Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device, system and medium for controlling resource access

A technology for controlling resources and resources, applied in the Internet field, can solve problems such as lack of user identity authenticity detection

Active Publication Date: 2021-08-24
CERNET CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing methods for controlling access to overseas academic website resources focus more on the detection of overseas academic website resources, but lack the authenticity detection of user identities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, system and medium for controlling resource access
  • A method, device, system and medium for controlling resource access
  • A method, device, system and medium for controlling resource access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Other aspects, advantages and salient features of the present disclosure will become apparent to those skilled in the art from the following detailed description of exemplary embodiments of the present disclosure in conjunction with the accompanying drawings.

[0020] In this disclosure, the terms "include" and "comprising" and their derivatives mean to include but not to limit; the term "or" is inclusive, meaning and / or.

[0021] In this specification, the various embodiments described below to describe the principles of the present disclosure are illustrative only and should not be construed in any way to limit the scope of the disclosure. The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the present disclosure as defined by the claims and their equivalents. The following description includes numerous specific details to aid in understanding, but these should be cons...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a method for controlling resource access, the method includes: S1, setting a whitelist, the whitelist includes the address of the first user with access authority and the address of the first resource; S2, receiving the data packet sent by the user, and parsing out the first resource address Two user addresses and second resource addresses, the second user address is the address of the user, and the second resource address is the address of the resource accessed by the user; S3, if the second user address is equal to the first user address, and the second resource address is the same as If the addresses of the first resources are equal, the user is allowed to access the resource; otherwise, the user is denied access to the resource.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and in particular, to a method, device, system and medium for controlling resource access. Background technique [0002] With the rapid development of Internet technology, people's lifestyles are becoming more and more convenient. At the same time, people are also facing the erosion of more and more bad information, and at the same time more and more personal privacy is leaked. Therefore, to satisfy the next generation of our country The basic starting point is the security of Internet business applications and industrial development. On the premise of realizing the authenticity and credibility of user identities, independent and reliable network identities, and traceable user identities, access to overseas website resources needs to be controllable, especially for overseas Access to academic website resources is effectively controlled. Existing methods for controlling access to ov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/10
Inventor 黄友俊李星吴建平段晓磊李威
Owner CERNET CORP