Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method, device and system

An access control and access request technology, applied in computer security devices, instruments, digital data authentication, etc., can solve security risks, data leakage and other problems, and achieve the effect of ensuring security and realizing secure access and control.

Active Publication Date: 2019-04-16
SHANGHAI SUIXUNTONG ELECTRONICS TECH CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To this end, the present disclosure proposes an access control method. After the terminal sends the first access request, after verifying the access rights of the terminal through the preset terminal list, it generates an access control method for the management interface according to the first access request. The second access request invoked prevents the terminal from directly accessing the resource search engine, and at the same time is limited to calling the management interface for corresponding management operations, rather than directly reading the data stored in the resource search engine, ensuring data security and realizing The invention provides safe access and control to the resource search engine, and solves the potential safety hazard of data leakage in the access control method of the resource search engine in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and system
  • Access control method, device and system
  • Access control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Embodiments of the present disclosure are described in detail below, examples of which are illustrated in the drawings, in which the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present disclosure and should not be construed as limiting the present disclosure.

[0037] The access control method, device and system of the embodiments of the present disclosure are described below with reference to the accompanying drawings.

[0038] figure 1 It is a schematic flowchart of an access control method provided by an embodiment of the present disclosure.

[0039] Such as figure 1 As shown, the method includes the following steps:

[0040] In step 101, a first access request for requesting a resource search engine to perform a target operation is obtained from a terminal.

[0041] The e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method, a device, and a system, The method comprises the following steps of: obtaining a target object, obtaining a first access request for requesting the resource search engine to execute the target operation from the terminal, if the terminal is in a preset terminal list; determining a target management interface corresponding to the target operation from preset management interfaces, generating a second access request for indicating the target management interface and the login information, sending a second access request to the resource search engine, after the terminal sends the first access request; correspondingly generating a second access request for calling the management interface according to the first access request, according to the access control method for the resource search engine, when the terminal directly accesses the resource search engine, only the management interface is called to carry out corresponding management operation instead of directly reading data stored in the resource search engine, so that the safety of the data is guaranteed, and the problem of potential safety hazard of data leakage in an access control method for the resource search engine in the prior art is solved.

Description

technical field [0001] The present disclosure relates to the technical field of mobile terminals, and in particular to an access control method, device and system. Background technique [0002] ElasticSearch (ES) is an open source distributed resource search engine. ES can provide the ability to search full-text data. Using ES can quickly store, search and analyze massive data. [0003] At present, because ES can be used to retrieve the stored data, the data cannot be encrypted for storage. However, when managing the data stored in ES, such as performing document statistics and adding indexes to the data in ES , due to confidentiality requirements, and users' data in ES cannot be viewed, therefore, it is necessary to provide a secure ES access control method. Contents of the invention [0004] The present disclosure aims to solve one of the technical problems in the related art at least to a certain extent. [0005] To this end, the present disclosure proposes an access ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/62
CPCG06F21/46G06F21/6218
Inventor 彭龙腾焦剑
Owner SHANGHAI SUIXUNTONG ELECTRONICS TECH CO LTD