Access control method and device, computer equipment and computer readable storage medium
A technology for access control and access equipment, applied in the field of information security, can solve problems such as unrelated, complex authority judgment, etc., and achieve the effect of reducing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Embodiment 1 of the present invention provides an access control method, which can be applied to a "zero trust" system. In this system, a trusted proxy service is set between the access object and the access subject. The access control method provided by this embodiment As an access control service, the control method judges the authority of the access request received by the trusted proxy service, and controls whether the trusted proxy service forwards the access request sent by the access subject to the access object. Through this method, the authority can be reduced. The complexity of judging, specifically, figure 1 It is a flow chart of the access control method provided by Embodiment 1 of the present invention. As shown in the figure, the access control method provided by Embodiment 1 includes the following steps S101 to S105.
[0029] Step S101: Receive an access request.
[0030] Specifically, the access request sent by the access subject first reaches the trust...
Embodiment 2
[0046] Embodiment 2 of the present invention provides a preferred access control method to judge the authority of the access request received by the trusted proxy service, and then control whether the trusted proxy service forwards the access request sent by the access subject to the access object, Part of the technical features are the same as those in the first embodiment above, and for the specific description and corresponding technical effects, please refer to the first embodiment above. Further, in the second embodiment, the security assessment model and the security assessment rules are set at the same time, and the security assessment rules are used as the trust baseline, so as to give full play to the controllability of the trust baseline and the flexibility of the analysis model, improve the accuracy of trust calculation, and reduce the risk of trust calculation. probability of misjudgment. specifically, figure 2 The flow chart of the access control method provided...
Embodiment 3
[0065] Corresponding to the above-mentioned first embodiment, the third embodiment of the present invention provides an access control device, the corresponding technical features and technical effects can be referred to above, and will not be repeated here. image 3 The block diagram of the access control device provided for Embodiment 3 of the present invention, such as image 3As shown, the device includes an access request receiving module 301 , an access entity determining module 302 , an evaluation data obtaining module 303 , a first evaluation value calculation module 304 and a second evaluation value calculation module 305 .
[0066] The access request receiving module 301 is used to receive the access request; the access entity determination module 302 is used to determine the entity layer corresponding to the access request, wherein the entity layer includes four access entities, which are respectively the access user, the access device, the access proxy service and t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com