Unlock instant, AI-driven research and patent intelligence for your innovation.

Resource access control method and device

A resource access and control method technology, applied in the field of resource access control methods and devices, can solve the problems of large data volume, slow resource access speed for users, complex processing process, etc., and achieve the effect of improving processing speed

Active Publication Date: 2016-04-20
ADVANCED NEW TECH CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this method makes the processing process very complicated when dealing with the user's access control to resources. Every time the user requests access, it is necessary to look up the table to check the user's authority to the resource, and the amount of data recording the above-mentioned corresponding relationship is very large. Very inefficient when dealing with access control, making resource access slower for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access control method and device
  • Resource access control method and device
  • Resource access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The resource access control method of this application combines figure 1 An optional application scenario is shown for illustration, the figure 1 A server 11 is included in the server 11, and various resources are stored in the server 11, including but not limited to: documents, pictures, web pages, etc.; a user 12 may want to access some of the resources. For example, the server 11 is a server of a certain company, which stores some internal files of the company, and the user 12 is an employee of the company, and needs to access the files therein for office processing.

[0022] Specifically, the user 12 can log in to the server 11 through the network 13 to access resources. For example, the user can use various terminals such as a mobile phone 14, or a desktop computer 15 or a notebook computer 16 to connect to the network. At this time, the server 11 needs to perform resource access control, such as checking whether the user has access rights to the resource, or chec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a resource access control method and device. The method comprises that a resource access request, which comprises an encrypted resource identification corresponding to resource, an access operation identification and a user identification corresponding to a user using request access resource of a client, sent from the client is received; a public key corresponding to the user identification and the access operation identification is obtained, the public key is used to decrypt the resource identification, and when decryption succeeds, the resource identification is determined to be encrypted by a secret key corresponding to the user identification and the access operation identification, and the resource is provided for the client. According to the invention, the processing speed of resource access control is improved substantially.

Description

technical field [0001] The present application relates to network technology, in particular to a resource access control method and device. Background technique [0002] With the development of network technology, users often conduct office work or query information from the Internet. For example, if a company adopts electronic office, the staff needs to access the company's internal resources (such as certain pictures or documents) from the Internet for office work. deal with. The above user operations usually require resource access control. Even if internal employees of the company use the company's online resources, different types of staff have different access rights. For example, some people only have read permissions, while others have write permissions. permission. The general way to implement access control is to record the corresponding relationship between users, resources and permissions. For example, record user A—resource a—authority is write, so that when u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 陈奇
Owner ADVANCED NEW TECH CO LTD