Method and system for controlling access permission
A technology of access rights and controllers, applied in the field of network security, can solve problems such as business services being attacked, and achieve the effect of avoiding attacks and illegal access
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] An embodiment of the present invention provides a method for controlling access rights, and the method is specifically applied to such as figure 1 The controller in the shown SDP framework, wherein, the SDP framework includes: a connection initiating host, a controller and a connection accepting host, wherein the controller is used to perform security authentication on the connection initiating host and the connection accepting host, and the connection The initiating host accesses the connection accepting host after being authenticated by the controller; figure 2 An optional schematic flowchart of the method for controlling access rights provided by Embodiment 1 of the present invention, as shown in figure 2 As shown, the method specifically includes the following steps:
[0060] Step S201: Receive an identity verification request sent by a connection initiating host in an SDP frame; wherein, the identity verification request includes: identity information of the con...
Embodiment 2
[0095] An embodiment of the present invention provides a method for controlling access rights, and the method is specifically applied to such as figure 1 The connection initiating host in the SDP frame shown, wherein, the SDP frame includes: a connection initiating host, a controller, and a connection accepting host; image 3 An optional schematic flowchart of the method for controlling access rights provided in Embodiment 2 of the present invention, as shown in image 3 As shown, the method specifically includes the following steps:
[0096] Step 301: Send an identity verification request containing the identity information of the connection initiating host to the controller in the SDP framework, so that the controller can obtain risk information corresponding to the identity information through a third-party environmental risk awareness platform , and perform identity verification on the connection initiating host according to the risk information.
[0097] Preferably, the...
Embodiment 3
[0110] An embodiment of the present invention provides a method for controlling access rights, and the method is specifically applied to such as figure 1 The connection accepting host in the shown SDP frame, wherein, the SDP frame includes: a connection initiating host, a controller, and a connection accepting host; Figure 4 An optional schematic flowchart of the method for controlling access rights provided in Embodiment 2 of the present invention, as shown in Figure 4 As shown, the method specifically includes the following steps:
[0111] Step S401: Receive the SPA authorization package containing the dynamic password sent by the connection initiating host in the SDP frame according to the connection accepting host list; wherein, the dynamic password is generated according to the key algorithm pair within the validity period.
[0112] Wherein, before receiving the SPA authorization packet containing the dynamic password sent by the connection initiating host in the SDP f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


