基于智能终端的共享仪器使用权限验证
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Authorization verification of use of shared instruments based on intelligent terminal
  • 作者:罗剑文
  • 英文作者:Luo Jianwen;Teaching center of Biology Experiment,School of Life Sciences,Sun Yat-sen University;
  • 关键词:智能终端 ; 权限验证 ; 标识 ; 物联网
  • 英文关键词:intelligent terminal;;authorization verification;;identification;;Internet of Things
  • 中文刊名:SYJL
  • 英文刊名:Experimental Technology and Management
  • 机构:中山大学生命科学学院生物学实验教学中心;
  • 出版日期:2018-09-20
  • 出版单位:实验技术与管理
  • 年:2018
  • 期:v.35;No.265
  • 基金:中山大学本科教学改革研究项目立项(201658)
  • 语种:中文;
  • 页:SYJL201809071
  • 页数:4
  • CN:09
  • ISSN:11-2034/T
  • 分类号:281-284
摘要
大型仪器共享平台中,用户对仪器的使用是多对多的关系,合理分配与验证用户的权限,是仪器开放使用的关键。随着物联网技术的发展,使用智能终端进行权限验证已切实可行。验证系统通过预约机制自动部署授权,根据预约事件实时生成授权列表及仪器控制端标识,约束授权的时效性;并利用智能终端替代仪器端的读卡器控制仪器的访问权限,通过读取标识验证开机提升用户体验与系统拓展能力,可轻松应对大型的共享服务管理,提高仪器设备的使用效率。
        At the sharing platform of large-scale instruments,the relationship between users and their use of instruments is multiple to many.Rational allocation and verification of users' authorization are the key to the open-use of instruments.With the advance of the Internet of Things technology,authorization verification with the intelligent terminal has become feasible.The system can automatically deploy users' authorization by the reservation mechanism,and in real time generates the authorization list and the instrument control end identification based on the reserved incidents,to restrict the timeliness of the authorization.It can also utilize the intelligent terminal to replace the card-readers on instruments to control their access.Verification via reading the identification can enhance the users' experience and system scalability,which can easily cope with the large-scale shared service management and improve the use efficiency of instruments and equipment.
引文
[1]林凤屏,黄飞,唐良华,等.大型仪器设备开放共享平台建设的探索[J].实验科学与技术,2012,10(5):180-182.
    [2]孙宇,高禄梅,任金妮,等.大型设备预约系统时间分配模型的设计与实现[J].实验室研究与探索,2014,33(1):263-266.
    [3]罗剑文.引入物联网概念的实验室仪器开放管理模型[J].实验室研究与探索,2016,35(10):275-280.
    [4]Hernandez-Ramos J L,Pawlowski M P,Jara A J,et al.Toward a Lightweight Authentication and Authorization Framework for Smart Objects[J].IEEE Journal on Selected Areas in Communications,2015,33(4):690-702.
    [5]Tan L,Wang N.Future internet:The Internet of Things[C]//International Conference on Advanced Computer Theory and Engineering.IEEE,2010(5):376-380.
    [6]曾孝平,任家峪,熊东.基于RFID的非接触式IC卡读写器设计[J].计算机测量与控制,2010,18(10):2357-2359.
    [7]杨智,殷丽华,段洣毅,等.基于广义污点传播模型的操作系统访问控制[J].软件学报,2012,23(6):1602-1619.
    [8]Demirci M F,Shokoufandeh A,Keselman Y,et al.Object Recognition as Many-to-Many Feature Matching[J].International Journal of Computer Vision,2006,69(2):203-222.
    [9]Krishnan R,Krishnan R,Krishnan R.Label-Based Access Control:An ABAC Model with Enumerated Authorization Policy[C]//ACM International Workshop on Attribute Based Access Control.ACM,2016:1-12.
    [10]Cayrel P L,Veron P.Improved code-based identification scheme[J].O A Lib Journal,arXiv preprint arXiv:1001.3017v1(2010-01-18).
    [11]吴家菊,刘刚,席传裕.基于Web服务的面向服务(SOA)架构研究[J].现代电子技术,2005,28(14):1-4,7.
    [12]罗剑文.一种基于智能终端的开机权限验证方法及系统:CN104899483A[P].2015-04-23.
    [13]沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11.
    [14]Erdtman S,Seitz L,Wahlstroem E,et al.Authentication and Authorization for Constrained Environments(ACE)[Z].2017.
    [15]罗剑文,许佳玲,何炎明,等.引入进程监控机制的实验室仪器开放管理模型[J].实验技术与管理,2014,31(2):104-106.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700