An access control method and independent access controller
An access controller and access control technology, which is applied in the direction of instruments, electrical digital data processing, digital data protection, etc., can solve the problems of low reliability of access control, lack of identity protection, lack of write operation authority, etc., and achieve mandatory access Effect of controlling and preventing malicious code and intrusion behavior
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] Such as figure 2 As shown, the independent access controller includes: an access control rule storage module, an access arbitration unit, a data cache module, an import / export and its unpacking module, a log storage module and an authentication unit. The access arbitration unit includes at least one access arbitrator. Each access arbitrator in the access arbitration unit is connected to the access control rule storage module, the data cache module and the log storage module. An import / export and unpacking processing module for data unpacking processing is also connected between the data cache module and the server. At least one access arbiter forms at least one access channel with the data cache module. The independent access controller also includes an authentication unit, which includes a system user login authentication module, a security officer authentication module and an auditor authentication module. The system user login authentication module used for syste...
Embodiment 2
[0074] Such as image 3 Shown is a schematic diagram of a single-user access controller. The user has a client installed on the smart terminal. The client side transparently encrypts the user's login information to avoid being intercepted by other users on the Internet. At the same time, the user's login information, server resources to be accessed and other information can be packaged. When a user initiates access to a certain resource of the server, the packaging information will be written (write-only operation) to the login information pre-module of the user login. At the same time, the access arbitrator reads information related to the user from the access control rule storage module. The information includes: 1. User identity information for identity authentication. 2. User tag information used to identify the user's security attributes, departments and corresponding rights. 3. The access control list used to finally confirm the legitimacy of this visit. The access...
Embodiment 3
[0081] According to a preferred embodiment, the stand-alone access controller is set in a cloud environment. On the same physical device, start the computing environment and the independent access monitor environment at the same time, and ensure migration along with the computing environment. After starting a virtual machine in the virtual machine management layer, a virtual machine can be divided into two zones by using the sandbox technology. Security officers and auditors log in through the cloud portal and perform identity authentication with strong authentication.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


