Unlock instant, AI-driven research and patent intelligence for your innovation.

Access authority control method and reverse agent server

A technology of reverse proxy and control method, applied in the field of access authority control method and reverse proxy server, can solve the problems of complex management and difficult maintenance, and achieve the effects of high availability, low cost and convenient maintenance.

Inactive Publication Date: 2016-06-29
DEV RES CENT OF CHINA GEOLOGICAL SURVEY
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the technical problem to be solved by the present invention is that the management is complicated and difficult to maintain when performing access control at the application layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authority control method and reverse agent server
  • Access authority control method and reverse agent server
  • Access authority control method and reverse agent server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 A schematic flow chart showing an access authority control method according to an embodiment of the present invention. According to the access right control method of this embodiment, a reverse proxy server is set at the network layer, and the reverse proxy server is configured to control the user's right to access resources in the application server. Such as figure 1 As shown, the access control method mainly includes:

[0030] Step S110, the reverse proxy server receives the resource access request sent by the user, wherein the resource access request may include resource information to be accessed by the user and the user ID of the user;

[0031] Step S120, determining the user group to which the user belongs according to the user identifier;

[0032] Step S130, determining at least one accessible resource group that the user group can access;

[0033] Step S140, according to the resource information, determine the to-be-visited resource group to which...

Embodiment 2

[0043] The access authority control method according to the present embodiment is based on role access control (English: Role-BasedAccessControl, abbreviation: RBAC) and Nginx (enginex) reverse proxy service configuration strategy to implement authority control on network resource access. The following describes role access control and Nginx reverse proxy service in detail.

[0044] Access control means that according to the pre-set permission rules, system users can and can only perform operations within their authority on resources within their authority. In the traditional permission control management, the resource permissions are assigned by a global administrator, and the resources in the system are classified into levels and categories for management to ensure that each user can only access those resources that are marked to be accessible by him. This method coordinates and manages the allocation of system resources, but when there are a lot of system users and resource...

Embodiment 3

[0056] Figure 5 A schematic block diagram of a reverse proxy server according to an embodiment of the present invention is shown. The reverse proxy server 300 according to this embodiment is set at the network layer, can be connected to the user terminal 100 via the Internet 200, and is configured to control user access to the application server cluster 400 with the application server cluster 400 that provides application resources to the user terminal 100 Permissions for resources in .

[0057] The reverse proxy server 300 according to this embodiment may include: a receiving module 310 , a first determining module 320 , a second determining module 330 , a third determining module 340 and a judging module 350 .

[0058] Specifically, the receiving module 310 may be configured to receive a resource access request sent by a user, wherein the resource access request may include resource information to be accessed by the user and the user ID of the user; the first determining m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access authority control method and a reverse agent server. The reverse agent server is arranged in a network layer, and the reverse agent server is configured to control the authority of a user in accessing resources in an application server. The method comprises the following steps: the reverse agent server receiving a resource access request emitted by the user; according to a user identification, determining a user group which the user belongs to; determining at least one addressable resource group which can be accessed by the user group; according to resource information, determining a resource group to be accessed which resources about to be accessed by the user belongs to; and under the condition that each addressable resource group comprises the resource group to be accessed, determining that the user has the authority to access the resources. According to the access authority control method and the reverse agent server, provided by the embodiments of the invention, management of access authority control can be flexibly carried out, a server with high configuration is unnecessary, and the access authority control method and the reverse agent server also have the advantages of low cost, high availability, convenient maintenance and the like.

Description

technical field [0001] The invention relates to the application field of Internet technology, in particular to an access authority control method and a reverse proxy server. Background technique [0002] At present, the Internet application system mainly controls access at the application layer. This method is also called "hard coding", that is, the authority control function is implemented in the system function application. This method of implementing access control at the application layer is relatively flexible, but it needs to add permission control in each application, so the code redundancy is high. Moreover, the code that implements the permission control function is highly coupled with the application code. Therefore, when the permission changes, the application code needs to be modified, which is difficult to maintain. Contents of the invention [0003] technical problem [0004] In view of this, the technical problem to be solved by the present invention is t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0884H04L63/101H04L63/104
Inventor 吴轩厉岩周超张凌波贾丽琼齐钒宇
Owner DEV RES CENT OF CHINA GEOLOGICAL SURVEY