Access control method, equipment and system and storage medium

A technology of access control and computing equipment, applied in the field of data security, can solve the problems of inaccurate access control effects and inflexible access control methods, and achieve the effect of flexible access control

Active Publication Date: 2020-03-24
ALIBABA GRP HLDG LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing access control method is not flexible enough, and the effect of access control is not precise enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, equipment and system and storage medium
  • Access control method, equipment and system and storage medium
  • Access control method, equipment and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0054]In the prior art, access control is only performed on the access rights of storage resources in the target computing device according to each access role, which is not flexible enough and the effect of access control is not precise enough. In order to solve the defects existing in the prior art, in some embodiments of the present application: by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an access control method, equipment and system and a storage medium. A configuration server in the system is used for determining a file type to which each file of a data party in a business system belongs, and generating authentication information for each file aiming at different access roles according to access permissions of different access roles underthe file type to which each file belongs, outputting the authentication information of each file for different access roles to a service system; the service system is used for receiving a file accessrequest of a user, the file access request is used for requesting to access a target file, and carrying authentication information corresponding to the target file acquired according to an access role of the user in the authentication request and sending to the authentication server; and the authentication server is used for generating an authentication result according to the authentication information corresponding to the target file and sending the authentication result to the service system, so that the service system processes the file access request according to the authentication result. Therefore, more flexible and more accurate access control can be realized.

Description

technical field [0001] The present application relates to the technical field of data security, and in particular to an access control method, device, system and storage medium. Background technique [0002] In the field of data security, when a user initiates an access request to a file in a target computing device, access control usually needs to be performed on the user's access request to avoid data leakage. [0003] In the existing access control method, the data party usually pre-configures the access rights of each access role to the storage resources in the target computing device. For example, for the OSS target computing device, the data party can pre-configure each access role to be able to access Which bucket (bucket) resource, or which object (object) in which bucket each access role can access. Accordingly, when a user initiates an access request to a file, it can be verified whether the user's access role has access rights, thereby implementing access control...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 刘敬良
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products