Access control method

A technology of access control and control instructions, applied in the field of information security, can solve problems such as low protection rate, affect protection efficiency, and protection lag, and achieve the effect of avoiding security risks, improving protection efficiency, and ensuring security.

Inactive Publication Date: 2014-02-26
STATE GRID CORP OF CHINA +4
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides an access control method, which solves the problem in the prior art that the protection lags behind the new attack means, resulting in a high false alarm rate and low protection rate, and that the protection efficiency is affected due to cumbersome protection means. technical problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method
  • Access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] The embodiment of the present invention discloses an access control method. By acquiring the first feature information of the user and the second feature information of the application platform, and according to the first feature information and the pre-stored first identification information, it is judged whether the user is a legitimate user, And according to the second feature information and the pre-stored second identification information, it is jud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method. The method is characterized in that through acquiring first characteristic information of a user and second characteristic information of an application platform, according to the first characteristic information and prestored first identification information, whether the user is a legal user is determined; according to the second characteristic information and prestored second identification information, whether the application platform is a trusted application platform is determined so that illegal user access is blocked; when the user is the legal user and the application platform is the trusted application platform, whether the user possesses executive power of applications to be operated is determined according to the first characteristic information of the user so that safety problem caused by illegal operation of an unauthorized user is avoided; when the user possesses the executive power of the applications be operated, information resources which form one-to-one correspondence with the applications to be operated are acquired; according to the information resources, the applications be operated is executed. Therefore, interferences among the plurality of applications to be operated which are executed simultaneously are reduced and normal operation of the applications be operated is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically relates to an access control method. Background technique [0002] At present, the smart grid has become a strategic fulcrum to promote the green development of energy in my country, and various construction results formed around the smart grid are the key to ensuring the development of the smart grid. As a shared information resource, it is widely used in the actual production and construction process. How to ensure the security of the shared information resource has become the key to promoting the achievements of smart grid construction in my country. [0003] In the existing technology, in order to ensure the security of shared information resources, it is mainly through setting up firewalls, intrusion monitoring mechanisms and virus protection mechanisms to block illegal users and unauthorized access, thereby preventing external attacks and ensuring s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/62
Inventor 韩旭王小辉尹彩玲魏青科
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products