸多MMF 2301中的一些有關MMF來產生使用在IP過濾器 模组201 9中的一些規則。該規則會載明存取操作被容許或 拒絕所針對的:I P來源’目標,以及埠號。規則编譯程式 存在’充當一種DLL以及一種只是調用DLL中之諸常式 (routines)的應用程式。在正常操作中,每當在存取過濾器 203⑴中’從主決策管理程式2〇5中收到已修改資料庫3〇1 時’在DLL中之諸常式都是由資料庫服務模組2029加以調 用的。在安裝和啓動程式(bootstrapping)處理過程期問, 應用程式被使用在一些特別模式中。 s己憶體映射楼案(MMF)2301 :像已經説明的那樣,mmF 2301都是由資料庫服務模组2029所產生的資料樓案,並且 都被存取過濾器203中的很多其它模组所利用。設計樓案 以使下列操作儘可能有效的: •從使用者識別方法映射到(諸多)使用者群组; • 從資訊資源映射到(諸多)資訊集; •尋找與諸多使用者群組有關聯的決策;以及 •.尋找與諸多資訊集有關聯的決策p 與鑑定有關的组件 3與鑑定有關的组件 評估程式(Evaluator)2〇36 :評估程式2〇36是由諸多代理 伺服器203 1中的每個代理伺服器所使用的諸多之一隹 93- 本紙張尺度適用中關家標準(CNS)A4規格(21G)<297公爱) (請先閱讀背面之注意事項再填寫本頁) 、κ--------訂----- 線 經濟部智慧財產局員工消費合作社印製 44838 A7 一 B7 五、發明說明(91 ) 合。評估程式2036會提供下列功能給諸多代理伺服器: • 提示(Prompting)使用者另外的"在頻帶内•,或"在頻帶 外”識別資訊; • 從鑑定工具程式服務(Authentication Tool Service,簡 稱ATS)中獲得"在頻帶外”鑑定資訊: • 從SKIPd中獲得與目前使用者有關聯的證書; • 讀取諸多MMF 2301 ’並決定:存取決策是否允許使用 者存取資源:以及 . 若在其它情況下存取操作被容許,則建構針對路徑之 信賴/靈敏度等級計算,包括決定存取操作是否可能 經由路徑而被容許,如果這樣;則需要何種加密和鏗 定方法’以及哪個存取過濾器最接近伺服器。這些功 能都是由稱爲VPN管理程式的評估程式2036之一組件 加以執行的。 銀定工具程式服務/使用者識別客户軟體(ats/uic)2〇39 和2041 ·· ATS 2039是在一種會搜集和鑑定使用者資訊的客 户機一伺服器應用程式中的伺服器。ATS 2039會在電腦上 執行,而在其上則有存取過濾器203之其它組件正在執 行。客户機部份是〜UIC 2041,它會在基於windows之客户 機上執行。ATS 2039和UIC 2041都是機制,存取過濾器 203會藉由遠機制來獲得_ι在頻帶外鑑定資訊^ a丁g 2039 和UIC 204 1會藉由一項與正在被鑑定之對話分離的對話而 通信0 ATS 2039會收集並快速存取(caches)它從諸多^⑴客 户機中獲得的鑑定資訊’進而提供該資訊給評估程式 -94- 本紙張尺度適用中國國家標準(CNSM4規格(210 X 297公爱) l.k.-------訂.--------·線 ^待先閱讀背面之注意事項再填寫本頁) 44838 經濟部智慧財產局具工消費合作社印製 Α7 Β7 五、發明說明(92 ) 2046。來自諸客户機的被快速存取資訊包括: • Windows ID ; •身份識別證書:以及 • 鑑定令牌I D。 SKIPd 2037 : 大多數的SFCIP'd功能都是支援SKIP模組202 1。那些功能 包括: • 與其它通信夥伴們交換證書資訊。藉由使用證書發現 通信協定(CDP)來完成此事。 • 計算狄菲-黑爾曼f Diffie_Hellman)其享機密方法。這 種共享機密方法是SKIP操作的關鍵。這種計算可能花 上一段可觀的時間,並且以一種加密形式將它儲存到 磁碟。 • 計算用來加密對話的傳送密鑰。這些密鑰會延續一段 時間或資料量。 • 此外,SKIPd將會提供證書匹配準則給(諸多)評估程 式,以便使用在使用者識別方法中。 代理伺服器203 1 3代理伺服器2031 如前面所説明的’代理伺服器是:在截取針對特定通信 足之通信量的存取過渡器2 0 3中的軟體。代理飼服μ瞭 解通信協定的是:它正在載取資訊,因而能夠獲得用來 識別正在被存取的資源及/或從對話期間正在被交換的訊 息中加以鑑定使用者所需的資訊。隨著I Ρ過濾器將一些使 -95- 本紙張丈度適用中固國家標準(CNS)A4規格(210x297公窆) L I _ ' fk· -------訂·-------- (請先閱讀背面之注意事項再填寫本頁) 4483 8 7 A7 B7 ----- 經濟部智慧財產局員工湞費合作社印製 五、發明說明(93 ) 用一既疋通信協定的訊息從其標準埠重新指引到其非標準 埠,除SMTP外的所有代理伺服器都會接收:針對它們的 通仏k疋,在與標準埠不同的一些埠上的訊息。代理伺服 器提供i已經k斜話中獲得的資訊給評估程式2〇36,以便 決定:使用者是否有權存取資訊資源。若使用者有權存 取’則存取過濾器2〇3會將輸入訊息轉遞到它們被定址到 的伺服器’並且藉由針對該通信協定的服務,在伺服器中 將Λ息進一步處理。在下列描述中,使用在一較佳實施例 中的每個通信協定都會被討論;當然,其它實施例則可能 包括針對其它通信協定的代理伺服器。Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs " V. Invention Description (88) is: a rule compiler for a component of the database service 2029, which is formulated based on the access decision in the access control database 301. Ip filters — some basic functions are used to: 1 Pass traffic to the TCP / IP stack. 2 Blocking Traffic-Traffic for specific IP addresses is explicitly discarded ’and is based on many special rules for emergency situations. 3 Discard traffic-Explicitly discard traffic that neither matches any rules nor is allowed by any decision β 4 Agent handles the traffic-instead of delivering the traffic to the indicated target, it directs it to the One of the current proxy server applications on the machine. 5 Perform network address conversion-change a potentially illegal internal I ρ address to a legitimate IP address 9 6. Establish a code to strictly determine the rules for access control operations , The decision will be passed to pr Jpf (discussed below). In general, Mai is directed at dialogues that may be tolerated by decision-making or by the aforementioned νρΝ tunneling operating characteristics. IP Filter 2019 performs these functions based on the following information: rules generated by the rule compiler; source and destination IP addresses and IP addresses; encryption of input subcontracting information, or no encryption; and output subcontracting information Required encryption and authentication. Components related to database 3 0 1 3 Components related to database 301 • 91-This paper's fe standard meets the Chinese Standard (CNS) A4 specification (210 X 297 public love)------- ^ * ------- Order -------- »rr f (Please read the notes on the back before filling this page) 448387 A7 B7 V. Description of the invention (89) Shared Directory 2028: VPN 201 keeps a single access control database 3 03, which access / receiver 2 0 3 uses. All versions of the database 301 in a given access filter 203 are maintained in the shared directory 2028. The shared directory 2028 also contains the case of each user who has accessed: 203 of the green building case (丨 0g f 丨 丨. Private Connect Service (pcs) module 2025, PCS module 2025 is provided in VPN 201 The "access adapter" accesses the access controller «all such 'communications will have ^ own IP port number' and its messages must be encrypted. Some specific functions implemented by pcs messages are : • Allocation tree management; • Allocation and synchronization of database 301; • Retrieval and allocation of routing table 1721; • Retrieval of Windows domain and user information; • Network scanning; • Retrieval of login content; And • transmission of reports used by reports and other subsystems. ISDB Manager 2027: ISDB Manager 207 manages the database 301 ° It and pcs are unique to the data in each access filter 203 The interface of the copies of the library 301. It contains software for reading and writing all the tables in the copies of the database 301. Database Service and Rule Compiler 2009: Database Service Module 2029 Will generate many MMF files Case 2301. Every time it receives a new copy of the database 301 in the access filter 203, it will do so. It is -92- This paper standard applies to the National Standard S (CNS) A4 (210 x 297 mm) (Qi ^ ^ Please note the details on the back before filling in this page ^ 丨 ^ i --------- Order · ---- Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Online Economics * '& lt 4483 8 Employees' Cooperative Cooperative Seal A7 B7 of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the Invention (90) Use the function provided by the ISDB management program 2027 to read live data for a given access filter 203 (I) Library 1907 (1) and generates many MMF 2301. One of the components of the database service module 2029 is a rule compiler, which will generate and use the IP filter module 201 according to some of the many MMF 2301 related to MMF. 9 9 There are some rules in this rule. This rule specifies what the access operation is allowed or denied: IP source 'destination, and port number. The rule compiler exists' to act as a DLL and just call the routines in the DLL ( routines). In normal operation, whenever in the access filter 203⑴ 'When the modified database 3001 is received from the main decision management program 2005' The routines in the DLL are called by the database service module 2029. The installation and startup processing (bootstrapping) process During the process, the application is used in some special modes. S Self Memory Map Building Case (MMF) 2301: As already explained, mmF 2301 is a data building case generated by the database service module 2029. And they are used by many other modules in the access filter 203. Design a building plan to make the following operations as effective as possible: • Mapping from user identification methods to (many) user groups; • Mapping from information resources to (many) information sets; • Finding associations with many user groups Decision-making; and • finding decision-making related to many information sets p. Components related to evaluation 3 component-related evaluation program (Evaluator) 2036: the evaluation program 2036 is composed of a number of proxy servers 2031 One of the many used by each proxy server. 93- This paper size applies to the Zhongguanjia Standard (CNS) A4 specification (21G) < 297 public love) (Please read the precautions on the back before filling this page) , Κ -------- Order ----- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Online Economy 44838 A7 One B7 V. Description of the invention (91). The evaluation program 2036 will provide the following functions to many proxy servers: • Prompting the user for additional " in-band •, or " out-of-band "identification information; • From the Authentication Tool Service (Authentication Tool Service, ("ATS") for "out-of-band" authentication information: • Obtain certificates associated with the current user from SKIPd; • Read many MMF 2301 'and decide: whether the access decision allows the user to access the resource: and . If the access operation is allowed in other cases, construct a trust / sensitivity level calculation for the path, including determining whether the access operation is likely to be permitted via the path, and if so; what encryption and method of determination is required '; Which access filter is closest to the server. These functions are performed by a component of an evaluation program 2036 called a VPN management program. Yinding tool program service / user identification client software (ats / uic) 2039 and 2041 ATS 2039 is a server in a client-server application that collects and authenticates user information. ATS 2039 will be executed on the computer and other components on which the access filter 203 is executed. The client part is ~ UIC 2041, which will be executed on a windows-based client. ATS 2039 and UIC 2041 are mechanisms. The access filter 203 will obtain remote identification information through a remote mechanism. ^ G 2039 and UIC 204 1 will be separated from the dialog being authenticated by an Dialogue and communication 0 ATS 2039 will collect and quickly access (caches) the authentication information it obtained from many clients, and then provide this information to the evaluation program -94- This paper standard applies to the Chinese national standard (CNSM4 specification (210 X 297 public love) lk ------- order .-------- · line ^ to read the notes on the back before filling in this page) 44838 Printed by the Industrial Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Α7 Β7 V. Description of the invention (92) 2046. Quick access information from clients includes: • Windows ID; • Identity certificate: and • Authentication token ID. SKIPd 2037: Most SFCIP'd functions support SKIP module 202 1. Those functions include: • Exchange certificate information with other communication partners. This is done by using the Certificate Discovery Protocol (CDP). • Calculate Diffie-Hellman's secret method. This shared secret method is key to SKIP operations. This calculation can take a considerable amount of time and save it to disk in an encrypted form. • Calculate the transport key used to encrypt the conversation. These keys can last for a period of time or amount of data. • In addition, SKIPd will provide certificate matching criteria to (among many) evaluation procedures for use in user identification methods. Proxy server 203 1 3 Proxy server 2031 As described above, the 'proxy server' is software in the access transition device 203 that intercepts traffic for a specific communication foot. The agent feed μ understands the communication protocol: it is carrying information, so it can obtain the information it needs to identify the resource being accessed and / or identify the user from the information being exchanged during the conversation. With the IP filter will make some -95- this paper measurement applies to the National Solid Standard (CNS) A4 specification (210x297 cm) LI _ 'fk · ------- Order · ----- --- (Please read the notes on the back before filling out this page) 4483 8 7 A7 B7 ----- Printed by the Employees ’Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of Invention (93) Use an existing communication agreement Redirects messages from its standard port to its non-standard port, and all proxy servers except SMTP will receive: for their communication, messages on ports other than the standard port. The proxy server provides the information obtained from the oblique words to the evaluation program 2036 in order to determine whether the user has access to the information resources. If the user has access to 'then the access filter 203 will forward the input message to the server to which they are addressed' and further process the information in the server with the service for that protocol . In the following description, each communication protocol used in a preferred embodiment will be discussed; of course, other embodiments may include proxy servers for other communication protocols.

Pr_ipf( I Ρ過濾器代理伺服器):大多數的網路通信量會 在少數通信協定上發生,而在存取過濾器2〇3中則會有針 對該協定的諸多代理伺服器。然而,甚至在沒有代理伺服 器的地方’也必須制定一項存取決策。在某些情形下,可 能在核心層級處由I P過濾器2〇19來制定決策·,當它不會制 定決策時,I P過濾器2〇丨9就提供通信量給pr—ipf,它會歿 得任何它能夠從通信量中獲得與使用者識別方法和資訊資 源有關的資訊,進而將該資訊傳遞到評估程式2〇36,以便 決定存取操作是否應該被准許。pr_ipf事實上並不是—種 代理伺服器,由於它只是做出一項針對IP過濾器2〇19的存 取決定而已’故而不會將任何通信量傳遞到標準通信協定 软體。 FTP(檔案傳送協定):ftp代理伺服器會處理針對樓案傳 送協定的TCP/IP分包資訊。在VPN 201之一當前實绝例 -96- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) . t >衣 --------訂--------",線 (请先闇讀背面之注意事項再填寫本頁) 448387 經濟部智慧財產局員工消費合作社印製 A7 __________B7__ 五、發明說明(94 ) 中’只是將存取控制施行到帳户(登錄)層級;而在其它實 施例中’則可能將存取操作控制到檔案存取層級。在通信 協定之FTP登綠部份期間’代理伺服器會決定正在被存取 的詞服器及帳户(account) ’並且將此資訊提供給評估程式 2036,以便決定:使用者是否屬於一使用者群組,該群組 的諸多成員可能存取對應於該帳户的資訊集。代理词服器 使用載明於FTP通信協定中與使用者互相作用的令牌來進 一步處理"在頻帶内”鑑定資訊。 FTP實際上是一種非常複雜的通信協定,涉及主動 (active)和被動(passive)模式(被使用在網路瀏覽器及某些 自動FTP客户軟體中)》此外,FTP資料傳送是利用一種第 二動態決定式TCP(傳輸控制通信協定)對話。這就需要一 種FTP代理伺服器與I p過濾器20丨9之間的特殊界面,使得 FTP代理伺服器能夠對IP過濾器2〇19指示:它應該會容許 第二對話》 HTTP(超本文傳送協定):對於http之公用網域 CERN(歡洲起子物理研究所)建構例而言,' HTTP代理词服 器是根據來源碼(source code)而,構築的,並丑包含所有它 的快速存取邏輯(caching logic)。代理伺服器使用評估程式 2036來核對指向一 URL的每項存取操作。沒有”在頻帶内,_ 鑑定資訊是利用HTTP執行的。Pr_ipf (IP filter proxy server): Most network traffic will occur on a few communication protocols, and in access filter 203 there will be many proxy servers for this protocol. However, even where there is no proxy server, an access decision must be made. In some cases, the decision may be made by the IP filter 2019 at the core level. When it does not make a decision, the IP filter 20 provides traffic to pr-ipf, which will Any information it can obtain from the traffic related to user identification methods and information resources, and then pass that information to the evaluation program 2036 in order to determine whether the access operation should be permitted. pr_ipf is not actually a kind of proxy server, because it just makes an access decision for IP filter 2019, so it does not pass any traffic to the standard communication protocol software. FTP (File Transfer Protocol): The ftp proxy server handles TCP / IP subcontracting information for the building transfer protocol. One of the current examples in VPN 201-96- This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm). T > clothing -------- order ---- ---- ", line (please read the precautions on the back side and then fill out this page) 448387 Printed by A7 of the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs __________B7__ 5. In the description of the invention (94), only the access control will be implemented To the account (login) level; in other embodiments, it is possible to control access operations to the file access level. During the FTP login green part of the communication protocol, the 'proxy server will determine the server and account being accessed' and provide this information to the evaluation program 2036 in order to determine whether the user belongs to a use Group, many members of the group may have access to the information set corresponding to the account. The proxy server uses tokens that interact with users in the FTP communication protocol to further process "in-band" authentication information. FTP is actually a very complex communication protocol that involves active and passive (Passive mode) (used in web browsers and some automatic FTP client software). In addition, FTP data transfer uses a second dynamic deterministic TCP (Transmission Control Protocol) conversation. This requires an FTP proxy The special interface between the server and the IP filter 20 丨 9 enables the FTP proxy server to indicate to the IP filter 2019: it should allow a second conversation. "HTTP (Super Text Transfer Protocol): For http In the public domain CERN (Huanzhou Koji Institute of Physics) construction example, the HTTP proxy server is constructed based on source code and contains all its fast access logic (caching logic). . The proxy server uses the evaluation program 2036 to check every access operation pointing to a URL. No "in the band, authentication information is performed using HTTP.

Telnet(遠距通信網路):Telnet資源由於Telnet註册的非 標準化性質而只被控制到伺服器層級。只是了提供附加的 "在頻帶内”鑑定資訊才會使用Telnet代理伺服器。它是諸 -97- 本紙張尺度遇用中舀國家標準<cns)a4^77】0 x 297公发) L I I k*--------訂--------- (請先閱讀背面之注意事項再填寫本頁> 44838 7 A7Telnet (Remote Communication Network): Telnet resources are controlled only to the server level due to the non-standardized nature of Telnet registration. Telnet proxy server is used only to provide additional " in-band "authentication information. It is Zhu-97- this paper standard meets the Chinese National Standard < cns) a4 ^ 77】 0 x 297 public) LII k * -------- Order --------- (Please read the precautions on the back before filling in this page> 44838 7 A7

五、發明說明(95 ) 經濟部智慧財產局員工消費合作社印製 多眞實代理伺服器中最簡單的, NNTP :網路新聞傳送協定 ^ ^ ^ (Network News Transfer ⑽㈣01 ’簡稱簡TP)被使用來控制新聞傳送(_s feed)和 新聞讀取兩種操作。在新聞傳送操作期間,顔”代理词 服器注視著未編碼m些訊息都是已經被轉換 資訊交換標準碼本文(ASCIItex⑽供傳輸之用的二進^ 息(binary messages)。這種訊息常被解散成爲多重部产 (multi-part)訊息,以便將它們保持達到—種合理的尺寸刀 _戈理词服器會快速存取二進制訊息的;有部份。訧 每個這樣的訊息而t ’若該訊息是將要完成—項多重部产 訊息的最後部份’則將整個多重部份訊息加以組合,進: 抗病毒(aim-virus)模組2033會針對諸多病毒加以核對該訊 息,就像更加詳細描述於下的那樣。在新聞讀取操作期 間,將存取操作保護到新聞群组層級。就像在其它代理伺 服器中那樣,評估程式2036被使用來決定:目前使用者是 否可能存取新聞群組。 眞實聲頻通信(Real Audio):眞實聲頻通信代理伺服器容 許客户機存取只有在伺服器層級處才受到保護的眞實聲頻 通信伺服器。眞實聲頻通信協定雖然利用一種標準Tcp套 接通信連接(socket connection)來建立一項對話,但是隨後 就使用一種轉回U P頻道。就像對於FTP那樣,眞實聲頻通 信代理伺服器具有一種針對I P過濾器2〇丨9的界面,該界面 允許它對I P過濾器20 I 9指示:轉回U P頻道是被容許的。 SMTP ·‘簡單郵件傳送協定(simpie Mail Transfer Protocol, 98 本纸張尺度適用中國國家標準(CNS)A4規格(2】0 X 297公釐) nt· ^^1· I u 1^— ! · n n I _ · fc I t 1 n · 1 11 ^^1 ^^1 - 1^1 t (請先閱ir背面之注音?事項再填寫本Ϊ 4838 7 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(96 ) 簡稱SMTP)代理伺服器與其它代理伺服器不同處在於:】p 過遽器之代理伺服器的諸多規則都不是被使用來重新指引 通信量到SMTP代理伺服器。其實其它代理伺服器會在„ 個非標準埠上"傾聽";而SMTP代理伺服器則會在標準埠 (25)上傾聽,隨後會執行它自己與標準sMTp伺服器軟體的 通信連接。在資料庫30 1中的存取決策必須明確地容許此 存取操作。 IntraMap :當使用者載明針對lntraMap之URL時,報表管 理程式209會下載IntraMap小瓜哇程式,而被下載之小爪哇 程式則嘗試執行一種接回到具有報表管理程式2〇9的存取 過滤器203之一套接口(socket)的通信連接=局部存取過遽 器203 (I)的I P過濾器201 9會截取嘗試執行通信連接資訊, 進而和b彳疋供給局环存取過遽β 1 〇3 (I)上的IntraMap代理 伺服器》藉由尋找在資料庫30丨之局部拷貝中的回答 (answers)並將回答轉回給小爪哇程式,代理伺服器會對來 自小爪哇程式的查詢(query)作回應。隨著所有的回答正在 被過濾而反映使用者之存取權利。IntraMap代理伺服器並 非一種眞實代理伺服器是因爲:整個通信連接總是由截取 通信連接之IntraMap代理伺服器的實例加以完全服務的。 抗病毒模组2033 3抗病毒模組2033 在·—較佳貫施例中的抗病毒模组2 0 3 3是由位於美國加州 古柏提諾市(Cupertino,CA·)的趨勢微_ .晉公司(Trend Micro Devices, Inc,)所提供的諸多DLL之一集合。在其它實 -99- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐〉 (請先閱讀背面之ii意事項再填寫本頁) ^ ----V. Description of the Invention (95) The simplest of the multi-agent proxy server printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs, NNTP: Network News Transfer Protocol ^ ^ ^ (referred to as Jane TP) is used Control news feed (_s feed) and news read two operations. During the news transmission operation, the Yan proxy server watched that the unencoded messages were converted to information exchange standard code text (ASCIItex⑽ binary messages for transmission. Such messages are often used by Dissolve into multi-part messages in order to keep them reachable—a reasonable size knife_Goli word server will quickly access binary messages; there are parts. 訧 Each such message and t ' If the message is to be completed—the last part of a multi-part message, then the entire multi-part message is combined into: The anti-virus (aim-virus) module 2033 will check the message against many viruses, like It is described in more detail below. During the news reading operation, the access operation is protected to the news group level. As in other proxy servers, the evaluation program 2036 is used to determine whether the current user is likely to save Get newsgroups. 眞 Real Audio: 眞 Real Audio Communication Agent Server allows clients to access 眞 Real Audio which is only protected at the server level Communication server. Although the Real Audio communication protocol uses a standard TCP socket connection to establish a conversation, it then uses a switch back to the UP channel. As with FTP, the Real Audio communication proxy server has An interface for the IP filter 20-9, which allows it to indicate to the IP filter 20 I 9: Switching back to the UP channel is allowed. SMTP · 'Simple Mail Transfer Protocol (98 papers) The scale is applicable to China National Standard (CNS) A4 (2) 0 X 297 mm. Nt · ^^ 1 · I u 1 ^ —! · Nn I _ · fc I t 1 n · 1 11 ^^ 1 ^^ 1-1 ^ 1 t (Please read the phonetic on the back of ir? Matters before filling in this Ϊ 4838 7 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy The difference between the servers is:] Many rules of the proxy server of the p server are not used to redirect traffic to the SMTP proxy server. In fact, other proxy servers will "quote listen" on the non-standard ports ; And SM The TP proxy server listens on the standard port (25), and then performs its own communication connection with the standard sMTp server software. The access decision in the database 30 1 must explicitly allow this access operation. IntraMap : When the user specifies the URL for lntraMap, the report management program 209 downloads the IntraMap program, and the downloaded Java program attempts to execute an access filter that returns to the report management program 209. The communication connection of a set of sockets of 203 = the IP filter 201 of the local access controller 203 (I) 201 9 will intercept the information of the attempt to perform communication connection, and then supply the local ring with b 彳 疋. 〇3 (I) IntraMap Proxy Server "By looking for the answers in the local copy of database 30 丨 and returning the answers to the Java program, the proxy server will query the Java program (Query) in response. As all responses are being filtered to reflect user access rights. The IntraMap proxy server is not a real proxy server because the entire communication connection is always fully serviced by the instance of the IntraMap proxy server that intercepts the communication connection. Anti-virus module 2033 3 Anti-virus module 2033 The anti-virus module 2 0 3 in the preferred embodiment is a trend micro__ located in Cupertino, CA, California. One of the many DLLs provided by Trend Micro Devices, Inc. In other practice -99- This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) (Please read the notice on the back before filling this page) ^ ----

I T ______ I ^-0 « J [ I I 線 4483 8 7 A7 --------------------- 五、發明說明(97 ) 施例中,可能使用來自其它來源的抗病毒模組51抗病毒模 ,-且2033會針對病毒加以檢查所有進入2〇 1的資料。爲 了提供使用者關於資料轉移進行的回授功能(feedback)並 預防使用者之客户软體程式時間暫停(timing out),將資料 轉移到客户機並在同時間内加以拷貝進入一種用於病毒檢 查的暫時樓案中。然而,並未將資料的最後部份發送到客 户機’直到完成病毒檢查後爲止。該最後部份一處在暫時 榼茱中说會針對諸多病毒加以檢查暫時檔案。若未偵測出 病毒’則將資料的其餘部份發送到客户機。若發覺病毒, 則中止資料轉移。在本實施例中,使用者被通知傳輸失 效。若管理員已經這樣载明,則可能將—種警戒資訊發送 到管理員。 啓動(launck) ’登錄,警戒以及報表模組2 〇 2 7 : 此模组的一些組件會執行下列功能 •啓動控制起動(startup)工作之初始順序;當達立VPN 20 1時’該初始順序就會在一存取過濾器2〇3上發生。 *登錄-一種提供已標準化登綠界面的dll。 •警戒-一種注視著所有NT登錄的獨立(standalone)程 式,因而找尋載明於資料庫3〇1的警戒條件。使用GU:[ 來載明遞送警戒資訊所利用的方法,以供定義警戒資 訊之用。 .報表-將諸多登錄之一子集合轉遞到一種特別報表登 綠,加以▲縮成資料庫,稍後再轉遞到報表管理程式 209 〇 -100- 本紙張尺度適用争舀國家標準(CNS)A4規格(210x297公发) (請先閱讀背面之注意事項再填寫本頁) *^·-------訂〃-------1 *5^ ^濟部智餐財產局員工消費合作社印制界 4483 8 / A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(98 ) 管理圖形使用者界面1 9 1 5 : GUI(圖形使用者界面)可p , )j把在存取過濾器203上,或者在 附屬於存取過減2ΓΠ而 ^ ''有一種3 2位元Windows商標之 作業系統的任何電腦上執行。⑽不論是在存取過據器 203上還疋在附屬系統上執行,它都會利用管理程式 2〇27來讀出或寫入在存取控制資料庫π丨中之一工作資料 庫 1903。經由 GUI 1915,料 A % a丨义 μ — °對存取控制貧料庫3 〇丨做出所有 的必要修改。在GUI中之應用"操作,被當作一種信號 發送到PCS 2〇25 ’它會藉.由起動前述的分配和同步操作來 對信號作回應。 存取過/慮器2 0 3之操作的詳細實例:圖$和2 2 3存取過濾器2 0 3之操作的詳細實例:圖5和2 2 在下列描述中,將要詳細説明圖5之端對端加密實例。 在該實例中,其P C配備有Skip之一漫遊者503正在存取: 在VPN 201上之一網站之内,一種配備有SKIp的何服器 407。當漫遊者503被建立來存取VPN 201時,它是經由使 用一種特別加密類型的存取過濾器4〇3(3)而被這樣建立 的。此處’將會假定:正在被漫遊者503所使用的加密類 型具有"機密”之信賴等級:並且假定:使用者想要存取在 伺服器407上之網頁,該網頁具有"機密"之靈敏度等钗。 由於正在被存取的是網頁,故而漫遊者503正在使用針對 它與伺服器407上之HTTP服務之對話的HTTP通信協定。由 於漫遊者503,在VPN 201中的諸多存取過濾器203,以及 伺服器407全部配備有SKIP ;故而它們全部備有它們自己 -101 - 本纸張尺度適用中國國家標準(CNS)A4規格(2】0 X 297公发) --^ I ·------------------A^l--------'S界 A請先閱讀背面之注音?事項再填寫本頁) 448387 經濟部智.€財產局員Η消費合作社印製 A7 B7 五、發明說明(99 ) 的公用和專用密鑰=最小限度下,漫遊者503也具有針對 存取過濾器403(3)的證書和公用密鑰,它會將針對VPN 201内部之諸伺服器的訊息指引到存取過濾器403(3);存取 過濾器403(3)具有針對漫遊者503的證書和公用密鑰(或者 使用證書發現通信協定來獲得它們);在VPN 201中的所 有存取過濾器203具有或能夠得到:彼此的公用密鑰,以 及針對在VPN 201中配備有SKIP的諸多伺服器之公用密 鑰。此外,在VPN 201中的每個存取過濾器203都會知 道:在VPN 20 1中的所有其它的存取過濾器203及諸多伺 服器之I P位址。 被當作漫遊者503與伺服器407之間的HTTP對話之一部份 加以發送和接收的所有訊息都是由SKIP加以加密和鑑定 的。圖2 2顯示:由這樣一種SKIP訊息220 1所採用的格 式。SKIP訊息是由SKIP軟體加以製作在訧是SKIP訊息之 來源的系統上。此處所顯示的SKIP訊息220 1是來自漫遊者 5 0 3。它的主要组成部份是: 外IP標題2203 :外IP標題2203被使用來將SKIP訊息遞送 到存取過濾器403 ( 3) »包含在I P標題2203中的有:針對漫 遊者503之來源IP位址2209,以及針對存取過遽器403(3) 之目標IP位址2206。當漫遊者503被建立來存取VPN 201 時,由漫遊者503所使用的目標位址2206就被設立來載明 存取過濾器403 (3)。來源I P位址2209可能由網際網路服務 提供者(Internet service provider)以動態方式指定給漫遊者 503 ;而漫遊者503則加以使用,以便連接到網際網路 -102- 本紙張尺度適用中固國家標準(CNS)A4規格(210 X 297公发) (請先閱請背面+/;1音?事項再填寫木Fc \_______丁 If "ν I t 丨兮0 * l f 線 4 483 8 7 經濟部智慧財產局員工消費合作社印5衣 Α7 Β7 五、發明說明(100) 121。外IP標題2203還包含一個訊息類別(message type,簡 稱Μ T )欄位2208,它會載明:訊息是一種SKIP訊息。 SKIP標題2205 : SKIP標題2205包含當收到SKIP訊息時 就用來解密SKIP訊息2201所需的資訊。SKIP標題2205至 少包含·針對目標之證書,那就是,針對存取過濾器 403 (3)之證書的目標NSID(名稱空間識別符)2215和目標 MKID(主密鑰識別符)22 1 3 ;以及針對來源之證書,那就 是,針對漫遊者503之證書的來源!^1〇2219和來源%1<:1〇 2217。此外’ SKIP標題2205包含:針對用來鑑定訊息之演 算法(MAC ALG 2226)和用來加密訊息之演算法(crypt ALG 222:5)的識別符;以及用來解密訊息的一種已加密傳 送密鑰(Kp 2223)和針對用來解密傳送密鑰之演算法的識別 符 2224 » 鑑定標題22 Π :鑑定標題22 U包含一種訊息鑑定碼 (message authentication code,簡稱MAC)222 卜它是根據在 欄位2226中所識別的MAC演算法加以計算出的;並且它被 存取過濾器403 (3)使用,以便驗證:訊息在沒有干預下抵 達。 已加密有效負載(payload)2227 :已加密有效負載2227包 含度遊者5 0 3正在發送到词服器4 〇 7的已知加密訊息,它包 括·針對該訊息的I P標題233 1 ’以及已加密訊息2229。I P ^題233 1具有:針對伺服器407的Ip位址,以及針對http 通信協定服務的埠號。藉著使用具有由CRYpT ALg(加密 演算法識別符)2225所載明之解密演算法的傳送密鑰Kp -103- 本紙張尺度適用中固國家標準(CNS)A4規格(2丨〇 X 297公釐) (請先閱讀背面之注惠事項再填寫本頁) ν^--------訂---------線 4483 8 經濟部智慧財產局員工消費合作社印*'衣 A7 B7 五、發明說明(1〇1) 2223,就能夠對已加密有效負載2227加以解密。 處理SKIP訊息2201 3處理SKIP訊息2201 SKIP訊息220 1抵達在存取過濾器403 (3)的網際網路界面 2〇11上。訊息之處理始於核心層級2005中的SHIM層級 處。SHIM 2017會將所有輸入通信量發送到SKIP 2021,它 依序地根據Μ T欄位2208而察覺到:該訊息是一種SKIP訊 息。要解密並鑑定訊息,SKIP需要解密傳送密鑰Κρ 2223,並且要做的是:它會將SNSID 2219,SMKID 22Π, DNSID 2215,以及DMKID 2213 提供給 SKIPd 2037,SKIPd 會用這些ID,以便從SKIPd 2037之證書快速存取儲存器 (cache)中檢索針對漫遊者503和存取過濾器403 (3)的證 書。若證書不在那裏,則SKIPd 2037使用CDP通信協定來 提取證書。然後,將證書中的資訊和存取過濾器4〇3 (3)之 專用密鑰一起使用;以便產生一種共享機密數値,然後使 用遠數値來解达傳送密論Kp 2223,進而產生兩個内部密 鑰:Akp和Ekp » SKIP會安全地儲存共享機密數値,以便和 未來成息一起使用’此乃因爲該數値之計算要花費可觀的 時間量。其次’爲整個已收到訊息計算出mac,並且將 Akp和MAC 2221及MAC ALG 2226 —起使用,以便驗證: 整個S BCIP sfl息2 2 0 I未曾被干預。如果就是這種情形,就使 用内邵密輪Ekp來解密已加密有效負載2227,以便恢復來 自漫遊者503的原始訊息。然後將已解密有效負載2227提 供給I P過遽器2 01 9 ’它會將它的一些規則應用到:來源 -104- 本紙張尺度述用中國國家標準(CNS)A4規格(210 X 297公发) t請先加讀背面之法意事項再填窵本頁) ,^'-------訂---------線 448387 A7IT ______ I ^ -0 «J [II line 4483 8 7 A7 --------------------- V. Description of the invention (97) In the example, it may be used from The anti-virus module 51 from other sources is anti-virus module, and 2033 will check all the information entered into 001 for viruses. In order to provide users with feedback on data transfer and prevent the user software program from timing out, the data is transferred to the client and copied at the same time into a virus check Temporary building case. However, the last part of the information was not sent to the client 'until the virus check was completed. The last part of the article in Temporary Dogwood says that temporary files will be checked for many viruses. If no virus is detected, then the rest of the data is sent to the client. If a virus is detected, the data transfer is suspended. In this embodiment, the user is notified that the transmission has failed. If the administrator has stated so, it is possible to send a kind of alert information to the administrator. Start (launck) 'Login, Alert, and Reporting Module 2 〇 2 7: Some components of this module will perform the following functions: • Initial sequence of startup control startup work; when Dali VPN 20 1' this initial sequence It will happen on an access filter 203. * Login-a dll that provides a standardized green login interface. • Vigilance-a standalone program that looks at all NT logins, so look for the vigilance conditions contained in database 301. Use GU: [to specify the method used to deliver alert information for defining alert information. .Reports-transfer a subset of the many registrations to a special report to log in, ▲ shrink into a database, and later transfer to the report management program 209 〇-100-This paper standard applies to the national standard (CNS) ) A4 size (210x297) (Please read the precautions on the back before filling in this page) * ^ · ------- Order --------- 1 * 5 ^ ^ Ministry of Economy Bureau Consumer Consumption Cooperative Printed Area 4483 8 / A7 B7 Printed by Employee Property Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of Invention (98) Management Graphical User Interface 1 9 1 5: GUI (Graphical User Interface) Available p) j is executed on the access filter 203, or on any computer attached to the access subtraction 2ΓΠ and having a 32-bit Windows trademark operating system. No matter it is executed on the access register 203 or on the auxiliary system, it will use the management program 2027 to read or write one of the working databases 1903 in the access control database π 丨. Via GUI 1915, the material A% a 义 μ — ° makes all necessary modifications to the access control lean library 3 〇 丨. The application "operation in the GUI" is sent as a signal to PCS 205. It will respond to the signal by initiating the aforementioned allocation and synchronization operations. A detailed example of the operation of the access filter 203: Figures $ and 2 2 3 A detailed example of the operation of the access filter 203: Figures 5 and 2 2 In the following description, the details of Figure 5 End-to-end encryption instance. In this example, a roamer 503 equipped with Skip is accessing: within a website on VPN 201, a server 407 equipped with a Skip. When the roamer 503 is established to access the VPN 201, it is so established by using an access filter 403 (3) of a special encryption type. Here 'will assume that the encryption type being used by the roamer 503 has a "confidential" trust level: and assume that the user wants to access a web page on the server 407, which has a "confidential" The sensitivity and so on. Because the web page being accessed is, the roamer 503 is using the HTTP communication protocol for its dialogue with the HTTP service on the server 407. Because of the roamer 503, many storages in the VPN 201 The filter 203 and the server 407 are all equipped with SKIP; therefore, they are all equipped with their own -101-This paper size is applicable to the Chinese National Standard (CNS) A4 specification (2) 0 X 297 public)-^ I · ------------------ A ^ l -------- 'S sector A, please read the phonetic on the back? Matters before filling out this page) 448387 Ministry of Economic Affairs Intellectual property. Member of the property bureau Η Printed by consumer cooperative A7 B7 V. Public and private keys of invention description (99) = At a minimum, roamer 503 also has a certificate and public key for access filter 403 (3) , It will direct messages for servers inside VPN 201 to the access filter 403 (3); 403 (3) has a certificate and public key for roamer 503 (or obtain them using a certificate discovery communication protocol); all access filters 203 in VPN 201 have or can get: each other's public key, and Public keys for many servers equipped with SKIP in VPN 201. In addition, each access filter 203 in VPN 201 will know: all other access filters 203 and many more in VPN 201 The IP address of the server. All messages sent and received as part of the HTTP conversation between the roamer 503 and the server 407 are encrypted and authenticated by SKIP. Figure 22 shows: A format used by SKIP message 220 1. The SKIP message is produced by SKIP software on the system that is the source of the SKIP message. The SKIP message 220 1 shown here is from the roamer 503. Its main components The copies are: Outer IP Header 2203: Outer IP Header 2203 is used to deliver SKIP messages to the access filter 403 (3) »Included in IP Header 2203 are: Source IP address 2209 for roamer 503, and Against The target IP address 2206 of the router 403 (3) has been taken. When the roamer 503 is established to access the VPN 201, the target address 2206 used by the roamer 503 is set up to specify the access filter 403 (3). The source IP address 2209 may be dynamically assigned to the roamer 503 by the Internet service provider; and the roamer 503 is used to connect to the Internet-102- This paper Standards apply to China Solid State Standards (CNS) A4 specifications (210 X 297) (please read the first + /; 1 tone? Fill in the matter again Fc \ _______ 丁 If " ν I t xi 0 * l f Line 4 483 8 7 Printed on the clothes of the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Α7 Β7 V. Description of Invention (100) 121. The outer IP header 2203 also contains a message type (message abbreviation MT) field 2208, which will state that the message is a SKIP message. SKIP header 2205: SKIP header 2205 contains the information needed to decrypt the SKIP message 2201 when it is received. The SKIP header 2205 contains at least a target-specific certificate, that is, a target NSID (namespace identifier) 2215 and a target MKID (master key identifier) 22 1 3 of the certificate against the access filter 403 (3); and For the certificate of the source, that is, the source of the certificate for the roamer 503! 102219 and source% 1 <: 102217. In addition, the SKIP header 2205 contains: an identifier for the algorithm used to authenticate the message (MAC ALG 2226) and the algorithm used to encrypt the message (crypt ALG 222: 5); and an encrypted transmission key used to decrypt the message Key (Kp 2223) and identifier 2224 for the algorithm used to decrypt the transmission key »Authentication Title 22 Π: Authentication Title 22 U contains a message authentication code (MAC) 222 The MAC algorithm identified in bit 2226 is calculated; and it is used by the access filter 403 (3) to verify that the message arrived without intervention. Encrypted payload 2227: Encrypted payload 2227 contains a known encrypted message that is being sent to Server 4 07 by Duyou 5 0 3, which includes the IP header 233 1 'for the message and the Encrypted message 2229. I P ^ Question 233 1 has an IP address for the server 407 and a port number for the http protocol service. By using the transmission key Kp -103- with the decryption algorithm specified in CRYpT ALg (Cryptographic Algorithm Identifier) 2225, this paper size applies the China National Standard (CNS) A4 specification (2 丨 〇X 297) Li) (Please read the note on the back before filling in this page) ν ^ -------- Order --------- line 4483 8 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs * ' Clothing A7 B7 5. Description of the invention (101) 2223, the encrypted payload 2227 can be decrypted. Process SKIP message 2201 3 Process SKIP message 2201 SKIP message 220 1 arrives on the Internet interface 2101 of the access filter 403 (3). Message processing begins at the SHIM level in core level 2005. SHIM 2017 will send all incoming traffic to SKIP 2021, and it will sequentially perceive according to MT field 2208 that the message is a SKIP message. To decrypt and authenticate the message, SKIP needs to decrypt the transmission key κρ 2223, and what it has to do is: it will provide SNSID 2219, SMKID 22Π, DNSID 2215, and DMKID 2213 to SKIPd 2037, and SKIPd will use these IDs in order to retrieve the information from SKIPd The certificate fast access cache (2037) retrieves the certificate for the roamer 503 and the access filter 403 (3). If the certificate is not there, SKIPd 2037 uses the CDP protocol to extract the certificate. Then, use the information in the certificate with the private key of the access filter 403 (3); in order to generate a shared secret number, and then use the remote number to resolve the transmission secret Kp 2223, and then generate two Internal keys: Akp and Ekp »SKIP will securely store shared secret numbers for use with future earnings. This is because the calculation of this number takes a considerable amount of time. Secondly, calculate mac for the entire received message, and use Akp with MAC 2221 and MAC ALG 2226 together to verify: The entire S BCIP sfl interest 2 2 0 I has not been interfered with. If this is the case, the Inner Shaw Ekp is used to decrypt the encrypted payload 2227 in order to recover the original message from the roamer 503. The decrypted payload 2227 is then provided to the IP converter 2 01 9 'It will apply some of its rules to: Source-104- This paper standard uses China National Standard (CNS) A4 specification (210 X 297 public ) T Please read the French and Italian matters on the back before filling out this page), ^ '------- Order --------- line 448387 A7

五、發明說明(1〇2) 經濟部智慧財產局員工消費合作社印則^ I P位址,目標I p位址,以及丨P標題223丨的埠號。若没有 規則拒絕存取操作;則〗p過濾器2〇丨9遵從另一規則,並將 未加密訊息連同SNSID2219和SMKID2217重新指引到針對 HTTP代理伺服器之埠。ίρ過濾器2〇19使用mmf 2301中的 DBServicePortToProxyPort檔案來尋找正被談論之埠。 在作業系統之使用者層級2〇〇3中的應用層級處繼續訊息 之處理。HTTP代理伺服器能掌握的有:伺服器之〗p位 址’服務之埠號,針對網頁之URL,屬於漫遊者503的使 用者之證書’以及用來加密訊息的加密方法。它會使用許 估程式203 6,以便根據MMF 230 1來決定下列各項: • 由證書所表示之使用者所屬的諸多使用者群組; • 網頁所屬的諸多資訊集; • 是否有一項存取決策會允許諸多使用者群组中的至少 一個使用者群組存取諸多資訊集中的至少一個資訊 集:以及 • 訊息之信賴等級是否至少等於網頁之靈敏度等級。 就從這些工作中的第一項工作開始,評估程式2 0 3 6會接 收針對證書的NSID和MKID,並且使用來具有 DBCertificatesByUserGroup樓案之證書的證書匹配準則來 獲得:正在發送訊息之使用者所屬的諸多使用者群组之識 別符。 評估程式2036藉由採由:伺服器之I P位址,服務之埠 號,以及針對網頁之URL來決定資訊集;並且使用:具有 DBServerlDByIP(藉由ί P位址來識別的資料庫"伺服器I D ") -105- 本紙張尺度適用中國國家標準(CNS)A4規格(2〗0 X 297公爱) f Sr先閱ti背面之注意事項再填寫本頁) ;^V. Description of the Invention (102) The seal of the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ^ IP address, target IP address, and port number of title 223. If there is no rule to deny the access operation, then the filter 2o9 complies with another rule and redirects the unencrypted message along with SNSID2219 and SMKID2217 to the port for the HTTP proxy server. The filter 2019 uses the DBServicePortToProxyPort file in mmf 2301 to find the port in question. Processing of messages continues at the application level in the user level 2003 of the operating system. The HTTP proxy server can grasp: the server's p address, the service port number, the URL for the web page, the user certificate belonging to the roamer 503, and the encryption method used to encrypt the message. It will use the appraisal program 2036 to determine the following according to MMF 230 1: • Many user groups to which the user represented by the certificate belongs; • Many information sets to which the web page belongs; • Is there an access The decision will allow at least one of the many user groups to access at least one of the many information sets: and • Whether the trust level of the message is at least equal to the sensitivity level of the web page. Starting from the first of these tasks, the evaluation program 2 0 3 6 will receive the NSID and MKID for the certificate and use the certificate matching criteria for the certificate with the DBCertificatesByUserGroup building case to obtain: the user who is sending the message belongs Identifiers for many user groups. The evaluation program 2036 determines the information set by adopting: the IP address of the server, the port number of the service, and the URL of the web page; and uses: a database with DBServerlDByIP (a database identified by a P address " servo Device ID ") -105- This paper size applies to China National Standard (CNS) A4 specification (2〗 0 X 297 public love) f Sr Read the precautions on the back of ti before filling this page); ^

_____丁 *____ III I 十0 « i I I I 線 4483 8 7 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(1〇3 ) 案之IP位址來決定包含網頁之伺服器,具有 DBServicelDByPort(藉由埠號來識別的資料庫.,服務j D ”)檔 案心埠號來決定關於提供服務之伺服器的服務,以及具有 DBHes〇urceiDbyName(藉由IP名稱來識別的資料庫”資源 I D )榼案之URL來得到針對網頁所屬之資訊集的識別符。 隨著能掌握:針對使用者群组和資訊集,在資料庫3 〇 ^ 中的識別符··評估程式2036使用DBRes〇urceHf案來決 定:是否有一項存取決策會允許使用者所屬的任何使用者 群組存取網頁所屬的任何資訊集。這樣做,它可能只會考 慮一些其成員資格都是使用識別模式加以決定的使用者群 组,而遠識別模式的信賴等級對資源之靈敏度等級而言是 足夠的。DBResources檔案會將每個資訊集識別符映射 到,會有一些涉及菘資源集的存取決策所針對的諸多使用 者群组之一列表。對於每個使用者群組而言,DBRes〇町eu 檔案會進一步指示:決策是否容許或拒絕存取操作。評估 叙式2036使用DBResources檔案,依序地爲網頁所屬的每 個資訊集而決定:會有一些關於資訊集的存取決策所針對 的諸多.使用者群組之列表是否包括使用者所屬的諸多使用 者群組中的一個使用者群组。若有一項針對任何使用者群 组的存取決策拒絕存取操作,則評估程式對Ηττρ代埋伺 服器指示:存取操作被拒絕;若沒有釺對任何使用者群组 的存取決策拒絕存取操作且至少有—項決策容許存取^ 作,則評估程式對HTTP代理伺服器指示:存取操作被= 許;若沒有針對任何使用者群组的任何種類之存取決策, -106 - 本纸張尺度適用中國國家標準(CNS)A4規格(210x297公爱) K I-----------'k·-------訂 ---------線 (請先閱讀背面^-注意事項再填寫本頁> 4483 8 經濟部智^財崖局員工消費合作社印*'"1 A7 B7 五、發明說明(1〇4 ) 則評估程式會決定:是否至少會有—個基於證書或令牌之 使用者群組具有一項針對資源的容許決策。如果這樣,並 且請求客户機有UIC(使用者識別客户軟體)正在執行:= 聯繫UIC來對使用者要求附加身份證別資訊。若有附加身 份識別資訊回來,則重複上述處理過程。在其它情況,呷 估程式對HTTP代理伺服器指示:存取操作被拒絕。 口 當然,若存取請求並不具有一種等於網頁之靈敏度等級 的信賴等級,則評估程式2036也會拒絕存取操作。評估程 式2036從DBResourcesByResourcelD檔案中獲得網頁之靈敏 度等級’從DBTrustAuthentications(資料庫,'信賴等級鑑定,·) 檔案中獲得使用者識別方法之信賴等級,以及從 DBTmstEncryptions(資料庫"信賴等級加密";)擋案中獲得加 密方法之信賴等級。由於SKIP已經利用一種具有,,機密,, 之彳έ賴等級的方法來加密訊息’故而經由網路之路徑的信 賴等級與本實例無關。要決定··針對使用者識別和加密方 法的信賴等級是否對網頁之靈敏度等級而言是足夠的;評 估程式2036就會使用有效地建構SEND表601的DBTrustTable 檔案。若信賴等級是足夠的,則評估程式2〇36對代理伺服 器指示:存取操作被容許。 一旦代理伺服器已經確認:打算容許存取載明於訊息中 的資訊資源:代理伺服器就會發起一項新對話,針對實際 服務:關於伺服器407之HTTP服務。代理伺服器203丨會將 —項特別訊息發送到I P過濾器2019,因而告訴它:容許特 定對話通過;此乃因爲:在其它情況,此對話可能會被一 -107- 本纸張尺度過用中國Θ家標準(CNS)A4規格(210x 297公发) J I !.[ -----—0^ -----------------'绿 Γ清先閱讀背面<注音?事項再填寫本1) 4483 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(1〇5) 些規則所阻擋,或者再度被發送到代理伺服器。針對I p過 滅器20 1 9的訊息也包括關於新對話所需的加密方法之資 訊,在本實例中,該資訊是:針對最後存取過濾器4〇3 (5), 應該對該對話加以加密;並且應該使用適合於資料靈敏度 等級就是機密的加密方法。當Ip過濾器2〇19遭遇新對話 時,Έ:會發覺到:因爲該對話與代理伺服器2〇3丨所載明的 準則匹配’所以它會將該對話傳遞到SKIP模组。由於訧 此對話而言加密是必要的,故而訊息將會被重新加密。除 了下列各項之外’ SKIP模组2021會以如上所述的相同方式 來產生一種SKIP訊息2201 : •針對訊息的外IP標題2203載明:將存取過濾器403 (3)當 作訊息之來源’而將存取過濾器4〇3(5)當作訊息之目標; • 3〖115標題2205具有:針對存取過濾器4〇3(3)的5則10 2219和SMKiD 2217 ;以及針對存取過濾器403 (5)的 0則10 2215和01^1<:10 2213:並且,在標題2205中的其 它數値也都是:由訊息之來源和目標現在就是存取過 濾器403 (3)和存取過濾器403 (5)之事實所需的那些數 値; • 已加密有效負載2227與以前相同(除了使用一種不同 的密鑰而已經將它加密之外;並且必要時爲整個新訊 息2201而產生MAC 2221。 當代理何服器正在轉發(relaying)訊息時,它也正在注視 著可能包含病毒的檔案傳送類型。當它遭遇病毒時,它會 將抗病毒敕體2033應用到這些檔案。若檔案包含病毒,則 -108 - 本紙張尺度述用中國國家標準(CNS)A4規格(210 χ 297公发) ------In If -- I -- - .—J n ----〆 k^· In I - - ----- I -- 一01, » i - 1 I I--11 1 t y (請先/!3tt背面之注意事項再填駕本頁) 44838 7 經濟部智慧財產局員工消貲合作社印製 A7 B7 五、發明說明(1〇6) 代理伺服器未能遞送完整樓案,藉以使病毒不致於造成傷 害。若存取控制資料庫3 0 1這樣指示’則當抗病毒軟體 2033檢測出病毒時,代理伺服器就會發送一項警戒資訊, 當SKIP訊息2201在存取過濾器403 (5)處被接收時,就將 它傳遞到SKIP模組202 1,在該處,如前面所描述的,將它 鑑定和解密。關於存取過;慮器403 (3),藉由如上所述的相 同機制,在存取過濾器403 (5)上的I P過濾器20 1 9察覺到: 因爲訊息是指定給HTTP應用通信協定的,所以它會將訊 息指引到HTTP代理伺服器203 1。該代理伺服器會接受訊 息:然後將來自外I P標題2203和SKIP標題2205,它能夠獲 得關於訊息之發起者(存取過濾器403 (3))的資訊發送到評 估程式2036,以便決定:正在被此訊息鼓動的對話是否應 該被容許繼續進行。評估程式2036會檢視訊息之來源丨p位 址以及其它身份識別資訊;並且藉由查出在MMF擋案之 DBServerlDByIP檔案中的來源IP位址來決定:針對存取過 濾器403 (3),在資料庫30 1中的識別符;使用該識別符來 指出存取過丨慮备4 0 3 (3)之證書的位置;以及發覺到:證書 資訊與被檢索證書匹配,該被檢索證書與正在被處理的存 取過濾器4〇3 (3)之訊息有關聯。訊息之來源的存取過滤器 403 (3)因此而被認爲在VPN 201中之一存取過濾器403,所 以評估程式2036作出回應是:該對話應該被容許,理由是 它是一種已經被在相同VPN 201内之另一存取過渡器4〇3 所允許的訊息。將容許訊息的這項決策轉回給HTTP代理 伺服器203 1。評估程式2〇36會指導在存取過濾器403 (5)上 -109- 本纸張尺度適用中Θ國家標準(CNS)A4規格(2]0 >= 297公釐) (請先閲讀背面之注意事項再填寫本頁>_____ 丁 * ____ III I 10 0 «i III line 4483 8 7 Printed by A7 B7 of the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. The IP address of the invention description (103) case to determine the server containing the webpage, Have DBServicelDByPort (database identified by port number, service j D ") file heart port number to determine the service on the server providing the service, and have DBHes〇urceiDbyName (database identified by IP name" Resource ID) URL to get the identifier for the information set to which the web page belongs. With the ability to grasp: for user groups and information sets, the identifiers in database 3 〇 ^ · The evaluation program 2036 uses the DBRes〇urceHf case to decide whether there is an access decision that will allow any user to belong to A user group accesses any information set to which the page belongs. In doing so, it may only consider some user groups whose membership is determined using recognition patterns, and the trust level of the far recognition pattern is sufficient for the sensitivity level of the resource. The DBResources file maps each information set identifier to, and there will be a list of one of the many user groups for which access decisions concerning the resource set are targeted. For each user group, the DBRes〇machi eu file will further indicate: decide whether to allow or deny access operations. The evaluation narrative 2036 uses the DBResources file to determine for each information set to which the page belongs in order: there will be a lot of decisions about the access to the information set. Does the list of user groups include many of the user's belongings? A user group in a user group. If there is an access decision for any user group to deny the access operation, the evaluation program instructs the Ηττρ proxy server: the access operation is denied; if there is no access decision for any user group, the access is denied. Fetch operation and at least one decision allows access ^, the evaluator instructs the HTTP proxy server: the access operation is allowed; if there is no access decision of any kind for any user group, -106- This paper size applies to China National Standard (CNS) A4 specification (210x297 public love) K I ----------- 'k · ------- Order -------- -Line (Please read the back ^ -Precautions before filling in this page> 4483 8 Printed by the Ministry of Economic Affairs ^ Finance Cliff Bureau Consumer Consumption Cooperative Association * '" 1 A7 B7 5. Invention Description (104) The evaluation program will Decision: Will there be at least one certificate or token-based user group with an allowable decision for the resource. If so, and the requesting client has a UIC (User Identification Client Software) running: = Contact UIC to Ask the user for additional identification information. If additional identification information comes back, Repeat the above process. In other cases, the estimator instructs the HTTP proxy server: the access operation is denied. Of course, if the access request does not have a trust level equal to the sensitivity level of the web page, the evaluation program 2036 also The access operation will be denied. The evaluation program 2036 obtains the sensitivity level of the web page from the DBResourcesByResourcelD file. ; Trust level encryption ") Obtain the trust level of the encryption method in the file. Because SKIP has used a method that has the confidentiality level to encrypt the message, so the trust level of the path through the network and This example is irrelevant. It is necessary to decide whether the trust level for the user identification and encryption method is sufficient for the sensitivity level of the web page; the evaluation program 2036 will use the DBTrustTable file that effectively constructs the SEND table 601. If the trust level is If it is sufficient, the evaluation program 2036 Server instructions: The access operation is allowed. Once the proxy server has confirmed that it intends to allow access to the information resources contained in the message: the proxy server will initiate a new dialog for the actual service: About server 407 HTTP service. The proxy server 203 will send a special message to the IP filter 2019, thus telling it: allow a specific conversation to pass; this is because: in other cases, this conversation may be The scale used the Chinese Θ standard (CNS) A4 specification (210x 297 public) JI!. [-----— 0 ^ ----------------- '绿 Γ Qing first read the back & Zhuyin? Please fill in this item again 1) 4483 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (105) These rules are blocked or sent to the proxy server again. The message for the IP killer 20 1 9 also includes information about the encryption method required for the new conversation. In this example, the information is: for the last access filter 4 03 (5), the conversation should be Encryption; and an encryption method appropriate to the sensitivity level of the data should be used. When the IP filter 2019 encounters a new conversation, Έ: will find that: Because the conversation matches the criteria specified by the proxy server 2003, it will pass the conversation to the SKIP module. Since encryption is necessary for this conversation, the message will be re-encrypted. Except for the following items, the SKIP module 2021 generates a SKIP message 2201 in the same manner as described above: • The outer IP header 2203 for the message states that the access filter 403 (3) is used as the message Source 'and target the access filter 403 (5) as the message; • 3 〖115 Title 2205 has: 5 10 2219 and SMKiD 2217 for the access filter 403 (3); and 0 of the access filter 403 (5) 10 2215 and 01 ^ 1 <: 10 2213: And the other numbers in the title 2205 are also: the source and destination of the message are now the access filter 403 ( 3) and those required for the fact of access filter 403 (5); • the encrypted payload 2227 is the same as before (except that it has been encrypted using a different key; and if necessary for the entire New message 2201 generates MAC 2221. When the proxy server is relaying the message, it is also watching the type of file transfer that may contain a virus. When it encounters a virus, it applies the anti-virus carcass 2033 to These files. -108 if this file contains a virus The description uses the Chinese National Standard (CNS) A4 specification (210 χ 297 issued) ------ In If-I--. --J n ---- 〆k ^ · In I--- --- I --- 01, »i-1 I I--11 1 ty (please fill in this page with the precautions on the back of /! 3tt) 44838 7 Printed by A7, Employees’ Cooperative of Intellectual Property Bureau, Ministry of Economic Affairs B7 V. Description of the invention (106) The proxy server failed to deliver the complete case so that the virus would not cause harm. If the access control database 3 0 1 instructs this, then the anti-virus software 2033 detects a virus , The proxy server will send a warning message. When the SKIP message 2201 is received at the access filter 403 (5), it will pass it to the SKIP module 202 1 where it is as described above. Regarding access, the filter 403 (3), by the same mechanism as described above, the IP filter 20 1 9 on the access filter 403 (5) notices: because of the message Is assigned to the HTTP application protocol, so it will direct the message to the HTTP proxy server 203 1. The proxy server will accept the message: it will then send the message from the outer IP header 2203 and SKIP 2205 title, which can be obtained on the originator of the message (access filter 403 (3)) to send information to the evaluation program 2036, in order to decide: this message is being instigated whether dialogue should be allowed to proceed. The evaluation program 2036 will look at the source of the message, the p address, and other identifying information; and determine it by the source IP address found in the DBServerlDByIP file of the MMF file: For the access filter 403 (3), The identifier in database 301; using the identifier to indicate the location of the certificate that was accessed 403 (3); and found that: the certificate information matches the retrieved certificate, and the retrieved certificate matches the certificate being retrieved The processed message of access filter 403 (3) is related. The access filter 403 (3) of the source of the message is therefore considered to be one of the access filters 403 in VPN 201, so the evaluator 2036 responds that the conversation should be allowed because it is a Messages allowed by another access transit device 403 within the same VPN 201. This decision to allow the message is passed back to the HTTP proxy server 2031. The evaluation program 2036 will guide on the access filter 403 (5) -109- Applicable to this paper standard Θ National Standard (CNS) A4 Specification (2) 0 > = 297 mm) (Please read the back first Please fill out this page >

It衣·--- 訂---------線 44838 7 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(1〇7 ) 的HTTP代理伺服器203 1 :爲了相同的理田,容許從相同 對話傳來的任何請求。當HTTP請求被處理時,代理伺服 器就用與輸出對話被建立在存取過濾器403 (3)上相同的方 式來建立一種與在伺服器407上之HTTP服務的輸出通信連 接。 當初啓與伺服器407的通信連接時*評估程式203 6會查 出在MMF棺案之DBServerlDByIP樓案中的伺服器407之IP 位址,以便決定:針對伺服器4 〇 7,在資料庫3〇丨中的識 別符:使用該識別符來指出伺服器表的位置;進而使用來 自遠表之澄書識別和DBCertificates(資料庫"證書”)植案來 尋找針對伺服器407之證書》然後它使用針對存取過濾器 4〇3 (3)的岔鑰以及針對词服器407的公用密鑰(從坪書中獲 得)來構築一項SKIP對話,如前面所描述的。將實際訊息 加以加密和鑑定,增加SKIP標題2205,並且增加外ίρ標題 2203,因而將訊息指引到伺服器4〇7。 當訊息觸及伺服器407時,在伺服器4〇7中的SK〖p就會: 核對關於訊息的鑑定資訊,對它解密,進而將已解密訊息 轉遞到HTTP服務;該服務會執行存取:由包含於有效負 載中之訊息所請求的網頁。已經獲得網頁’ ^τρ服務會 產生一種具有載明將漫遊者503當作目標之〗ρ標題的轉回 訊息(return message)。然後,將此轉回訊息加以封裝在一 種SKIP訊息2201中,如前面所描述的。此如心息被指 引到存取過滤器4〇3(5),並且包含在外標題22〇3fpSKIp標 題2205中的資訊,該資訊對那些實體之間的訊息而言是必 -110· 本紙張尺度適用中固國家標準(CNS)A4規格(2】〇 x 297公爱) L—-----------h.--------訂---------線 (請先閱讀背面之注意事項再填寫本頁) 4 4 8 3 8 7 經濟部智慧时產局員工消費合作社印- A7 B7 五、發明說明(108) 要的。 當回答(reply)訊息觸及存取過濾器403 (5)時,在那裏的 SKIP模組2〇2 1就會對它加以鑑定和解密,並傳送到丨p過 濾器20 19。該訊息被發覺與一現存對話匹配,所以不必要 評估;因而將它直接轉遞到HTTP代理伺服器2〇3 1。在那 裏,將它當作一種HTTP通信協定回答訊息加以核對有效 性,進而將它重新傳送回到就是存取過濾器403 (3)之HTTP 對話的發起者。由於瞭解此對話的發起者可能是在VPN 201中的另一存取過濾器403 ’故而不會執行抗病毒模組 203 3的核對操作,就像瞭解必要時存取過濾器會執行核對 操作那樣。使用對存取過濾器403 (3)與存取過濾器403 (5) 之間的訊息交換而言是必要的諸多SKIP參數,經由SKIP 模組202 1,再度處理回答訊息之重新傳輸,並且對它加以 加密,如上述。It clothes · --- Order --------- line 44838 7 Printed by A7 B7, Employee Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs V. HTTP Proxy Server 203 for Invention Description (107) 1: For the same Rita allows any request from the same conversation. When the HTTP request is processed, the proxy server establishes an outgoing communication connection with the HTTP service on the server 407 in the same manner as the outgoing session is established on the access filter 403 (3). When the communication connection with the server 407 was started, the evaluation program 203 6 will find the IP address of the server 407 in the DBServerlDByIP building of the MMF coffin case, so as to determine: For the server 4 07, in the database 3 〇 丨 Identifier: Use this identifier to indicate the location of the server table; then use the identification from the remote table and DBCertificates (database " certificate ") to find the certificate for server 407" and then It uses a fork key for the access filter 4 03 (3) and a public key (obtained from Pingshu) for the servlet 407 to construct a SKIP conversation, as described earlier. The actual message is added to Encryption and authentication, add the SKIP header 2205, and add the outer title 2203, so the message is directed to the server 407. When the message reaches the server 407, the SK in the server 407 will check: Regarding the authentication information of the message, decrypt it, and then forward the decrypted message to the HTTP service; the service will perform access: the webpage requested by the message contained in the payload. The webpage has been obtained. ^ Τρ 服务 会Generate a return message with a title that specifies the rover 503 as the target. Then, encapsulate this return message in a SKIP message 2201, as described previously. This is as heart The information is directed to the access filter 403 (5), and the information contained in the outer title 2203fpSKIp title 2205 is necessary for the information between those entities. -110 · This paper standard applies to the solid state National Standard (CNS) A4 Specification (2) 0x 297 public love) L ------------- h .-------- Order --------- line (Please read the notes on the back before filling out this page) 4 4 8 3 8 7 Printed by the Consumers Cooperatives of the Wisdom and Time Bureau of the Ministry of Economic Affairs-A7 B7 V. Description of Invention (108) Required. When the reply message touches the deposit When the filter 403 (5) is taken, the SKIP module 2021 there will authenticate and decrypt it and send it to the p filter 20 19. The message was found to match an existing conversation, so it is not Necessary evaluation; it is therefore forwarded directly to the HTTP proxy server 201. There, it is checked as an HTTP communication protocol reply message. Validity, and then resend it back to the originator of the HTTP conversation that is access filter 403 (3). Knowing that the originator of this conversation may be another access filter 403 'in VPN 201 Performs a check operation of the anti-virus module 203 3, just as it knows that the access filter performs a check operation when necessary. Use the message between the access filter 403 (3) and the access filter 403 (5) Many SKIP parameters that are necessary for the exchange are processed again through the SKIP module 202 1 and the encryption of the reply message, as described above.

當此回答訊息來到存取過據器403 (3)時,恰好發生相同 的事情’那就是,訊息通過SKIP模組202 1和I P過濾器 20 I 9,來到HTTP代理伺服器203 1。在那裏,將它當作一種 HTTP通信協定回答訊息加以核對有效性;可能通過抗病 毒模組2033 (如果訊息内容類型對它保證的話);進而將它 重新傳送回到就是漫遊者503之HTTP對話的發起者。對於 正在將一項訊息從存取過濾器403 (3)發送到漫遊者503而 言’使用如上所宣示的SKIP參數,經由SKIP模組2021, 再度處理回答訊息之傳輸,進而如上述般對它加以加密。 然後’在漫遊者503處接收回答訊息;在該處:利用SKIP 本纸張尺度適用中舀國家標準(CNS)A4規格(210 X 297公楚) L I ----------l*k*-------訂'--------線 .1 (請先閱讀背面之注t事項再填寫本頁) 經濟部智慧財產局員工消货合作社印製 4483 b A7 _____B7 五、發明說明(1〇9) 對该戒息鑑疋和%岔’提供訊息给使用者之濁覽笑,並 爲使用者而顯示出來。 使用在存取過濾器203中的諸多技術之通則 使用在存取過濾器203中的諸多技術已經用兩種方式加 以通用化: .將決策評估和決策施行分離,它會允許與存取過濾器 不同的實體加以施行決策:以及 •決策資料庫現在不但允許定義:使用者,使用者群 组,資源,以及資源群組;而且允許定義:諸多新使 用者識別類型,可能定義決策所針對的諸多新行動類 型,以及諸多新資源類墊。 ’ 下列时淪將首先描述:可能怎樣將決策評估和決策施行 分離,然後再描述:可能怎樣擴充用來定義決策的諸多^ 型。 ’ 將決策評估和決策施行分離:圖2〇,26,及27 圖26是一種決策施行系統26〇1之—方塊圖,其中:已經 將決策評估和決策施行分離。在系統26〇丨中,決策的觀念 (notion)已經加以通用化,不但包括:存取決策,管理決 策’以及決策制定決策;而且包括:使用者可能對一資訊 資源執行的任何行動β譬如説,一項決策可能陳述:一特 定使用者群組可能印出屬於一特定資訊集的一些文件。 系統2 6 0 1具有五個主要組件: •請求實體2603,它會請求要對資訊資源執行的行動, 並且它可能是能夠屬於一使用者群組的任何實體; -112- 本纸張尺度適用中固國家標準(CNS)A4規格(210x297公楚) LI;----------· · I -------訂·--------線 (请先閱該背面之;t意事項再填寫本頁)When this answer message comes to the access register 403 (3), exactly the same thing happens', that is, the message passes through the SKIP module 202 1 and the IP filter 20 I 9 to the HTTP proxy server 2031. There, check it for validity as an HTTP communication protocol reply message; possibly through anti-virus module 2033 (if the message content type guarantees it); and then resend it back to the HTTP conversation which is the roamer 503 The initiator. For a message being sent from the access filter 403 (3) to the roamer 503, 'using the SKIP parameters as announced above, via the SKIP module 2021, the processing of the reply message is processed again, and then it is processed as described above. Encrypted. Then 'receive the answer message at the roamer 503; here: use SKIP This paper size applies the China National Standard (CNS) A4 specification (210 X 297) Chu ---------- l * k * ------- Order '-------- line. 1 (Please read the note t on the back before filling this page) Printed by the Consumer Goods Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 4483 b A7 _____B7 V. Description of the invention (109) The information on the disciplinary information and the% Cha 'is provided to the user's unscrupulous smile and displayed for the user. General principles of many technologies used in access filter 203 Many technologies used in access filter 203 have been generalized in two ways:. Separating decision evaluation and decision execution, it will allow access filters Decision making by different entities: and • The decision database now not only allows definitions: users, user groups, resources, and resource groups; it also allows definitions: many new types of user identification that may define many New action types, and many new resource-type pads. ’The following description will first describe how it is possible to separate decision evaluation and decision execution, and then describe how it is possible to expand the many types of definitions used to define decisions. Separate decision evaluation and decision execution: Figures 20, 26, and 27 Figure 26 is a block diagram of a decision execution system 26001, in which decision evaluation and decision execution have been separated. In system 26〇 丨, the notion of decision (notion) has been generalized, including not only: access decisions, management decisions' and decision-making decisions; but also: any action that users may perform on an information resource, such as , A decision may state that a particular user group may print some documents that belong to a particular information set. System 261 has five main components: • Requesting entity 2603, which will request an action to be performed on an information resource, and it may be any entity that can belong to a user group; -112- This paper standard applies China National Standard (CNS) A4 Specification (210x297) Chu; LI ---------- · · I ------- Order · -------- Line (please first (See the back; fill in this page for more information)

44S3S 經濟部智慧財產局員工消費合作社印" Α7 ΒΤ 五、發明說明(11〇) • 決策施行器2609,它能夠控制被請求行動的效能; • 諸多資源261 1 (0,...,η),它可能是:可由決策施行器 2609存取的或裝置控制的任何資訊; • 決策伺服器2617,它會決定:行動是否被允許;以及 • 決策資料庫2619,它包含諸多決策,決策伺服器2617 根據該決策來決定:行動是否被允許。 請求實體2603,決策施行器2609,以及決策伺服器26 1 7 能夠各自被定位在任何地方。唯一的要求是:在請求實體 2603與決策施行器2609之間以及在決策施行器2609與決策 伺服器26 17之間都會有訊息傳輸媒體〇>在請求實體26〇3與 決策施行器2609之間的媒體允許請求實體2603 :將一種請 求要對一資源R26 1 1⑴執行一項行動的訊息2605發送到決 策施行器2619 ;並且接收一種來自決策施行器26〇9的行動 回應訊息2607,它指示著:是否要採取行動,以及如果這 樣的結果。在決策施行器2609與決策伺服器2617之間的媒 體允許決策施行器2609 :將一項決策請求2613,發送到決 策伺服器2617,因而請求決策伺服器2617指示:在決策伺 服器資料庫2619中的諸多決策是否允許一既定請求實體採 取相對於一既定資源之-既定行動:並且請求決策词服器 26丨7用一種決策回應2615來對決策請求26门作回應,該回 應指示:諸多決策是否會允許載明於決策請求中的行動。 應孩進-步注意的是:受決策施行器26〇9控制的行動甚至 不需要被電腦系統之-組件所執行。例如,在決策資料庫 中的諸多決策可能被圖書館主顧們加以控制存取書本,而 -113 參纸張尺度財關家標準(CNS)A4 (210 X 29Γ^ϊ" _ n J I I - - —J I I * . - 1 I n - - οι I l— - - - _I n ---t , (請先閉讀背面之江意事項再填寫本!) 4 4838 7 A7 B7 五、發明說明(111) 載明於決策中的行動則可能是具有一種從書架中提取一本 書的圖書館網頁。 決策請求訊息26 1 3以及決策回應訊息26 15的格式都是藉 由一種決策通信協定加以定義的。目前正在被研發的一些 標準決策通信協定之實例是:公用開放決策系統(C〇mm〇n Open Po丨icy System ’簡稱COPS),該系統可上網獲知:就 像1999年6月2 1日所描述的,網址爲:http://wwv/.jf;tf ηΓσ/ internet-drafts/draft-ietf-rap-cops-06.txt ;以及在使用者服 務中的遠程鑑定撥號(Remote Authentication Dial In User Service,簡稱RADIUS ;參考:網際網路標準第RFC:2 138 號)。 決策伺服器26 1 7獲得產生決策回應26 15所需的資訊,然 後提供回應給決策施行器2609。決策伺服器26丨7包括一種 包含諸多決策的決策伺服器資料庫2619,該決策包括:針 對請求貫體2603已經請求決策施行器2609要對一項資源 R26 1 1⑴執行行動的一項或更多決策。決策伺服器26} 7會 查詢決策伺服器資料庫2 61 9,以便指出一些有關決策的位 置’然後再將它們應用到決策請求2613。做這件事情可能 會要求決策伺服器26 1 7要從可由決策伺服器26 17存取的任 何位置中獲得其它與決策有關的資訊2623。這種處理過程 之一實例是:在存取過濾器203之討論中所描述的技術; 藉由該技術’存取過濾器203獲得關於使用者的附加識別 資訊。若決策伺服器2617從決策伺服器資料庫2619以及其 它資源中獲得的資訊指示著行動被允許,則決策词服器 -114- 本紙張尺度適用中固國家標準(CNS)A4規格(210 X 297公釐) (請先閱請背面之注意事項再填寫本頁) --------訂----- 線 經濟部智慧財產局員工消費合作社印*'衣 448387 經濟部智慧財產局員工消費合作社印製44S3S Printed by the Consumer Cooperatives of Intellectual Property Bureau of the Ministry of Economic Affairs Α7 ΒΤ 5. Description of Invention (11〇) • Decision implementer 2609, which can control the effectiveness of the requested action; • Many resources 2611 (0, ..., η ), It may be: any information that can be accessed by the decision implementer 2609 or controlled by the device; • a decision server 2617, which decides: whether the action is allowed; and • a decision database 2619, which contains many decisions, a decision server The device 2617 decides based on this decision: whether the action is allowed. The requesting entity 2603, the decision executor 2609, and the decision server 26 1 7 can each be located anywhere. The only requirement is that there will be a message transmission medium between the requesting entity 2603 and the decision executor 2609, and between the decision executor 2609 and the decision sever 2617.> Between the requesting entity 2603 and the decision executor 2609, The media allows requesting entity 2603 to send a message 2605 requesting an action to be performed on a resource R26 1 1⑴ to decision executor 2619; and to receive an action response message 2607 from decision executor 2609, which indicates : Whether to take action, and if such results. The media between the decision executor 2609 and the decision server 2617 allows the decision executor 2609 to send a decision request 2613 to the decision server 2617, thus requesting the decision server 2617 to instruct: in the decision server database 2619 Whether many of the decisions allow a given requesting entity to take a given action relative to a given resource: and request the decision server 26 丨 7 to respond to the decision request 26 with a decision response 2615, the response indicates: The actions specified in the decision request will be allowed. It should be further noted that actions controlled by the decision implementer 2609 need not even be performed by the components of a computer system. For example, many decisions in the decision database may be controlled by library patrons to access the books, and -113 reference paper standards (CNS) A4 (210 X 29Γ ^ ϊ " _ n JII-- —JII *.-1 I n--οι I l—---_I n --- t, (Please close the Jiang Yi items on the back before filling in this!) 4 4838 7 A7 B7 V. Description of the invention (111 ) The action specified in the decision may be a library web page that extracts a book from the bookshelf. The format of the decision request message 26 1 3 and the decision response message 26 15 are defined by a decision communication protocol. Examples of some standard decision communication protocols that are currently being developed are: Common Open Decision System (COP0) Open Poic System (referred to as COPS), which can be learned on the Internet: as it was on June 21, 1999 Described, the URL is: http: //wwv/.jf; tf ηΓσ / internet-drafts / draft-ietf-rap-cops-06.txt; and Remote Authentication Dial In User Service, referred to as RADIUS; Reference: Internet Standard RFC: No. 2 138 The decision server 26 1 7 obtains the information needed to generate a decision response 26 15 and then provides the response to the decision executor 2609. The decision server 26 丨 7 includes a decision server database 2619 containing many decisions. The decision includes: In response to the request body 2603, the decision executor 2609 has been requested to perform one or more decisions on a resource R26 1 1⑴. The decision server 26} 7 will query the decision server database 2 61 9 to point out some relevant information. Decision locations' before applying them to decision requests 2613. Doing this may require the decision server 26 1 7 to obtain other decision-related information 2623 from any location accessible by the decision server 26 17. An example of such a process is: the technology described in the discussion of the access filter 203; by this technology 'access filter 203 obtains additional identification information about the user. If the decision server 2617 from the decision server Information obtained from the database 2619 and other resources indicates that the action is allowed, the decision server -114- This paper standard applies to the national solid standard Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page) -------- Order ----- Employee Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs印 * '衣 448387 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs

AT B7 五、發明說明(112) 2617會發送一種這樣指示的決策回應2615,而決策施行器 2609會執行如2㈣處所指示的行動4且經由行動回應 2607 ’將結果轉回給請求實體26〇3 ;若決策回應2615指 示:行動未被允許,則決策施行器26〇9會發送一種指示著 行動未被允許的行動回應2607。 將決策施行器2609和決策伺服器261 7分離之—重要優點 是:可能在系統内的很多不同層級處建構決策施行器 2609,其中瞭解到該系統包括一些由網路所連接的諸多裝 I组成的系統《決策伺服器26 17可能包含針對任何決策施 行器的決策;因此,可能受該決策支配的行動不再受限於 在系統之一個或更多層級處所採取的行動。 圖2 7顯示:一種具有諸多组件的系統27〇1,該組件都是 藉由包括一公用網路2702及一内部網路! 03的網路加以連 接的。在最高層級處,系統2701具有:一個或更多決策決 策點(policy decision p〇ints)2723,它會決定決策是否允許 一項行動;以及一個或更多決策施行點2721,其中諸多決 策決策點的決策都會被施行。決策決策點將會包括決策词 服器2617 ;而決策施行點則會包括決策致能裝置,那就 是:一種能夠執行如決策施行器2609般之功能的裝置。在 決策決策點與決策施行點之間的通信是藉由決策訊息 2725 ’該訊息則包括:決策請求26 1 3以及決策回應2615。 ® 只體2 6 0 3清求要使用_資源R 2 6 1 1來執行一喝行動時, 將會由一種受決策施行點2721所控制的裝置來執行該行 動,決策施行點2721將會和決策決策點2723交換決策訊息 -115- 本紙張尺度適用中國國家標準(CNS)A4規格(210x 297公发) 1.ki-------訂---------線 {靖先閱讀背面之注意事項再填寫本頁) 44838 經濟部智慧財產局員工消費合作社印*''机 A7 B7 五、發明說明(113) 2725,以便決定:該行動是否被允許:如果是的話,決策 施行點272 1就會使該行動被執行。 包括在系統2701内的諸多決策致能裝置中有: .決策致能路由器2713,它會施行在實體網路中的路由 指引通信量之層級處的決策; •決策致能附屬裝置2719,它會執行在一裝置之層級處 的決策,該裝置附屬於系統27〇1的網路。—個實例就 是印表機,ΈΓ能夠查閲決策伺服器26丨7,以便決定: 是否要接受一項來自某一實體26〇3的印出請求。 •決策致能應用私式27 Π,它會執行在應用程式之層級 處的決策。 每個決策致能裝置都會用像針對決策.施行器26〇9所描述 那樣的相同方式來處理決策:當決策致能裝置收到它必須 決定菘行動請求是否遵從建立在決策伺服器資料庫26丨9中 的諸多存取決策所針對的—項行動請求27〇3時,它就會將 一種決策訊息2725發送到決策伺服器2617 ;並且當它收到 決策訊息時就會作出回應,允許或拒絕如決策訊息所指示 的行動。 繼續更加詳細地討論關於圖27之諸決策致能裝置運作所 處的層級’決策致能路由器2713可能保持針對它所路由指 引的諸多分包資訊之被允許來源和目標的—此表;當路由 器2713被初始化時,這些表都是根據由決“服㈣_ 提供的資訊加以建立的:從當時起,當路由器2713^__ 種具有來源或目標不在其表中的分包資訊時,它就會將— ____ -116- 本紙張尺度_中_家辟(CNS)A4 11.k--------訂.------—線 {琦先閱讀背面之注意事項再填寫本頁) 44838 7 A7 B7 五、發明說明(114) 種決朿汛息2 72 5發送到指示著來源或目標的決策伺服器 261 7,而決策伺服器2617則會藉由指示著是否打算將來源 或目標包括在一些表中來對該訊息作回應。當然,當決策 伺服器資料庫2 6 1 9改變時,路由器2 71 3的一些表可能也會 由決策词服器26 17發送到路由器2"7 1 3的訊息來保持更新。 就像從前述中能夠看出的那樣,路由器2713會在存取過濾 器203之建構例2001中的IP過濾器2019之層級處執行決策 核對。 決策致能附屬裝置27 19是一種諸如附屬於網路之—印表 機的裝置。該裝置能夠對一項由一實體提出的請求作回 應’以便隨著決策伺服器26 1 7所發送之一決策訊息而使用 它,並且能夠根據它從決策伺服器2617中收到的資訊而繼 續進行。這種決策致能附屬裝置2*719會允許管轄這些裝置 的管轄詳細程度(granularity of control)比在存取過淚器203 之層級處的存取核對可能允許的還更加精細。 最後,決策致能應用程式2717會允許:在一種比存取過 ;慮器2 0 3可能允許的還要高之層級處的決策施行。只要決 策祠服器資料庫2 619包含與正在被應用程式存取的諸多資 源有關的決策資訊,決策致能應用程式2 7 17就能夠和決策 伺服器2617交換決策訊息2725,因而能夠藉以決定·•是否 要允許或拒絕決策致能應用程式27 17之使用者正在請求的 行動。決策致能應用程式27 17之一實例是:一種建構諸如 FTP,HTTP,或SMTP之一網際網路服務的應用程式。這是 由圖2 0中的諸多代理伺服器203 1所處理的層級。因爲服 本紙張&度適用中舀國家標準(CNS)A4規格(210 X 297公釐) (請先閱tf背面之注意事項再填寫本頁)AT B7 V. Invention Description (112) 2617 will send a decision response 2615 instructed in this way, and the decision executor 2609 will perform action 4 as indicated at 2㈣ and will return the result to the requesting entity 26〇3 via the action response 2607. ; If the decision response 2615 indicates that the action is not allowed, the decision executor 2609 sends an action response 2607 indicating that the action is not allowed. Separating the decision implementer 2609 from the decision server 261 7—The important advantage is that it is possible to construct the decision implementer 2609 at many different levels in the system. It is understood that the system includes a number of devices connected by a network. The decision server 26 17 may contain decisions for any decision executor; therefore, actions that may be governed by that decision are no longer limited to actions taken at one or more levels of the system. Figure 2 7 shows: a system 2701 with many components, which all include a public network 2702 and an internal network! 03's network is connected. At the highest level, the system 2701 has: one or more policy decision points 2723 that determine whether a decision allows an action; and one or more decision execution points 2721, many of which are decision points Decisions are made. The decision-making decision point will include a decision server 2617; and the decision-executing point will include a decision-enabling device, that is, a device capable of performing a function like the decision-executor 2609. The communication between the decision-making decision point and the decision-executing point is through a decision message 2725 ′. The message includes: a decision request 26 1 3 and a decision response 2615. ® Only 2 6 0 3 When _resource R 2 6 1 1 is required to perform a drinking operation, the operation will be performed by a device controlled by decision execution point 2721, and decision execution point 2721 will be linked to decision Decision point 2723 exchange decision message-115- This paper size is applicable to China National Standard (CNS) A4 specification (210x 297 issued) 1.ki ------- Order --------- line {Jing (Please read the notes on the back before filling this page) 44838 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs *” Machine A7 B7 V. Description of Invention (113) 2725 in order to decide whether the action is allowed: if yes, make a decision Execution point 2721 will cause the action to be performed. Among the many decision-enabling devices included in the system 2701 are:. Decision-enabling router 2713, which executes decisions at the level of routing guidance traffic in the physical network; • Decision-enabling subsidiary device 2719, which Decisions are performed at the level of a device that is attached to the system's 2701 network. An example is a printer, and ΈΓ can consult the decision server 26 丨 7 to decide whether to accept a print request from an entity 2603. • Decision-enabled application 27 Π, which executes decisions at the application level. Each decision-enabling device processes decisions in the same way as described for the decision-making implementer 2609: when the decision-enabling device receives it it must decide whether the action request complies with the decision server database 26丨 For many access decisions in 9-an action request 2703, it will send a decision message 2725 to the decision server 2617; and when it receives the decision message, it will respond, allow or Reject the action indicated by the decision message. Continue to discuss in more detail the level at which the decision-enabling devices of FIG. 27 operate. The decision-enabling router 2713 may maintain the permissible sources and destinations of the many subcontracting information directed by it—this table; When 2713 was initialized, these tables were created based on the information provided by the decision server: From then on, when router 2713 ^ __ has subcontracting information whose source or destination is not in its table, it will — ____ -116- The size of this paper _ Medium _ Jia Pi (CNS) A4 11.k -------- Order. ---------- line {Qi first read the precautions on the back before filling in this page ) 44838 7 A7 B7 V. Description of the invention (114) The type of decision flood interest 2 72 5 is sent to the decision server 2617 indicating the source or target, and the decision server 2617 will indicate whether the source or target is intended The target is included in some tables to respond to this message. Of course, when the decision server database 2 6 1 9 is changed, some tables of the router 2 71 3 may also be sent by the decision server 26 17 to router 2 " 7 1 3 messages to stay updated. Just like from the previous As can be seen, the router 2713 performs a decision check at the level of the IP filter 2019 in the access filter 203 construction example 2001. The decision-enabling accessory device 27 19 is a printer such as a printer attached to the network The device is capable of responding to a request made by an entity 'to use it with a decision message sent by the decision server 26 1 7 and based on what it receives from the decision server 2617 Information continues. This decision enabling accessory 2 * 719 will allow the granularity of control over these devices to be more fine-grained than access checks at the level of access to teardropper 203 may allow Finally, the decision-enabling application 2717 will allow: execution of a decision at a higher level than may have been accessed; the cache 203 may allow. As long as the decision server database 2 619 contains and is being Decision information related to many resources accessed by the application, the decision enabling application 2 7 17 can exchange decision information 2725 with the decision server 2617, so it can make decisions · • Yes Allow or deny the action being requested by the user of the decision enabling application 27 17. An example of the decision enabling application 27 17 is: an application that constructs an Internet service such as FTP, HTTP, or SMTP. This is the level handled by many proxy servers 2031 in Figure 20. Because the paper & degree applies to the China National Standard (CNS) A4 specification (210 X 297 mm) (please read the back of tf first (Please fill in this page again)

· -- J- 1 - I : I— 一 pi I n u m - u I 經濟部智慧財產局員工消費合作社印製 44838 7 A7 B7 五、發明說明(M5) 務現在可能都是決策致能的,所以代理词服器不再是必要 的;換成是,只能夠將網際網通信協定傳遞到服務存在的 系統上,該服務將會提供由通信協定所請求的存取操作。 如圖2 7中所示,該服務隨後能夠親自和決策词服=2617 叉換決策訊息2725 ’以便決定:被請求存取操作是否應該 被允許。 一 決策致能應用程式2717之另一實例是:一種文件處理程 式。在這種情形下,決策伺服器資料庫26丨9可能包含一些 決策,該決策載明:有權修改諸多文件之集合的諸多使用 者之集合。當使用者使用程式來選擇一份文件以供編輯之 用時,文件處理程式就能夠和決策伺服器2617交換決策訊 息2725 ;且若來自決策伺服器26 1 7的決策回應指示:使用 者可能不會修改文件;則文件處理程式可能對使用者這樣 指示,並且拒絕允許使用者修改文件。 就像從前述中能夠看出的那樣,將決策評估和決策施行 分離以及決策定義的可擴充性質實際上共同允許:程式能 夠對一項資源執行的任何操作成爲決策之主體;於是,使 得存取控制系統就像圖2 7中所顯示的那些系統:不但規 模可伸縮性又容易管理,而且很容易地適應任何現在或未 來的裝置或程式〇 此處應該要指出的是:在存取過濾器203中,將決策評 估和決策施行加以合乎邏輯地分離,縱使兩者都被包含在 相同的裝置中。當依據圖26來審視圖20時,顯而易見的 是:GUI 1915 :啓動,登綠,警戒以及報表模组2027 :資 -118- 本纸張尺度適用中國國家標準(CNS)A4規格(210 =< 297公发) (請先閱讀背面之注意事項再填寫本頁) ---------訂--------〔線 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印^ 44S387 A7 ______ B7 五、發明說明(116) 料庫共于目錄2028 ; ISDB管理程式2027 ; PCS 2025 ;以及 MMF 2301會建構決策例服器2617 ;而其餘的組件則會建 構在IP_II及網際網路通信協定層級處操作的決策施行 器 2609。 決策之通則:圖2 8 在存取過遽器203中,適當存取資訊的管理員;能夠定 義新U W使用者_ ’能夠定義新資源和資訊集,並 且能夠增加服務和伺服器。管理貝並不能夠定義與存取資 訊不同的行動。並I,任何人能夠用來定義新使用者群组 的方法都是固定的’而資源則皆受限於資訊之來源。在較 佳實施例的通用化決策伺服器中,這些限制都已經被解 除。現在’管理員要定義:新行動’用來定義使用者群組 的新方法’以及不是資訊集的資源是有可能的。當然,制 定這些定義的權利本身就是由決策伺服器資料庫2 6丨9中的 決策加以決定的,就像關於存取過濾器2〇3中的管理決策 及決策制定者決策所説明的那樣。在大多數的系統中,定 義’省多貫體類型’資源類型’以及行動類型應該只限於 屬於”安全官員”使用者群组的那些人。 將這些新的可能性圖解説明於針對顯示於圖28中之決策 陳述的通用化決策語法2801中。通用化決策語法28〇1描 述:在可能操縱決策所針對的视窗中,怎樣將決策呈現給 官理員。在圖2 8中,用斜體字表示的項目部是可能被決 策伺服器26 17之官理員所定義的諸多決策陳述的組成部 份,该管理員有權必需存取決策伺服器資料庫2 6丨9。在方 -119- 本纸張尺度適用中國囿家標準(CNS)A4規格(210 * 297公发> -J· ! ^--------- ^--------訂---------線 (請先閱讀背面之注t事項再填寫本頁) 44838 7·-J- 1-I: I— One pi I num-u I Printed by the Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs 44838 7 A7 B7 V. Invention Description (M5) Services may now be enabled by decision-making, so A proxy server is no longer necessary; instead, it can only pass the Internet communication protocol to the system where the service exists, and the service will provide the access operation requested by the communication protocol. As shown in Figure 27, the service is then able to personally and decision server = 2617 switch decision message 2725 'in order to decide whether the requested access operation should be allowed. Another example of a decision enabling application 2717 is: a document processing program. In this case, the decision server database 26, 9 may contain some decisions that specify a collection of users who have the right to modify a collection of files. When the user uses the program to select a document for editing, the document processing program can exchange decision information 2725 with the decision server 2617; and if the decision response instruction from the decision server 26 1 7 indicates that the user may not Modifies the document; the document handler may instruct the user and refuses to allow the user to modify the document. As can be seen from the foregoing, the separation of decision evaluation and decision execution and the extensible nature of decision definition actually collectively allow: any operation that a program can perform on a resource becomes the subject of a decision; thus, making access Control systems are like those shown in Figure 27: they are not only scalable and easy to manage, but also easily adapted to any current or future device or program. It should be pointed out here: in access filters In 203, the decision evaluation and decision execution are logically separated, even if both are contained in the same device. When reviewing view 20 according to FIG. 26, it is obvious that: GUI 1915: start, green log, alert and report module 2027: Zi-118- This paper standard is applicable to the Chinese National Standard (CNS) A4 specification (210 = < 297 public hair) (Please read the notes on the back before filling out this page) --------- Order -------- [Printed by the Ministry of Economic Affairs, Intellectual Property Bureau, Consumer Consumption Cooperatives Printed by the Intellectual Property Bureau's Consumer Cooperatives ^ 44S387 A7 ______ B7 V. Description of the Invention (116) The repository is in the catalogue 2028; ISDB management program 2027; PCS 2025; and MMF 2301 will construct the decision server 2617; A decision executor 2609 that operates at the IP_II and Internet Protocol levels will be constructed. General rules for decision-making: Figure 2 8 In the access controller 203, administrators who properly access information; can define new UW users_ 'can define new resources and information sets, and can add services and servers. Management Shell cannot define actions different from access to information. And I, the methods anyone can use to define new user groups are fixed ’and resources are limited by the source of the information. In the generalized decision server of the preferred embodiment, these restrictions have been removed. It is now possible for the 'administrator to define: a new action' a new way to define user groups' and resources that are not information sets. Of course, the right to make these definitions is itself determined by the decisions in the decision server database 26, 9 and 9, as explained in the management decisions and decision maker decisions in the access filter 203. In most systems, the definition of the “Provincial Multi-Continent Type” and the “Resource Type” and the type of action should be limited to those who belong to the “security officer” user group. These new possibilities are illustrated in a generalized decision syntax 2801 for the decision statement shown in FIG. The generalized decision grammar 281 describes how to present decisions to officials in the window targeted by possible manipulation decisions. In Figure 2-8, the project department shown in italics is a component of many decision statements that may be defined by the officials of the decision server 26-17. The administrator has the right to access the decision server database. 2 6 丨 9. Zaifang-119- This paper size is applicable to China National Standard (CNS) A4 specification (210 * 297) &-J;! ^ --------- ^ -------- Order --------- line (please read the note on the back before filling out this page) 44838 7

經 濟 部 智 慧 財 產 局 員 工 消 費 合 社 印 U A7 Β7 五、發明說明(117) 括弧·中的項目都是使以斜體字表示的項目與定義一項決策 有關係的字紐。譬如説,,Staff of the Intellectual Property Office of the Ministry of Economic Affairs, Consumer Affairs Cooperatives U A7 Β7 V. Description of the Invention (117) The items in parentheses are the words that make the items in italics related to the definition of a decision. For example,

Employees are allowed to Access the HR Web Site (雇員們都被容許存取H R網站資訊) 其中.Emp丨oyees(雇員們)是一使用者群組,Access(存取) 是一項彳亍動,而HR Web Site(HR網站)則是一資訊集;該 決策陳述允許:屬於|,雇員們"使用者群組的任何使用者存 取屬於” H R網站11資訊集的任何資源。 繼續更加詳細地討論關於通用化決策語法28〇〖,£ntity (實體)表示一使用者群组,其成員都是:由使用在存取過 濾器203中的諸多技術中的一種技術;或者由決策伺服器 2617之官理員所定義的一種技術加以定義的。針對實體的 唯一要求是:它必須是可由決策施行器26〇9辨識的。 Action(行動)表示:可能只是像存取過濾器2〇3中之存取操 作那樣的一項仃動而已,或者是由決策词服器%门之1$ 員所定義的-項行動。針對行動的唯—要求是:使決策 器2609能夠對-項資源執行行動。細⑽叫資源)表示— 資訊集。然而’在通用化決策词服器中,一資訊集可能H 如:印表機或樓案伺服器的諸多裝置之—集合。針= 的唯-要求是:使決策施行器26〇9能夠對資源執行:’ Timelntervals (時間問隔)28〇9允許管理 — 使用通用化決策語法2801而正在被載明之= (temP〇ral restriction) β當決策正在被評估用 —艮制 使用者是否有權存取-既定資源時 =一既定 隹右干估時間在時間 -120- 本紙張尺度剌巾_家辟(心⑷ i I ,1 Κ 广衣--------訂---------線 ί請先閱讀背面之it事項再填寫本頁) 7 蛵濟部知 3慧財產局員工消費合作社印製 A7 B7 五、發明說明(118) 間隔内’才會考慮一項具有時問間隔的決策。譬如說: Employees are allowed to Access the HR Web Site from 9:00 am-5:00 pm weekdays (雇員們都被容許存取H R網站資訊 平曰:從上午9時到下午5時) 它會將由雇員們存取H R網站的時間限制為正常營業時 間》在一較佳實施例中,可能將時間間隔定義如下: 每天工作時間之始末的範圍; 工作曰期之始末的範圍; 對於每周之工作曰及休假日的限制:可選擇將每周的 特Λ工作曰’及/或被列示為休假日的日期包括在内 或排除在外; 對於母月之工作周的限制:容許將每周,從參考曰期 起的每隔X周(其中X是從2到1 2的一個數字),或者 在每一適用月份内的周數表加以規範; 每年之適用月份表。 ACti〇nAttribute(S)(行動屬性)2S 11都是可能實行被決策陳 述允許之行動所用方法的一些由管理員定義的定義。再 者’唯一的要求是:決策施行器2609能夠實行如行動屬性 所載明的行動。譬如說:Employees are allowed to Access the HR Web Site (Emp 丨 oyees) are a group of users, Access is an activity, and The HR Web Site is an information set; this decision statement allows: any user belonging to |, the employees " user group to access any resource belonging to the "HR website 11 information set. Continue in more detail Discussion on the generalized decision syntax 28〇, £ ntity (entity) represents a group of users whose members are: one of many technologies used in the access filter 203; or the decision server 2617 It is defined by a technology defined by the official. The only requirement for the entity is that it must be recognizable by the decision implementer 2609. Action indicates that it may only be like access filter 203 The access operation is just a thrill, or it is an action defined by a member of the decision server 1%. The only requirement for action is that the decision maker 2609 can execute the item resource. action (How to call resources) means—information set. However, in a generalized decision server, an information set may be a collection of many devices such as a printer or a building server. The only requirement of a pin = is- : Enabling decision enforcer 2609 to perform on resources: 'Timelntervals 2809 Allow management — using generalized decision syntax 2801 and being specified = (temP〇ral restriction) β When the decision is being made For evaluation-whether the system user has the right to access-a given resource time = a given time estimate right time at time -120-this paper size towel _ 家家 (心 ⑷i I, 1 Κ 衣衣 --- ----- Order --------- line, please read the it item on the back, and then fill out this page) 7 Printed by the Ministry of Economic Affairs and the Intellectual Property Cooperative of the Intellectual Property Bureau, printed by A7 B7 V. Invention Description ( 118) Only within the interval will a decision with a time interval be considered. For example: Employees are allowed to Access the HR Web Site from 9:00 am-5: 00 pm weekdays (Employees are allowed to access the HR website Xinping said: from 9 am to 5 pm) it will limit the time for employees to access the HR website In a preferred embodiment, the normal business hours may define the time interval as follows: the range of the beginning and end of working hours each day; the range of the beginning and end of working dates; restrictions on weekly working days and holidays: optional Include or exclude weekly special work dates and / or dates listed as holidays; restrictions on the work week of the mother month: weekly, every X from the reference date Week (where X is a number from 2 to 12), or a table of weeks in each applicable month; ACtiOnAttribute (S) 2S 11 are some administrator-defined definitions that may implement the methods allowed by the decision statement. Furthermore, the only requirement is that the decision executor 2609 is able to perform the action as stated in the attribute of the action. For example:

Marketing is allowed to print to the Marketing Printer with type=color (行销員被容許使用具有列印類型為彩色的行銷員之印 表機來列印) -121 - 本紙張足度適用令國國家標準(CNS)A4規格(210^ 297公釐) t J - -I H - I - —-II - . i—. — I ―I- I I I . I - I - - I I_ I (請先聞讀背面之注意事項再填寫本頁) 44838 7 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(m) 這員夫策包含行動屬性type = color(列印類刑_ ~ 、 東九許屬於,|行銷員·_( Marketing)使用者群知, 4-r 4ii Et · r.之使用者# 仃Μ員疋印表機的資源來執行彩色列印。 行動屬性的諸多附加實例有: *針對網路通信連接所需的服務類別; •打算使用的路由或媒體類型; *打算適用的結帳費率; *這項交易的最大數量: •完成交易所容許的最大時間。 就像由語法[with I whenK具有丨每逢)所指示的那樣,『 夠將時間間隔和行動屬性,以及和整個決策陳述二起= 用。例如,對服務類別設下時間限制的—項決策看起來像 這樣: (Everyone is allowed to access the World Wide Web with bandwidth=90% when weekends (每個人都被容許每逢周末就存取具有頻寬=90%的全球 資訊網資訊) 這項決策允冷在每個人”之使用者群組中的實體每逢周末 就存取具有頻寬=90%的全球資訊網資訊。當已經將時間 間隔應用到行動屬性時,雖若在應用到行動屬性之時間間 隔内提出執行行動之請求,才會像載明於行動屬性中那樣 地執行載明於決策中的行動。 通用化決策的建構例:圖2 9和3 0 圖2 9顯示決策資料庫290 1。決策資料庫290 1是決策資料 該決 (請先閱讀背面之注意事項再填窵本頁) Η 訂---------線 -122 私紙張尺度適用中國國家標準(CNS)A4規格(2〗〇 x 297公餐) 44838 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(120) 庫3〇1的—種修改;以便適應用語法28〇1所定義的通用化 決策,並且在一種已經將決策評估和決策施行分離的環境 T運作。於是,在圖29中,決策查詢2939是來自決策伺服 器地17而不是存取過濾器2〇3,因而包括:一種打算執行 疋仃動的說明符(specifier),以及一種資訊來源或打算執 行行動所針對的其它資源的規範(specif丨cati〇n)。將決策杳 詢的結果294丨轉回給決策伺服器2617。除了決策是否允許 該行動的一種指示外,該結果現在還包括與行動有關的屬 性數值。在圖2 9中而其功能維持不變的諸多圖3中的單元 都具有Έ:們在圖3中所具備的參考數字。就從存取決策 開始,資訊之第一附加項目是存取類型定義2929,它會定 義··諸多附加行動類別,可能針對它而將決策定義在存取 決策307中。其次,會有屬性資訊2927,它會定義:可能 附屬於涉及實行一項決策的諸多實體之屬性。包括在屬性 資訊2937内的則有下列各種資訊: 屬性指定2S>37,它會載明打算和屬性一起使用的是何 種,使用者群组,資訊集,網站,或服務; 屬性標記294 1,它會定義;在使用者界面中,為人所 熟知的諸多屬性名稱;以及 屬性特點2939,它實際上會定義.:屬性怎樣影響被它 才曰足的諸多使用者群組等等。 時程安排(schedules)資訊2925會定義:可能附屬於決策 或屬性的時間間隔。在時程安排資訊2925内,時程安排規 則293 1貫際上會定義時間間隔;而体假日表2们3則是—種 123 本紙張尺度_中關家標準X 297公g ) t IL .— I—-------- I^-灰.I I ------*151·____I I Ϊ I (請先閱讀背面之冱旮?事項再填寫本頁) 448387 Λ7 ------—--- Β7 五、發明說明(121) 使用在時程安排規則中的休假日表。資源類型5會定 義:可能定義決策所釺對的資源之類型’而使用者㈣ 土 2937貝| s定代.針對可能定義決策所針對的實體所需的 識別方法之類型。 在—較佳實施例中,使用公司之爲人熟知的: Microsoft®存取資料庫軟體來建構資料庫29〇1。存取軟體 是一種關係資料庫(relati〇nal database),那就是:將資料 庫中的資訊儲存在-些表中。在存取軟體中的—種公用程 式(utUity)會提供:一些表的圖像以及它們彼此的關係。 本申π案的圖1 3到1 7以及圖3 〇都是源自那些圖像。在圖 3 0中,出現在圖1 3到1 7中的一些表都具有它們在那些圖 中所具備的參考數字;而一些新的表則具有開頭是"3〇||的 參考數字。在圖3 0中的一些表3〇〇丨顯示:怎樣將用來定 義時間間隔和屬性的一些表加以整合進入決策資料庫29〇1 中。更籠統地説,它們顯示:怎樣藉由增加另外—些單元 而可能修改一項決策,以及怎樣針對決策而可能定義諸多 新單元類型。 時間間隔的詳細建構例 就k時間間隔開始,將這些時間間隔加以定義在時間間 隔表3025中。該表包括:一時程安排定義表3〇23,它會定 我可flti出現在通用化決策語法2801内的Timelnterval⑷ 2809中的名稱;以及一時程安排規則表3〇25,它會定義可 能與定義在”時程安排定義•,表3023中的名稱有關聯的時程 安排規則。一個以上的時程安排規則可能與一既定名稱有 -124- 本纸張尺度適用中國囡家標準(CNS)A4規格(2】〇χ 297公釐) (请先閱讀背面之注意事項再填寫本頁) ^--------訂---------線 .經濟部智慧財產局員工消費合作社印製 4483 8 7Marketing is allowed to print to the Marketing Printer with type = color (Marketers are allowed to print using a printer with a marketing type of color) -121-This paper is fully compliant with national standards (CNS) ) A4 size (210 ^ 297 mm) t J--IH-I-—-II-. I—. — I ―I- III. I-I--I I_ I (Please read the precautions on the back first (Fill in this page again) 44838 7 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. 5. Description of the invention (m) This policy includes the action attribute type = color (printing punishment _ ~, Dong Jiu Xu belongs to, | The marketing user group knows that the user # 4-M 4ii Et · r. # 仃 员 疋 printer resources to perform color printing. Many additional examples of mobile attributes are: * For web The type of service required for the communication connection; • The type of routing or media that you plan to use; * The billing rate that you plan to apply; * The maximum number of transactions: • The maximum time allowed to complete an exchange. Like by the syntax [with I whenK has 丨 every time) as indicated, "Enough to make the time interval and line Property, as well as the entire decision and statement from the two = use. For example, a decision that sets a time limit on the service category looks like this: (Everyone is allowed to access the World Wide Web with bandwidth = 90% when weekends (Everyone is allowed to access bandwidth with access every weekend) = 90% of World Wide Web information) This decision allows entities in the “user group” to access the World Wide Web information with bandwidth = 90% every weekend. When the time interval has been applied When it comes to action attributes, if a request to perform an action is made within the time interval applied to the action attributes, the actions specified in the decision will be executed as described in the action attributes. Example of the construction of a generalized decision: Figure 2 9 and 3 0 Figure 2 9 shows the decision database 290 1. The decision database 290 1 is the decision information. (Please read the notes on the back before filling this page) Η Order --------- Line-122 private paper scale applies Chinese National Standard (CNS) A4 specification (2〗 〇x 297 public meals) 44838 Printed by A7 B7, Consumer Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of invention (120) Library 3〇1- A variety of modifications; The generalized decision as defined in Law 2801 and operates in an environment T where decision evaluation and decision execution have been separated. Therefore, in FIG. 29, the decision query 2939 comes from the decision server 17 instead of the access filter 20, and thus includes: a specifier that intends to perform actions, and a specification of a source of information or other resource for which the action is intended to be performed. The result of the decision inquiry 294丨 Switched back to the decision server 2617. In addition to an indication of whether the action is allowed, the result now also includes the value of the attribute associated with the action. Many of the units in Figure 3 are shown in Figures 2 and 9 and their functions remain unchanged. They all have: the reference numbers we have in Figure 3. Starting from the access decision, the first additional item of information is the access type definition 2929, which will define many additional action categories, which may be targeted for it. Decisions are defined in access decisions 307. Second, there is attribute information 2927, which defines: attributes that may be attached to many entities involved in implementing a decision. Included in attributes News 2937 contains the following kinds of information: Attribute designation 2S > 37, which will indicate what is intended to be used with the attribute, user group, information set, website, or service; attribute tag 294 1, it will Definitions; in the user interface, many well-known attribute names; and attribute characteristics 2939, which will actually define: how attributes affect many user groups that are only adequate for it, etc. schedules) Information 2925 defines: time intervals that may be attached to decisions or attributes. In the schedule information 2925, the schedule rule 293 1 will always define the time interval; and the physical holiday table 2 and 3 are-a kind of 123 paper standards _ Zhongguanjia standard X 297 g) t IL. — I —-------- I ^ -ash. II ------ * 151 · ____ I I Ϊ I (Please read the 冱 旮 on the back? Matters before filling out this page) 448387 Λ7 --- -------- Β7 V. Description of the invention (121) Use the holiday schedule in the schedule rules. Resource type 5 will define: it is possible to define the type of resources for which the decision is made, and the user is not satisfied with the type of identification method. In the preferred embodiment, the company's well-known: Microsoft® Access Database Software is used to construct the database 2901. Access software is a relational database, that is, the information in the database is stored in some tables. A utUity in access software provides: images of some tables and their relationship to each other. Figures 13 to 17 and Figure 3 of the present π case are derived from those images. In Figure 30, some of the tables appearing in Figures 13 to 17 have the reference numbers they have in those figures; some new tables have reference numbers that begin with " 3〇 ||. Some tables 300 in Figure 30 show how some tables used to define time intervals and attributes can be integrated into the decision database 2901. More generally, they show how a decision can be modified by adding additional units, and how many new unit types can be defined for the decision. A detailed construction example of the time interval starts with the k time interval, and these time intervals are defined in the time interval table 3025. The table includes: a schedule definition table 3023, which determines the name of the timetable that can be flti appear in Timelnterval 2809 in the generalized decision syntax 2801; and a schedule rule table 3025, which defines possible and definitions In “Schedule Definition •”, the names in Table 3023 have schedule rules associated with them. More than one schedule rule may have a given name -124- This paper is a Chinese standard (CNS) A4 Specifications (2) 0 × 297 mm) (Please read the notes on the back before filling out this page) ^ -------- Order --------- line. Staff of Intellectual Property Bureau, Ministry of Economic Affairs Printed by Consumer Cooperatives 4483 8 7

AT B7 經濟部智慧財產局員工消貲合作社印製 五、發明說明(122 關聨。ScheduleDefm(時間安排定義〗D )使定義在表3〇25中 的每g時程安排規則都與使用表3〇23中之規則的時間排程 有關係,k Day Mask(工作日掩蔽)到Encj 〇ate(結束日期) 勺諸夕棚會足義時間安排規則。,,Descript丨⑽”(描述)糊 位則載示規則及其目的之描述。 如以下所提及的,可能針對整個決策以及針對決策中的 屬性而定義時間間隔。於是,定義在"存取決策"表Μ Η中 的每项決策現在都包括一個Schedu丨eDefID襴位。每個這樣 的欄位、都會包含:針對打算應用到決策之一時間間隔而在 表3〇23中之一定義的—個Schedu〖eDefiD識別符。於是’當 決策词服器2617正在決定一項決策是否可適用於一項行動 请求時,經由:在針對決策之表丨6 n内的登載項中,針對 時間間隔的ScheduleDefID欄位;它就能夠指出應用到—项 決策之時間間隔的位置。同樣地,"屬性指定"表3〇〇7,它 會使屬性與:使用者群組,資源集,網站,或服務有關 係,遠表包括:針對可適用於該特定屬性指定的任何時間 間隔的一個ScheduleDefID欄位。最後,用來定義時間間隔 的機制也被使用在用來時程安排警戒資訊之—較佳實袍例 中:於是,在表3023中的諸多登載項也都可以從 ,AlertSchedules"(警戒資訊時程安排)表3〇2 1中指出位置。 .屬性的詳細建構例 將用來定義諸多屬性並使它們與可能被應用的:使用者 群组,資源群组,網站,以及服務有關係的一些表顯示; 圖3 0中的屬性表3003中。一既定屬性是由三種表:”屬性 -125- 本纸張尺度適用中國國家標準(CNS)A4規格(210 X 297公髮 1--' I.---------裝.-------訂---------结 (請先閱讀背面之;i意事項再填寫本頁} 44838 經濟部智慧財產局員工消費合作社印*'^ A7 B7 -----^ 五、發明說明(123) 標記”表3005 屬性"表3011,以及11屬性特定,,表3009中的 登載項所定義的。"屬性標記"表3005會定義:用於針對在 決策定義語法2801内的ActionAttribute(s)中之諸屬性的標 1己。每個這樣的標1己都會有一個登載項,該登載項包括: 才尹6己本身’屬性之托;述’標§己之優先次序(precedence),以 及屬性之類型。標記之優先次序會定義:當一個以上的屬 性與決策評估連接時,將會應用哪些屬性。當一項指定具 有一種比另一項指定還高的優先次序時,就會將具有較低 優先次序的那一項指定不予理會。每個屬性標記登載項都 是由一個"AttributeLabellD"(屬性標記ID)加以識別的。 在"屬性"表3 0 11中的每個登載都會載示屬性之目前定 義。該定義可能具有用來識別”屬性標記,,表3〇〇5中之諸登 載項的一個或更多•'屬性標記ID "攔位。由屬性標記”表 3 0〇5中的那個登載項所定義的標記表示由,,屬性,,表3〇丨〖中 的登載項所定義的屬性。屬性的目前意義是由表3〇π中的 一些攔位加以定義的。包括有:屬性之描述,其類型,它 應用到的伺服器之I D ’以及關於伺服器的裝置類型。三 個欄位:"AttributeFeaturelD"(屬性特點 ID) , "valuel"(數 値1 ) ’以及’’Value2”(數値2 )都是特別感興趣的攔位。在那 裏,必須至少有一個"AttributeFeaturelD"欄位。該攔位會 識別"屬性特點"表3009中之一登載項,該表則會定義使; 在屬性中的諸多數値之種類和範圍。,,Vaiue^o,, VaIue2” 會定義:單一數値(Valuel)之目前範圍,或者兩種數値 (Valuel和Value2兩者)之目前範圍;該數値係選擇自針對"屬 -126- 本紙張尺度適用中國國家標準(CNS>A4規格(210 * 297公爱) 1 Ί I.---------'裝--------訂---------姨 (請先閲讀背面之;1帝?事項再填寫本頁) 4838 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(124) 性特點"表3009中之屬性而定義的諸多數値之種類和範 圍。 就像從前述中將會顯而易見的那樣,"屬性特點"表300ί 能夠被用來定義諸多新屬性種類。在表3〇〇9中的每個登載 項都會包括用來指出登載項之位置的,,屬性特點丨d ,,識別 付及一些搁位如下: •類別7屬性所屬的類.別之名稱(譬如說:服務品質, 結帳費率,或交易之最大數量): •特點I D :唯一定義在其類別内之特點的數字; .名稱:使用者藉由它來瞭解特點的名稱: • 描述:特點的一種描述; .數値類型:定義屬性的諸多數値之類型的—種定義 (譬如説:需要單一數値還是一對數値,以及資料類 型資訊); .特點優先次序:次序的一種指示,依照該次序將諸多 特點應用在評估屬性中; •數値優先次序:打算選擇範圍中的最高數 數値的一種指示;以及 .限制··對於數値之限制的—種指示。 要定義新屬性類別,被決策伺服器2617之決策 :的管理員只是定義針對”屬性特點"表3_中之二二 特4,然後再開始定義使用那些特點的屬#。 能是:對將要施行決策的決策施行器26〇9而言是很:’音: 的任何事物。此處應該要注意的是:可能將用來定= 127- 本紙張尺度Ϊ用中國國家標準(CNS)A4規公f f- -----------Μ--------IT---------線 (請先閲讀背面之法意事項再填寫本頁) 4 483Γ A7 B7 經 濟 部 智 .¾ 財 產 局 Μ 工 消 費 合 ii 社 印 製 五、發明說明(125) 新屬丨生&類的—些上述通用技術使用在決策資料庫2901中 的Λ·!處α便足義諸多:新行動,用來識別使用者的新方 法,以及新資源類型。 了屬性已經藉由三種表:3〇〇5,301 1及3009中的資訊 加=疋義’它就會與一個屬性可能應用到的實體有關係。將 此實體稱為:屬性之主體。·,屬性指定"(At—ment) 表j〇〇7會載明這些關係。在表“ο?中的每個登載項都會使 載月在ί:的AttributeLabellD”(屬性標記I d )中的屬性與單 :王體有關係;料,它可能使屬性與—使用者群组有關 係,而該使用者群組的成員則可能執行—項涉及主體的行 動。右登載項未載明一使用者群組,則屬性應用到主體之 任何用途,在其它情況,只有當被載明使用者群组使用主 禮時屬〖生才會應用,主體可能是:使用者群組,資源集, 網站,或服務;就像藉由諸多欄位B "使用者群组1D",,,資 源群组I D ”網站丨D .,,以及"伺服器丨D "的數值加以載 明的那樣。在表3〇07中的另外一些欄位會指示:屬性是否 為現用的(即:打算目前應用的),應用程式應該何時開 始,它何時滿期’以及屬性是否涉及時間間隔,針對時間 間隔的ScheduleDefID”數值。"優先次序”欄位則指示:在 指定給一既定實體的諸多屬性中,屬性將會具有的優先次 序。 在決定將哪些屬性應用在制定一項決策方面中,失策飼 服器26Π繼續進行如下:當完成決策評估時,針對指向與 決東汗估有關的使用者群组,資源群組,網站,或服 -128 本紙張尺度翻中國國家標準(CNS)A4規格(210x 297公爱 _ ^-------------------媒 (請先閲讀背面之注意事項再填寫本頁) 44838 7 ΑΓ B7 經濟部智竑財產局員工消費合作社印製 五、發明說明(126 ) 務"中任何—個的諸多通信鏈路,加以搜尋在 屬性W資m。若執行行動之實體屬於屬性應用所針對的 」吏用者群組,則順著來自表3007中之屬性指定的諸々: h鏈路走,就會來到表则5中的屬性標記,依序 : 3011中的屬性’最後來到表则9t的屬性特點。這 接表中的每一種轰1 ~匕4 徑衣(除了表3011外)都會包含優先次序^ 訊’使用琢資訊來決定:針對那些順著所有通信鍵路而 發現的屬性,在表3011中有哪些屬性實際上將會庳 策評估。 j决 一針對每個類別的屬性而各別地考慮這些優先次序,就像 藉由表3〇09中的屬性特點加以定義的那樣。在每個類別 内,首先考慮:在表3007中的屬性指定中的優先次序。雖 然共享相同優先次序的所有指定都會被考慮,但是只有那 些具有最咼優先次序數値的指定才會進一步被考慮。其 次,考慮:針對其餘的已鏈接屬性,在表3 〇〇5中的屬性標 記中的標記優先次序。雖然共享相同標記優先次序的所有 標記都會被考慮,但是只有那些具有最高優先次序數値的 標記才會進一步被考慮D其次,考慮:針對其餘的已鏈接 屬性,在•,屬性特點”表3009中的登載項中的特點優先次 序。只有那些共享最高特點優先次序的屬性才會被保留。 最後,對於在表301 1中的每個屬性而言,該屬性被鏈接到 "屬性特點”表3009中的相同登載項:在,,屬性特點”表3009 中的數値優先次序,藉著指示打算選擇的是最高數値還是 最低數値而被用來決定:要使用來自表3011中的哪個屬 129- 本紙張尺度適用中0國家標準(CNS)A4規格(210 x 297公发) ^訂---------線 ί請先閱磧背面之注音?事項再壤寫本頁} 448387 A7 B7 五、發明說明(127 這時候’對於在表30λ 言,定義在表30U中最?中的諸多有關屬性特點登栽,而 登載項中的㈣和會保持原狀,而在這些 ...^ ^都和會被轉回,以便用於評估決 朿。在某些情形下,社本 τ 1石决 叫木可旎指示需要何種屬性數値. 且,若Έ:們與載明在唼笛 豆,並 可能被拒絕:在其它掊形丁 々 則“求 开/下,將諸多屬性數値提供給決g 施行2609,以便用於執行行動。 。决朿 使屬性表3003和時間間隔表3025最佳化 就像在上述存取過遽器2Q3的討論中所描逑的以及在圖 21 中所圖解說明的那樣,在-較佳實施例中的決策 词服器2617,藉菩你甘士* …孝仗其中產生諸多MMF檔案2303而使決策 貧料庫2901最佳化。在較佳實施例中,已經增加兩個新 麵檔案,以使表扇3和3()25中的資訊最佳化。兩 MMF檔案如下: • DBPn>perties(資料庫”特性")擋案:包含能夠應用到其 ^件的所有,,特性、屬性及時程安排。此索引(index) 疋藉由在那些其它物件中的”特性I D ”加以编製索引 的。 • DBPropertiesMetaData(資料庫,,特性元資料“)檔案所 有特性都有一個名稱。此檔案是藉由特性類型名稱加 以编製索引的(對於包含在DBpr〇perties檔案中的每個 1争性名稱而言,在索引中具有一個登載項);並且將 一些名稱映射到諸多特性I D之一列表,以使它們在 -130- 本纸張尺度適用t國0家標準(CNS)A4規格(210 X 297公发) (請先閱續背面之注意事項再填寫本頁) ^---------訂---------線 經濟部智慧財產局員工消費合作社印製 448387 經濟部智慧財產局員工消費合作社印*·1^ A7 B7 五、發明說明(128) DBProperties樓案中很快地被查出2 針對時間間隔的使用者界面:圖3 1到3 3AT B7 Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs, Consumer Cooperative, Co., Ltd. 5. Inventory Note (122). ScheduleDefm (Schedule Definition D) enables every g schedule rule defined in Table 3025 to be used in Table 3 The time schedule of the rules in 〇23 has a relationship, k Day Mask to Encj 〇ate (end date) The rules of the time schedule of Zhu Xi Peng will be sufficient. ,, Descript 丨 ⑽ "(Description) It contains a description of the rules and their purpose. As mentioned below, time intervals may be defined for the entire decision and for the attributes in the decision. Therefore, each item defined in the " access decision " table M Η Decisions now include a Schedule eDefID bit. Each such field will contain: a Schedule [eDefiD identifier] defined in one of Table 3203 for a time interval intended to be applied to the decision. 'When the decision server 2617 is deciding whether a decision is applicable to an action request, via: ScheduleDefID field for the time interval in the entries in the table for decision 丨 6 n; it can Enough to indicate the position of the time interval applied to a decision. Similarly, the "attribute specification" table 3007 will make the attribute related to: user groups, resource sets, websites, or services, far away The table includes: a ScheduleDefID field applicable to any time interval specified by that particular attribute. Finally, the mechanism used to define the time interval is also used in scheduling alert information—preferred examples: As a result, many of the entries in Table 3023 can also indicate locations from AlertSchedules " (Warning Information Schedule) Table 3201. The detailed construction examples of attributes will be used to define many attributes and make them possible Applied: user groups, resource groups, websites, and services are shown in some tables; the attribute table 3003 in Figure 30. A given attribute is composed of three tables: "Attribute-125- This paper Standards are applicable to China National Standard (CNS) A4 specifications (210 X 297 issued 1-- 'I .--------- installed. Closing (please read the back; please fill in this page) 44838 Member of Intellectual Property Bureau, Ministry of Economic Affairs Industrial and consumer cooperative seal * '^ A7 B7 ----- ^ V. Description of the invention (123) Mark "Table 3005 attributes" Table 3011, and 11 attribute specific, as defined in the entry in Table 3009. " The attribute tag " table 3005 will define a tag for attributes in ActionAttribute (s) within the decision definition syntax 2801. For each of these targets, there will be a posting item, which includes: Cai Yin 6's own attribute's enumeration; the 'precedence' of the token, and the type of attribute. The precedence of the tags defines which attributes will be applied when more than one attribute is connected to the decision evaluation. When a designation has a higher priority than another designation, the designation with a lower priority is ignored. Each attribute tag entry is identified by an " AttributeLabellD " (attribute tag ID). Each posting in " attribute " table 3 0 11 will show the current definition of the attribute. The definition may have one or more of the "attribute tags," which are listed in Table 3005. "Attribute tag ID " Stop. By the attribute tag" table 3005 The tags defined by the items represent the attributes defined by the items listed in Table 3, Properties. The current meaning of attributes is defined by some of the stops in Table 30. It includes: description of the attribute, its type, the ID of the server to which it is applied, and the device type of the server. The three fields: " AttributeFeaturelD " (attribute feature ID), " valuel " (number 1) and `` Value2 "(number 2) are all particularly interesting stops. There must be at least A "AttributeFeaturelD" field. This block will identify one of the entries in the "Attribute Feature" table 3009, which will define the types and ranges of the many numbers in the attribute., Vaiue ^ o ,, VaIue2 ”will define: the current range of a single number (Valuel), or the current range of two numbers (both Valuel and Value2); this number is selected from the target " is-126- this paper size Applicable to Chinese National Standards (CNS > A4 specifications (210 * 297 public love) 1 Ί I .--------- 'Installation -------- Order --------- Aunt (Please read the "1 Emperor? Matters on the back before filling out this page") 4838 Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the Invention (124) Many characteristics defined by the attributes in Table 3009 The type and range of 値. As will be apparent from the foregoing, the " attribute feature " table 300ί can be used To define many new attribute types. Each entry in Table 3009 will include the attributes that indicate the location of the entry, attributes, d, identification, and some shelving as follows: • Category 7 attribute belongs Other names (such as: service quality, checkout rate, or maximum number of transactions): • Feature ID: A number that uniquely defines a feature within its category;. Name: Users use it to understand The name of the feature: • Description: A description of the feature;. Data type: A definition that defines the type of many data of the attribute (for example: whether a single data or a pair of data is needed, and data type information);. Features Priority: An indication of the order in which many characteristics are applied to the evaluation attributes; • Number of priorities: an indication of the highest number in the range that is intended to be selected; and. Limitations on the limits of numbers —A kind of instruction. To define a new attribute category, the decision of the decision server 2617: the administrator just defines the "attribute characteristics" table 3_bis 2 special 4 and then starts to determine I use those characteristics of the genus #. It can be: for the decision executor 2609 that will execute decisions: 'yin: anything. It should be noted here: may be used to determine = 127- This paper uses the Chinese National Standard (CNS) A4 standard f f ------------ M -------- IT --------- line (please first Read the legal and legal matters on the back and fill in this page) 4 483Γ A7 B7 Ministry of Economic Affairs. ¾ Printed by the Ministry of Property, Industrial and Commercial Co., Ltd. V. Description of the invention (125) New genus 丨 Health & The Δ ·! Α used in the decision database 2901 is of much significance: new actions, new methods to identify users, and new resource types. There are three types of attributes already in use: the information in 3005, 3011, and 3009 plus = meaning, and it will be related to the entity to which an attribute may be applied. This entity is called: the subject of the attribute. · The attribute designation (At-ment) table j07 will specify these relationships. Each entry in the table "ο? Will make the attribute of the month contained in ί: AttributeLabellD" (attribute mark I d) related to the single: the royal body; it is expected that it may make the attribute and the-user group There is a relationship, and members of the user group may perform an action involving the subject. The right entry does not specify a user group, the attribute is applied to any use of the subject. In other cases, it is only applied when the user group is stated to use the main gift. The subject may be: use User group, resource set, website, or service; like with many fields B " user group 1D " ,,, resource group ID "site 丨 D.", and " server 丨 D " The value is stated as such. In the other fields in Table 307, it is indicated whether the attribute is active (that is, intended to be currently applied), when the application should start, when it expires, and the attribute. Whether the time interval is involved. ScheduleDefID value for the time interval. The "Priority" column indicates the priority that attributes will have among the many attributes assigned to a given entity. In deciding which attributes to use in making a decision, the misguided feeder 26II continues As follows: When the decision evaluation is completed, it is directed to the user group, resource group, website, or server that is related to the decision Donghan Khan estimate -128 paper size translation Chinese National Standard (CNS) A4 specification (210x 297 public love_ ^ ------------------- Media (Please read the notes on the back before filling out this page) 44838 7 ΑΓ B7 Printed by the Consumer Cooperative of the Intellectual Property Office of the Ministry of Economic Affairs The invention describes (126) any one of the many communication links in the search, and searches for the attribute in the attribute W. If the entity performing the action belongs to the "user group" targeted by the attribute application, it will follow from the table Attributes specified in 3007: When the link is gone, the attribute tags in Table 5 will be reached, in order: the attribute in 3011 'will finally come to the attribute characteristics of Table 9t. This follows each of the tables. Boom 1 ~ Dagger 4 (except Table 3011) will include priority The information is used to determine which attributes in Table 3011 will actually be evaluated for those attributes found along all communication keys. J Decide on each category of attribute separately Consider these priorities in the same way as defined by the attribute characteristics in Table 3009. Within each category, consider first: the priorities in the attribute assignments in Table 3007. Although those that share the same priority order All assignments are considered, but only those assignments with the highest priority number are considered further. Second, consider: For the remaining linked attributes, the tag precedence in the attribute tag in Table 3 2005 .Although all tags that share the same tag priority will be considered, only those tags with the highest number of priorities will be considered further. Second, consider: For the remaining linked attributes, in the ", attribute characteristics" table 3009 Feature priority in the postings in. Only those attributes that share the highest feature priority will be retained. Finally, For each attribute in Table 3011, the attribute is linked to the same entry in the "Attribute Characteristics" table 3009: the priority of the numbers in the "Attribute Characteristics" table 3009, by indicating the intended The choice of the highest or lowest number is used to decide: which genus from Table 3011 is used 129- This paper size applies to the 0 National Standard (CNS) A4 specification (210 x 297 issued) ^ Order- -------- Please read the phonetic on the back of the book? Matters and write this page again} 448387 A7 B7 V. Description of the invention (127 At this time, 'for the words in Table 30λ, what is the most defined in Table 30U? Many of the relevant attribute characteristics are posted, and the Hehe in the entry will remain as it is, and in these ... ^^ Duhe will be switched back for use in evaluating the decision. In some cases, the Sheben τ 1 stone must be called Mu Kezhen to indicate what kind of attribute number is required. And, if: 们: they and Zai Xian in the flute beans, and may be rejected: in other 掊 形 丁 々 " Seek open / close, and provide a number of attribute numbers to the implementation 2609 for execution of the action. The optimization of the attribute table 3003 and the time interval table 3025 is as discussed in the accessor 2Q3 described above. As depicted in Figure 21 and illustrated in Figure 21, the decision server 2617 in the-preferred embodiment borrows from you Ganshi * ... to make a lot of MMF files 2303 and make decisions poor The library 2901 is optimized. In the preferred embodiment, two new profile files have been added to optimize the information in watch fans 3 and 3 () 25. The two MMF files are as follows: • DBPn> perties (database "Features" file: Contains all the features, attributes, and schedules that can be applied to its files. This index is indexed by "characteristic ID" in those other objects. • DBPropertiesMetaData (database, property metadata) All properties have a name. This file is indexed by the property type name (for each of the competitive names contained in the DBproperper file) (There is one entry in the index); and some names are mapped to a list of many feature IDs so that they are within -130- this paper standard is applicable to the National Standards (CNS) A4 (210 X 297) (Issued) (please read the precautions on the back of the page before filling out this page) ^ --------- Order --------- Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 448387 Economy Printed by the Intellectual Property Bureau of the Ministry of Intellectual Property and Consumer Cooperatives * · 1 ^ A7 B7 V. Description of the invention (128) The case of the DBProperties building was quickly detected 2 User interface for time intervals: Figure 3

圖3 1到3 3顯示:使用在一較佳實施例中,A T在圖形使用 者界面中所使用的視窗;用來:察看何,時間間隔(气時 程安排)已經被定義,定義針對一時間間隔的—項切—_ 只現則, 以及使用一時間間隔與一項決策有關聯。就闽 ' 坑坆圖3 1開 始,該圖顯示:一種用來顯示已定義時程安排的見^ 3 102。子視窗(subwindow)3 103會依照名稱列示阱古 "丨匁的已定 義時程安排;而子視窗3 106則會依照名稱列示所有的已定 義规則。被顯示資訊是來自·· ”時程安排定義"表3〇?3和” 時程安排規則”表3025。 要察看一時程安排名稱表示何種規則,使用者會選擇在 子視窗3 1 03中的名稱,如3 1 05處所顯示的,在該處,已 選擇"非工作時間"。此時程安排具有兩個组成規則:_個 表示每周之工作曰,顯示在3107處:一個表示周六,周 曰’及休假曰’顯示在3 109處。當選擇時程安排名稱時, 屬於它的(諸多)規則都會被凸顯在視窗3 1 06中。相反地, 當選擇規則時,針對使用該規則的諸多時程安排的時程安 排名稱都會被凸顯出來。在子視窗3 1 06中的3 1 1 1處顯示: 針對營業時間的規則:而在子視窗3 103中則顯示:另外一 些時程安排名稱。 要產生一項新時程安排,當子視窗3 1 03處在現用狀態時 就點按"新增"桉鈕,並輸入新時程安排名稱:然後再選擇 新時程安排,並將屬於它的一些规則凸顯在子視窗3 102 -131 - 本紙張尺度適用中固國家標準(CNS)A4規格(210 X 297公釐) ------------^*-------訂-----------線 (請先閱讀背面之注意事項再填寫本頁) 448387 A7 五、發明說明(129 ) 中。要改變指定給一時程安排的一些規則,先選擇時程安 排名稱,然後在子視窗3丨〇6中選擇針對該名稱的不同規 則。要產生針對一現存時程安排的一項新規則,先選擇時 程安排之名稱並點按,’新增”按鈕,在當時就可能產生新規 則,如以下描述的。當處於子視窗3 1〇6中時,也能夠點按 "新增’’按鈕,產生新規則,然後再使新規則與一時程安排 名%有關係,如以上描述的。藉著將規則拖曳(draggiM) 到時程安排名稱,並且將它棄置在時程安排名稱上,也^ 夠使一項規則與一時程安排名稱有關係^ 知用來產生一項新規則的視窗顯示在圖3 2中的32〇 1處。 化疋用來修改一現存規則或產生一項新規則的視窗。要修 改現存規則,就對它點按二次。在视窗中的輸入資訊會 允許使用者:依據時程安排之時間的有效性來定義正在被 應用到決策或屬性的時間間隔(32〇3),定義被選擇時間都 有效的每周之工作曰(32〇5),定義時程安排有效的工作周 (3207),以及定義時程安排有效的每年的一部份(32〇9)。 如圖示,視窗3 2 0丨將顯示於圖3 1中的時程安排定義在3 π 1 處。該時程安排是由"營業時間"所表示。顯示於視窗32〇 i 中的資訊是來自"時程安排規則,,表3〇25,而使用視窗32〇1 所做出的諸多修改則被應用到該表β 圖3 3顯示:用來將時間間隔增加到一項決策之定義的視 a »視窗3301將由屬於_,社囷”(c〇rp〇rate)使用者群组諸多 使用者存取”社團"資訊集限定爲:在33〇3處所指示的,,營 業時間”之時程安排。當使用者點按方框33〇3時,就會顯 132 •紙張尺度適用中固因家標準(CNS)A4規格(21〇χ297公爱〉 f锖先閱1#背面之注意事項再填窵本頁) X- --------線 經濟部智¾財產局員工消費合作社印製 4483 8 經濟部智慧財產局員工消費合作社印製 A7 B7 五 '發明說明(13〇) 示諸多已定義時程安排的整個列表’因而使用者可能選擇 其中一個或增加一項新名稱。當使用者點按,,定義"按紐 3305時,就會顯示針對被選擇決策的視窗32〇丨。若~正在增 加-項新名肖,則必要時使用者會針對新時程安排而填^ 視窗3 2 01 ^依據圖3 〇 ,選擇在圖3 3中之—時程安排會使,、存 取決策表161 1中之一"ScheduleDefID"欄位被填寫:針對,,時 程安排定義表3023中之登載項的識別符;而表3〇23則將 時程安排名稱包含在它的"名稱"攔位中。若時程安排名稱 是新的,則針對新名稱而將一新登載項增加到表3〇23。若 增加或修改一項規則,則”時程安排規則,,表3〇25也會被修 改。 針對屬性的使用者界面:圖3 4到3 7 針對屬性定義和指定的使用者界面是相似的。圖34顯示: —種列示服務品質(quality of service,簡稱Q〇s)類型的諸 多目别已定義屬性的視窗3 4 01。這些屬性決定:有多少頻 寬(bandwidth)可供一種根據既定決策而正在執行的存取操 作利用°在3401處’列示有一些屬性標記或名稱。此處,定 義四種QoS屬性:三種表示頻寬數量("高”,"中",,,低"),一 種(”最高優先級")表示若有衝突時的優先級(Priority)。所 有的這些屬性都有一種。的優先次序,如在3405處所顯示 的。諸多頻寬屬性全部都由”頻寬"特點加以定義,如在 3407處所顯示的。針對每個屬性的"數値"則被定義在3409 處。只有"最高優先級”才會有"數値2 ”。就像載明於視窗 3401中的那樣,QoS頻寬屬性中的:11高"會接收512000的 -133- 本紙張尺度適用中國國家標準(CNS)A4規格(210 « 297公釐) i— J I.----— — 111 ---I----訂 * ---11*'^ (請先Μ讀背面之d意事項再填寫本頁) 448387 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(131) 最大頻寬’"中·'會接收64000的最大頻寬,而"低”則合接 收3 2000的最大頻寬。關於”最高優先級",針對屬性所載 明的優先級必須位在針對"數値1 "和”數値2,,所栽明的兩 個數値之間。在視窗3401中的資訊當然是來自三種表: 3005,3011,以及 3009。 圖3 5顯示:用來將一種Q〇S屬性指定給使用者群组,資 訊集’網站,或服務的視窗350 1。在予視窗3503中,顯 示:對於所有使用者群組(3507)而言,已經怎樣將,•中", "高”,以及低"三種QoS頻寬屬性(35〇9)分別指定給全球 資訊網服務’檔案傳送服務,以及遠距存取服務三種主體 (35 1 1 ),以及已經怎樣將”高"q〇s優先級屬性指定給"財務" (Finance).使用者群組主體。諸多不同的指定會反映以下事 實:頻寬是一種通信服務的屬性,而優先級則是通信服務 之一使用者的屬性。於是,在可供網路服務利用的頻寬 内’,,財務"使用者群组的諸多成員都具有高優先級。就像 由本實例所顯示的那樣,一個以上的行動屬性可能應用到 一項決策。若能夠藉著從兩個子視窗3 5 13和3 5 1 5中分別選 擇些使用者群組和主題來產生針對主題的屬性,則會促 進屬性指定。在此視窗中所做的選擇當然都會被應用到Μ屬 性指定"表3007。用與視窗3 102觸及諸多用來定義屬性標 δ己和特點的視窗相同的通用方式,就能夠進一步使用视窗 3 5 03 ° 圖3 6顯示:用來讀取,修改,或產生,,屬性標記,,表3〇1 [ 中·^一登載項的視窗360i。此處,正在讀取的登載項是針 -134- 本A張尺度關家標kcns…規格⑵㈤π公爱) (請先fiati背面之注音?事項再填驾本頁) ^-0 ------结Figures 3 to 3 show that: in a preferred embodiment, the window used by the AT in the graphical user interface; used to: look at, the time interval (air time schedule) has been defined, the definition is for a The time-interval-term-cutting is only present, and the use of a time interval is associated with a decision. Beginning with Figure 31 of Min'keng, the figure shows: See 3 102 for displaying a defined schedule. Subwindow 3 103 lists the defined schedules of Jingu " 丨 匁 according to the name; Subwindow 3 106 lists all the defined rules according to the name. The displayed information is from the "Schedule Definition" table 30.3 and "Schedule Rules" table 3025. To see what kind of rule a schedule name represents, the user will choose to display it in the sub-window 3 1 03 The name in Chinese, as shown at 3 105, where "non-working time" has been selected. At this time, the schedule has two constituent rules: _ means workday of the week, and is displayed at 3107: One indicates that Saturday, "Weekday and Holiday Day" are displayed at 3 109. When the name of the schedule is selected, the rule (s) belonging to it are highlighted in window 3 1 06. Conversely, when the rule is selected The name of the schedule for many schedules using this rule will be highlighted. It is displayed at 3 1 1 1 in the sub-window 3 1 06: The rule for business hours: and it is displayed in the sub-window 3 103 : Some other schedule names. To generate a new schedule, when the sub-window 3 1 03 is in the active state, click the "Add" button and enter the new schedule name: then Choose a new schedule and will belong to Some of the rules are highlighted in sub-window 3 102 -131-This paper size applies to the China National Solid Standard (CNS) A4 specification (210 X 297 mm) ------------ ^ * ---- --- Order ----------- Line (Please read the notes on the back before filling out this page) 448387 A7 5. In the description of the invention (129). To change some rules assigned to a schedule , First select the name of the schedule, and then select a different rule for that name in the sub-window 3 丨 〇6. To generate a new rule for an existing schedule, first select the name of the schedule and click, The 'Add' button may generate new rules at the time, as described below. When in the sub-window 3 106, you can also click the " Add ' button to generate a new rule, and then make the new rule related to a schedule name%, as described above. By dragging a rule to the schedule name and discarding it on the schedule name, ^ is enough to make a rule related to a schedule name ^ knows the window used to generate a new rule It is shown at 3201 in Figure 32. A window used to modify an existing rule or generate a new rule. To modify an existing rule, double-click it. Entering information in the window will allow the user to: define the time interval (320.3) that is being applied to the decision or attribute based on the validity of the scheduled time, and define the weekly work day that the selected time is valid (3205), define the work week in which the schedule is valid (3207), and define a portion of the year in which the schedule is valid (3209). As shown in the figure, the window 3 2 0 丨 defines the schedule shown in FIG. 3 at 3 π 1. The schedule is indicated by " business hours ". The information shown in window 32〇i is from the "Schedule of Schedules", Table 3025, and many modifications made using Window 32〇1 are applied to the table β Figure 33 shows: Views that increase the time interval to the definition of a decision »Windows 3301 will be accessed by many users belonging to the" user group "(corporate) user group" Community "information set is limited to: at 33 〇3, “Business hours” schedule. When the user clicks on the box 33〇3, 132 will be displayed. • The paper size is applicable to the CNS A4 specification (21〇 × 297). Love> f 锖 Please read the notes on the back of # 1 before filling out this page) X- -------- Printed by the Intellectual Property Cooperative of the Ministry of Economic Affairs 4832 Printed by the Consumer Cooperative of the Property Bureau 8483 8 Print A7 B7 Five 'Invention Note (13) shows the entire list of many defined schedules' so the user may choose one or add a new name. When the user clicks, the definition " button 3305 Window will be displayed for the selected decision. If you are adding-items Name, if necessary, the user will fill in the new schedule ^ Window 3 2 01 ^ According to Figure 3 〇, choose in Figure 3 3-schedule will make, access to the decision table 1611 A "ScheduleDefID" field is filled in: for, the identifier of the entry in the schedule definition table 3023; and in Table 3203, the schedule name is included in its " name " stop If the name of the schedule is new, a new entry is added to the table for the new name. If a rule is added or modified, "the schedule rule, table 3025 will also be modify. User interface for attributes: Figures 3 to 3 7 The user interfaces for attribute definitions and assignments are similar. Figure 34 shows:-A window 3 4 01 listing a number of defined attributes of the type of quality of service (Qos). These attributes determine how much bandwidth is available for an access operation that is being performed according to a given decision. At 3401 'some attribute tags or names are listed. Here, four types of QoS attributes are defined: three types indicate the amount of bandwidth (" high ", " medium " ,,, and low "), and one ("highest priority") indicates the priority when there is a conflict (Priority). All of these properties have one. Priority, as shown at 3405. Many bandwidth attributes are all defined by "bandwidth" characteristics, as shown at 3407. The "number" for each attribute is defined at 3409. Only the "highest priority" will be There is "Number 2". As stated in Windows 3401, in the QoS bandwidth attribute: 11 high "will receive 512000 -133- This paper standard applies the Chinese National Standard (CNS) A4 specification ( 210 «297 mm) i— J I .----— — 111 --- I ---- Order * --- 11 * '^ (Please read the notice on the back before filling in this page) 448387 Printed by the Consumer Property Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (131) The maximum bandwidth '" Medium ·' will receive a maximum bandwidth of 64000, and " Low 'will receive a maximum frequency of 3 2000 together width. Regarding the "highest priority", the priority specified in the attribute must be between the "number 1" and "number 2", the two numbers specified. The information in window 3401 is of course from three tables: 3005, 3011, and 3009. Figure 35 shows a window 350 1 for assigning a QOS attribute to a user group, information collection 'website, or service. In the window 3503, it shows: for all user groups (3507), how have the three types of QoS bandwidth attributes (3509), • Medium ", " High, and Low ", respectively specified To the World Wide Web Service's file transfer service and remote access service (35 1 1), and how has the "high" q〇s priority attribute been assigned to "Finance" (Finance). Use Subject group. Many different assignments reflect the fact that bandwidth is an attribute of a communication service and priority is an attribute of one of the users of the communication service. Therefore, within the bandwidth available for network services, many members of the Finance " user group have high priority. As shown by this example, more than one action attribute may be applied to a decision. If it is possible to generate attributes for a topic by selecting user groups and topics from two sub-windows 3 5 13 and 3 5 1 5 respectively, attribute designation will be promoted. The selections you make in this window will of course be applied to the M attribute assignments table 3007. In the same general way as Windows 3 102 touches many windows that are used to define the attributes and characteristics of attributes, you can further use Windows 3 5 03 ° Figure 36 shows: used to read, modify, or generate, attribute tags ,, Table 3001 [in the window 360i of the items listed. Here, the item that is being read is pin -134- this A-sheet scale family standard kcns ... specifications ⑵㈤ π public love) (please note on the back of fiati? Matters before filling out this page) ^ -0 ------ Knot

4483S A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(132) 對_,中’’QoS頻寬屬性。在3603處,顯示有:登載項之,,標 記”,"描述",及"標記優先次序"襴位的數値。具有適當 存取權利的管理員當然能夠經由視窗3 6 〇丨而改變這些攔: 的數値。在3605處,顯示:針對與標記有關聯的屬性,來 自,,屬性1_表301丨中之登載項的資訊。在那裏顯示有:在登 載項中之數値1 的目前數値’以及特點之名稱。特點名 稱當然疋來自針對該屬性之"屬性特點"表3 〇 〇 9。再者,可 能經由視窗3601而編輯這些數値》按鈕36〇7被用來檢視一 種視窗,琢視窗會顯示:在”屬性特點,,表3〇〇9中之特點登 載項的完整内容。 圖37顯示該視窗。視窗3701是用來定義針對一既定屬性 類別及诸^新屬性類別的諸多新屬性_的視窗◊視窗當然會 依照"屬性特點"表3009中之一登載項的數値而運作。方框 3703是諸多屬性類別之一列表;可能藉由增加到列表來定 義新類別。方框3705是目前特點之名稱;在它們(類別與 名稱)之間會唯一地識別一登載項,而類別與名稱則對應 於表3009内的諸多登載項中的"類別"與,,名稱,,兩個欄位。 在這種情形下’登載項是針對qoS"優先級屬性"(Pri〇dty attribute)。”描述,•方框3707會包含:在正在被檢視之登載 項中的"描述"之數値。3709指示:特點具有哪種數値類 型’此處疋一對數値’如圖3 4中所指示的。在3 7 Π處, 顯示有:”特點優先次序”和"數値優先次序兩個欄位的目 前設定値:而在3 7 1 3處,則會出現任何限制資訊。 結論 -135- 本紙張尺度適用中囷國家標準(CNS)A4規格(210 X 297公釐) <請先閱讀背面之注意事項再填寫本頁) 裝 —-,I nl· i— n i^i 镍4483S A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (132) Yes, ’’ QoS bandwidth attributes. At 3603, there are displayed: "posted items," mark "," description ", and" mark priority "number of digits. Administrators with appropriate access rights can of course go through window 3 6 〇丨 And change the number of these blocks: At 3605, it displays: For the attributes associated with the tag, from, the information of the entry in the attribute 1_ table 301 丨. There is displayed: The current number of the number 1 and the name of the feature. Of course the name of the feature comes from the "attribute feature" table 3 for this attribute. Furthermore, these numbers may be edited via the window 3601 button 36. 7 is used to view a window, and the window will display: The complete contents of the items listed in "Attributes," Table 3.009. Figure 37 shows this window. Window 3701 is used to define a number of new attributes for a given attribute class and new attribute classes. Of course, the window will operate according to the number of entries in one of the "Attribute Features" table 3009. Box 3703 is a list of many attribute categories; new categories may be defined by adding to the list. Box 3705 is the name of the current feature; a posting item is uniquely identified between them (category and name), and the category and name correspond to " category " and, of the many postings in Table 3009, Name, two fields. In this case, the 'post item' is for qoS " priority attribute ". "Description, • Box 3707 will contain: the number of" Description "in the item being reviewed. 3709 indicates: what kind of data type does the feature have 'here 疋 a pair of numbers' as shown in Figure 3 4 At 3 7 Π, the current settings of "Feature Priority" and "Number Priority" are displayed: while at 3 7 1 3, any restriction information will appear. Conclusion-135- This paper size is in accordance with the Chinese National Standard (CNS) A4 specification (210 X 297 mm) < Please read the precautions on the back before filling this page) 装 —- , I nl · i— ni ^ i nickel

44838 J 經濟部智慧財產局員工消費合作社印製 A7 ________B7______ 五、發明說明(133 ) 3結論 +前面的閣述已經對那些熟習於與閣述有關之技藝的人披 露:用來建構通用以決策伺服器的最佳模式,該模式目前 疋此處所披露之通用決策伺服器的諸多開發者所熟知的。 如以上描述的,通用決策伺服器的兩項基本特點是:將決 策評估與決策施行分離,以及關於能夠制定決策所針對的 諸多行動類型的可擴充性 關於將決策評估與決策施行分 離,諸多決策施行组件可能被定位在決策應用到之系統中 的不同層級處;而諸多決策評估組件則可能是在遠離諸多 決策組件之位置的位置處。 雖然用來將決策評估與決策施行分離的技術,以及關於 能夠執行諸多行動種類而使決策可擴充的技術都可能被應 用到用來定義的任何機制;可是當該技術使用在依據一些 行動和諸多實體之集合來定義決策的一些決策施行系統^ 時,它們都是特別有用的。在這些系統中,也可能使得可 ,執行行動的諸多實體之類型以及執行行動所針對的諸多 實體之類型都是可擴充的。 會增加系統之有用性而在此處所披露之決策施行系统的 1外一些特點是:行動屬性,它會定義打算執行由決策授 權又一仃動所依照的方式以及時間間隔;該時間間隔則會 疋義:決策有效時或一屬性被應用到一項行動時的時間: 一,圖形使用者界面會提供:諸多決策及其組成部份的簡 易定義和操縱方法。 s 就像對那些熟習於有關技藝者而言將會立即顯而易見的 -136- 本灰張尺度翻令圏國家標準(CNS)A4規格(210 x 2g7公发) 1-----------K--------訂--------- (請先闓讀背面之注意事瑣存填寫本頁〕 4*483 8 " A7 _____B7_ 五、發明說明(134) 那樣,此處所描述的很多技術都可能被應用在任何種類的 決策施行系統中:並且,甚至是在一種以此處所描述的方 式來定義決策的決策施行系統中最有用的那些技術,也可 能用很多不同的方式加以建構。譬如說,可能使用不同的 圖形使用者界面’可能使用不同的資料庫系統來建構決 策:並且在一既定資料庫系統内,可能使用諸多不同的表 安排。於是,此處披露的諸多原理的無限多個其它實施例 都有可能;並且,爲此緣故’在各方面,打算將"闡述"視 爲範例而不具限制性;因而決定此處披露之本發明的函蓋 範圍(breadth)並不是來自"闡述",而是來自像利用被專利 法律允許的完全涵蓋範圍所解釋那樣的申請專利範圍。 L-r--,----------裝--------訂---- (請先閱讀背面之注意事項再填寫本頁} 、续 經濟部智慧財產局員工消費合作社印製 -137- 本紙張尺度適用中國國家標準(CNS)A4規格(210 χ 297公釐)44838 J Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 ________B7______ V. Description of the Invention (133) 3 Conclusion + The previous statement has been disclosed to those who are familiar with the technology related to the statement: used to build a universal decision-making The best mode of the server, this mode is now well known to many developers of the universal decision server disclosed herein. As described above, the two basic characteristics of a universal decision server are: the separation of decision evaluation from decision execution, and the scalability of the many types of actions that can be targeted for decision making. The execution components may be located at different levels in the system to which the decision is applied; and many decision evaluation components may be located away from many decision components. Although the techniques used to separate decision evaluation from decision execution, as well as techniques that enable decision types to be extended to make decisions scalable, may be applied to any mechanism used to define them; however, when the technology is used based on some actions and many They are particularly useful when a collection of entities is used to define a decision-making system. In these systems, it may also be possible to expand the types of entities that perform actions and the types of entities to which they perform actions. It will increase the usefulness of the system, and some of the features of the decision execution system disclosed here are: the attribute of action, which defines the method and time interval in which it intends to perform another authorization by decision making; the time interval will Meaning: The time when a decision is valid or an attribute is applied to an action: First, the graphical user interface will provide: a simple definition and manipulation of many decisions and their components. s It will be immediately obvious to those who are familiar with the relevant art -136- This gray sheet scale re-orders 圏 National Standard (CNS) A4 specification (210 x 2g7 public) 1 -------- --- K -------- Order --------- (Please read the cautions on the back and fill in this page first) 4 * 483 8 " A7 _____B7_ V. Description of the invention ( 134) That way, many of the techniques described here may be applied to any kind of decision execution system: and even those that are most useful in a decision execution system that defines decisions in the way described here, It may be structured in many different ways. For example, it may use different graphical user interfaces' may use different database systems to construct decisions: and in a given database system, many different table arrangements may be used. Infinitely many other embodiments of the many principles disclosed herein are possible; and, for this reason, 'in all respects, it is intended to treat " explanation " as an example and not restrictive; therefore, the text disclosed herein is decided Coverth of invention ) Does not come from " Explanation ", but from the scope of patent application as explained using the full coverage allowed by patent law. Lr-, ---------- 装 ---- ---- Order ---- (Please read the notes on the back before filling this page} 、 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs-137- This paper size applies to China National Standard (CNS) A4 specifications ( 210 χ 297 mm)

Claims (1)

經濟部智慧財產局員工消費合作社印製 448387 A7 ------- B7 五、發明說明() 1. -種用來施行決策的決策施行系統,該決策會克義:在 7腦系,中所定義的諸多第—實趙可能針對在電腦系 統中所足義的諸多第二實體執行哪些屬於其中第一麵 型的行動,該決策施行系^所屬的類型,包括:' :決策词服器’它包括諸多決策之一決策資料庫;以及 一決策施行器;它會控制第—行動類型之執行 (performance),並且能夠將一項用來執行第—類型之行 動的請求傳達給決策伺服器;唯若來自決策伺:器之 =回應指示:決策允許該行動,決策施行器才舍允許 盯動疋執行,而該決策施行系統則具有特微為: 決策資料庫是可以擴充的,以便包括釺對屬於其中 附加類型之諸行動的決策;因此,可能將—種會控制 附加類型之朽·動之勃_行的附加》策施行器増加到決策 施行系統。 2 .根據申請專利範圍第i項之決策施行系統’進一 特徵為: 決策資料庫是屬於依據第一實體之集合和第二實體之 集合來定義決策的類別;以及 、 ”決策資料庫是可以進—步擴充的,以便包括:—附加 第一贯體類型及/或一附加第二實體類型。 3 .根據申請專利範圍第2項之決策施行系統,進—步具有 特徵為: 〃 一項行動屬性可能在資料庫中與第一實體之集合及/或 第二實體之集合有關聯,該行動屬性會載明:打算執行 -138· 本紙張尺度適用中國國家標準(CNS)A4規格(210 x297公楚) 4 ,---------.裝--------訂·--------^ (請先閱讀背面之注意事項再填寫本頁) 448387 A8 B8 C8 D8 六、申請專利範圍 第—’體々集合中的諸多實體及,或在第二實-i 不δ中的諸多實體而載明在― 、 依照的一種方式。 弋決策中的—項行動所 4.根據中請專利範園第3項之決 特徵爲: 仃系..无’堪一步具有 決策資料庫是可以進一步撼一。 齡’… 5 ·根據申請專利範圍第 有特徵爲: 附加決策施行器會在電腦系 執行,該層級與決策施行器控層級處㈣行動之 不同。 之執行所處的層級 6·根據申請專利範圍第 有特徵爲: &amp; 電中至少有—個是在遠離決策词服器之 4系統中的一個位置 7-根據申請專利範園第 有特徵爲: fk 行系統,進一步具 行系統,進一步具 行系統,進一步具 k--------訂---------線. ί請先閲讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印M 決策施行器會控制不是電腦系統之—部份的第二實 體。 、 8.種屬於依據第一實體之集合,第二實體之集合,以及 著多行動來定義決策之類別的決策資料庫,—既定決 朿會疋義:屬於既定第一實體之集合之—實體可能針 對屬於既定於第二實體之集合之—實體執行的一項既 -139- 本纸張尺度適用中國國家標準(CNS)A4規格(21〇 x 297公釐) 448387 A7 ---------B7 五、發明說明() 定行動;該決策資料庫具有特徵為: 一項另加條件可能在資料庫中與既定決策有關聯,該 另加條件會在屬於既定第一實體之集合之一請求實體 提出一項詩求以執行針對屬於既定第二實體之集合之 -實體的既定行動之時決定:請求實體是否可能執行 該行動。 9.根據申請專利範圍第8項之決策資料庫,進一步具有特 徵為: —另加條件是一種與既定決策有關聯的時間間隔規 範’時間間隔規範會載明時間之間㈤;在#問間隔期 間,屬於載明在既定決策中的既定第一實體之集合的 諸多實體可能執行:針對屬於其中所載明的既定第二 實體之集合的諸多實體,其中所載明的既定行動。 Π)‘-種屬於依據第一實體之集合,第二實體之集合,以及 諸多行動來定義決策之類別的決策資料庫一既定決策 會定義:屬於既定第—實體之集合之—實體可能針對屬 於既^二實體之集合之—實體執行的—項既定行動; 該決策資料庫具有特徵為: -項行Μ性可能在資料庫中與既定第—實體之集合 及/或既定第二實體之集合有關聯,該行動屬性會載明: 打算執行載明在既定決策中之既定行動所依照的一種方 式。 η.根據申請專利範圍第10項之決策資料庫, 徵為: -140 表紙張尺度適用中國國家標準(CNS)A4規格(210x297公发 (請先閱讀背面之注意事項再填寫本頁) .si---------訂---------,¾ 經濟部智慧財產局員工消費合作社印製 44838 7 0088¾ ABCS 六 經濟部智慧財產局員工消費合作社印製 圍 々孝專 青 =° 申 ㈣策資科庫是可《擴充的,《便包括諸多新行動屬性⑽线州庫卞步具有特 -種行動屬性條件可能在資料庫 -行動屬性有關聯,該行動屬性條件會在十::決策之 請求之時決定:屬於既定第—實請求貫證提出 是否能夠執行針對在既定第二實體二=-請求實體 既定行動’該行動是如行動屬性中所:二-艾體的 -141 - 本纸張尺度適用中固國家標準(CNS)A4規格(210 X 297公釐) ------ ( -I I n I I I-- - 1« n - - 一。,* It - - I f[ I f (請先閱讀背面之注意事項再填寫&lt;頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 448387 A7 ------- B7 V. Description of the Invention () 1.-A decision-making execution system for decision-making. Many of the first-defined Zhao-Zhao may perform actions that belong to the first facet of many second entities that are sufficient in the computer system. The types of decision-making implementation systems ^ include: ': Decision server 'It includes a decision database of one of the many decisions; and a decision executor; it controls the performance of the first type of action and can communicate a request to the first type of action to the decision server ; Only if it comes from the decision server: device = response instruction: the decision allows the action, the decision implementer will not allow staring and executing, and the decision execution system has the following characteristics: The decision database can be expanded to include釺 Decisions on actions that belong to the additional type; therefore, it is possible to add a policy implementer that will control the decay of the additional type and the action of the action. System. 2. A further feature of the decision execution system according to item i of the scope of patent application is: the decision database is a category that defines decisions based on the collection of the first entity and the collection of the second entity; and, "The decision database is accessible -The step is expanded to include:-an additional first entity type and / or an additional second entity type. 3. According to the decision execution system of the second patent application scope, the further step is characterized by: 行动 an action The attribute may be related to the collection of the first entity and / or the collection of the second entity in the database. The action attribute will state: -138 · This paper size applies the Chinese National Standard (CNS) A4 specification (210 x297 (Gongchu) 4, ---------. Install -------- Order · -------- ^ (Please read the precautions on the back before filling in this page) 448387 A8 B8 C8 D8 Sixth, the scope of the application for patents-'Many entities in the collection of bodies and, or many entities in the second real-i and δ, are stated in a way, according to. 弋 in the decision-item Action 4. According to the decision of the Chinese Patent Patent Park, the third feature is: Department .. No 'one step with a decision database can be further shaken. Age' ... 5 · According to the scope of the patent application, the following features are: The additional decision implementer will be executed in the computer department, and this level is at the control level of the decision implementer. ㈣The actions are different. The level of execution is 6. According to the scope of the patent application, the characteristics are as follows: &amp; At least one of the electricity is in a position in the 4 system away from the decision server 7- The features of the park are: fk line system, further system, further system, further k -------- order --------- line. Please read the note on the back first Please fill in this page for further information.) Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs, Consumer Cooperatives, and M. The decision implementer will control the second entity that is not part of the computer system. 8. Types of collections that are based on the first entity and the second entity , As well as a decision database that defines multiple categories of decision making—predetermined decisions will make sense: the set that belongs to a given first entity—the entity may target entities that belong to a set that belongs to a second entity—entity enforcement One of the papers-139- This paper size is applicable to the Chinese National Standard (CNS) A4 specification (21 × 297 mm) 448387 A7 --------- B7 V. Description of the invention () The decision database has the following characteristics: An additional condition may be associated with the established decision in the database, and the additional condition may request an entity to submit a poem request in one of the collections belonging to the established first entity to execute The collection of second entities-the entity's intended action at the time determines whether the requesting entity is likely to perform that action. 9. According to the decision database of the 8th scope of the patent application, it is further characterized by:-The additional condition is that a time interval specification associated with a given decision 'the time interval specification will specify the time interval; During this period, many entities belonging to the set of the first entity specified in the given decision may be executed: for many entities belonging to the set of the second entity specified in the set, the set of actions stated therein. Π) '-a type of decision database that belongs to a set of first entities, a set of second entities, and many actions to define the type of decision. The set of two entities—entity-performed—item established actions; The decision database has the following characteristics:-The item may be in the database with the set of the established first-entity and / or the set of established second entity Relevant, the action attribute will state: The method by which the intended action is set out in the stated decision. η. According to the decision database of the 10th scope of the patent application, the collection is: -140 The paper size applies the Chinese National Standard (CNS) A4 specification (210x297) (please read the precautions on the back before filling this page) .si --------- Order ---------, ¾ Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy 44838 7 0088¾ ABCS Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Qing = ° The application policy library is expandable, which includes many new action attributes. The state library's step has special action attributes, which may be related to the database and action attributes. The action attribute conditions will At ten :: at the time of the request for decision: it belongs to the established first-the actual request to prove whether it can be performed against the second entity of the established second =-the requesting entity's predetermined action -141-This paper size is applicable to China Solid State Standard (CNS) A4 (210 X 297 mm) ------ (-II n II I---1 «n--one., * It --I f [I f (Please read the notes on the back before filling in the <Page)
TW088110985A 1998-06-29 1999-09-06 Generalized policy server TW448387B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US9113098P 1998-06-29 1998-06-29

Publications (1)

Publication Number Publication Date
TW448387B true TW448387B (en) 2001-08-01

Family

ID=22226237

Family Applications (1)

Application Number Title Priority Date Filing Date
TW088110985A TW448387B (en) 1998-06-29 1999-09-06 Generalized policy server

Country Status (3)

Country Link
EP (1) EP1105809A4 (en)
AU (1) AU762061B2 (en)
TW (1) TW448387B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7561530B2 (en) 2005-12-30 2009-07-14 Industrial Technology Research Institute Executing system and executing method of intelligent rule base service
TWI493367B (en) * 2009-08-17 2015-07-21 微軟公司 Progressive filtering search results

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110198248B (en) * 2018-02-26 2022-04-26 北京京东尚科信息技术有限公司 Method and device for detecting IP address
CN115865683B (en) * 2023-03-02 2023-05-23 山东创安交通预警工程有限公司 Intelligent community equipment management system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997000471A2 (en) * 1993-12-15 1997-01-03 Check Point Software Technologies Ltd. A system for securing the flow of and selectively modifying packets in a computer network
US5720023A (en) * 1994-03-28 1998-02-17 British Telecommnications Public Limited Company Appartus and method for storing diagram data
US5752245A (en) * 1994-12-09 1998-05-12 Object Technology Licensing Corporation Object-oriented system for configuration history management with a project workspace and project history database for draft identification
US6035399A (en) * 1995-04-07 2000-03-07 Hewlett-Packard Company Checkpoint object
US5721908A (en) * 1995-06-07 1998-02-24 International Business Machines Corporation Computer network for WWW server data access over internet
GB2317539B (en) * 1996-09-18 2001-03-28 Secure Computing Corp Generalized security policy management system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7561530B2 (en) 2005-12-30 2009-07-14 Industrial Technology Research Institute Executing system and executing method of intelligent rule base service
TWI493367B (en) * 2009-08-17 2015-07-21 微軟公司 Progressive filtering search results

Also Published As

Publication number Publication date
AU4838699A (en) 2000-01-17
AU762061B2 (en) 2003-06-19
EP1105809A4 (en) 2005-10-05
EP1105809A2 (en) 2001-06-13

Similar Documents

Publication Publication Date Title
US9154489B2 (en) Query interface to policy server
US7912856B2 (en) Adaptive encryption
US7821926B2 (en) Generalized policy server
US7580919B1 (en) Query interface to policy server
US7272625B1 (en) Generalized policy server
USRE46439E1 (en) Distributed administration of access to information and interface for same
Fernandez-Buglioni Security patterns in practice: designing secure architectures using software patterns
US6105027A (en) Techniques for eliminating redundant access checking by access filters
US6178505B1 (en) Secure delivery of information in a network
AU733109B2 (en) Methods and apparatus for controlling access to information
JP2011154723A (en) System and method and computer program product for allowing access to enterprise resources using biometric devices
WO2000000879A2 (en) Generalized policy server
JP2003271560A (en) Apparatus for access control and policy enforcement for distributed networked services
WO2000079434A1 (en) Query interface to policy server
TW448387B (en) Generalized policy server
Lynch The changing role in a networked information environment
TW464812B (en) Query interface to policy server
Babu et al. A Survey on Blockchain for Access Control Models: Security, Transparency, and Challenges
Seamons et al. Trust negotiation in dynamic coalitions
Rosenhamer What AMANDA offers
Rosenhamer What AMANDA offers: A comparative case study describing a flexible and decentralised approach for Authorisation Management
Hussain et al. Guarantee-based access control
Pluta et al. Identity & Access Control Management Infrastructure Blueprint—Design Principles for True Informational Self-Determination
AndreasPfitzmann et al. Privacy-Enhancing Identity Management
Baker et al. Conceptual Grid Authorization Framework and Classification

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees