Unlock instant, AI-driven research and patent intelligence for your innovation.

An access control method, system, electronic device and medium

An access control and control subject technology, applied in the Internet field, can solve the problem of low security and achieve the effect of ensuring security and reliability

Active Publication Date: 2022-02-11
BEIJING QIANXIN TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current common authorization system is role-based access control (Role-Based Access Control, RBAC). In the RBAC system, permissions are associated with roles, and users obtain the permissions of these roles by becoming members of appropriate roles. Users can easily By tampering with one's own identity to become a role with access to an object, the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control method, system, electronic device and medium
  • An access control method, system, electronic device and medium
  • An access control method, system, electronic device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present disclosure.

[0027] The terminology used herein is for the purpose of describing particular embodiments only, and is no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An access control method for controlling a subject to access an object, the method comprising: step S1, judging whether an attribute of the subject satisfies a preset inspection condition, wherein the attribute of the subject is set to pass the subject's attribute At least one of environmental attributes or behavior attributes to represent; step S2, when the attributes of the subject satisfy the check condition, allow the subject to access the object; and step S3, when the attributes of the subject do not satisfy When the condition is checked, the subject is not allowed to access the object. In addition, the present invention also provides an access control system, an electronic device and a readable computer medium. Based on the attributes of the subject, the invention controls the access of the subject from multiple dimensions, so as to ensure the security and reliability of the access.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to an access control method, system, electronic equipment and media. Background technique [0002] In network security technology, authorization is often required for subjects to access objects. The current common authorization system is role-based access control (Role-Based Access Control, RBAC). In the RBAC system, permissions are associated with roles, and users obtain the permissions of these roles by becoming members of appropriate roles. Users can easily By tampering with one's own identity to become a role with access to an object, the security is not high. Contents of the invention [0003] (1) Technical problems to be solved [0004] Based on the above technical problems, the present invention provides an access control method, system, electronic device and medium. The access control method controls the access of the subject from multiple dimensions based o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/31G06F2221/2141
Inventor 胡良俊秦义波魏勇简明
Owner BEIJING QIANXIN TECH