Resource access method and device, computing equipment and storage medium

A resource access and resource access technology, applied in the fields of computing equipment, storage media, devices, and resource access methods, can solve problems such as malicious attacks and affect user access speed, and achieve the effects of improving work performance and reducing authentication time.

Active Publication Date: 2019-09-03
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF15 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of information technology, users can access many resource systems through the Internet, such as video servers, music servers, cloud storage servers, etc., to obtain more and more At the same time, for many resource systems, there are threats of malicious attacks from illegal users or malicious users. Therefore, in order to protec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method and device, computing equipment and storage medium
  • Resource access method and device, computing equipment and storage medium
  • Resource access method and device, computing equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0046] In order to be concise and intuitive in description, the solution of the present invention will be explained by describing several representative embodiments below. A large number of details in the examples are only used to help understand the solutions of the present invention. However, it is obvious that the implementation of the technical solution of the present invention may not be limited to these details. In order to avoid unnecess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a resource access method, and the method comprises the steps: receiving an access request sent by a client, the access request carrying the information of an access user, the information of access resources, and the information of an access operation; when it is determined that the number of the authorization strategies of the access user reaches a preset threshold value according to the information of the access user, searching for an authorization strategy set corresponding to the information of the access resource; authenticating the access user according to the searched authorization strategy set, the information of the access user, the information of the access resource and the information of the access operation; and when the access user passes the authentication, executing the access operation on the access resource according to the access request.

Description

technical field [0001] The present application relates to the field of information technology, and in particular to a resource access method, device, computing device and storage medium. Background technique [0002] With the development of information technology, users can access many resource systems through the Internet, such as video servers, music servers, cloud storage servers, etc., to obtain more and more information they want. At the same time, for many resource systems Therefore, in order to protect the security of the resource system, it is necessary to authenticate users accessing the resource system to ensure that users without authorization cannot access the corresponding resources. , but for a resource system with a large number of resources, it will inevitably affect the user's access rate, so how to reduce this impact is the key to solving the above problems. Contents of the invention [0003] This application proposes the following technical solutions, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6218G06F2221/2141
Inventor 袁哲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products