Access control method, system and device and access behavior identification method, system and device and storage medium

A technology for access control and monitoring equipment, applied in the field of data security, can solve problems such as inflexibility, rigid access control methods, and poor access control effects, and achieve reasonable access control effects.

Active Publication Date: 2020-05-29
ALIBABA GRP HLDG LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this access control method is relatively rigid and not flexible enough, resulting in ineffective access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, system and device and access behavior identification method, system and device and storage medium
  • Access control method, system and device and access behavior identification method, system and device and storage medium
  • Access control method, system and device and access behavior identification method, system and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the objectives, technical solutions and advantages of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the specific embodiments of the present application and the corresponding drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0056]In the prior art, the access control method based on data resources is relatively rigid, not flexible enough, and has poor access control effect. In some embodiments of the present application, the access behavior that has occurred in the life cycle of the target data is carried in its corresponding access reference information, and when ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an access control method, system and device, an access behavior recognition method, system and device, and a storage medium, and the access control method comprises the steps: receiving an authority obtaining request generated by a current application program when the current application program requests to access target data; obtaining access behavior information of at least one previous application program to the target data from the access reference information corresponding to the target data; adjusting the access permission of the current application program to the target data according to the access behavior information of the at least one previous application program to the target data; and controlling the access of the current application program to the target data according to the adjusted access permission. In the embodiment, when access control is carried out on the target data, data change details in a full link used by the target data are comprehensively considered, and the access permission of the application program can be dynamically adjusted according to the data change details, so that the access control on the target datais more reasonable and more flexible.

Description

technical field [0001] The present application relates to the technical field of data security, and in particular, to a method, system, device, and storage medium for access control and access behavior identification, and a method, device, and storage medium for data processing. Background technique [0002] Currently, in the field of data security, different applications are usually configured with access rights to different data resources, and each application can only access data in the data resources to which it has access rights. In this way, when an application program initiates an access request to a certain data, it can be judged whether the application program has access rights to the data according to the data resource where the data is located and the data resources accessible to the application program, so as to ensure the data security. [0003] However, this access control method is relatively rigid and inflexible, resulting in poor access control effect. SU...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604
Inventor 吴晓昕
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products