Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Business access control method and system, electronic equipment and storage medium

A technology of business access and control methods, applied in the computer field

Pending Publication Date: 2020-07-07
SANGFOR TECH INC
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of this application is to provide a service access control method and system, an electronic device and a computer-readable storage medium, which solve the adaptation problem of various service systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business access control method and system, electronic equipment and storage medium
  • Business access control method and system, electronic equipment and storage medium
  • Business access control method and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0051] In the existing technology, access control is usually based on the application, that is, according to the characteristics of the business system, such as web applications or tunnel applications, different applications are added to the zero trust system control center, and the control center evaluates the user's trust level and communicates with the network The proxy server interacts to block or allow specified application access requests. However, in this way, it is difficult...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service access control method and a system, equipment and a medium, and the method comprises the steps: receiving a service access request initiated by a user, and determining a target service corresponding to the service access request; acquiring first access permission information of a current user for the target service by calling a first interface of the software development kit; wherein the software development kit is used for acquiring all access permission information from a zero-trust control center in advance and caching the access permission information locally; and judging whether the service access request is allowed to be responded according to the first access permission information. The invention provides a simple and universal software developmentkit. Acquiring all access authority information from a zero trust control center in advance and caching the access authority information locally; the method can be integrated with any service system,and access permission control can be carried out on various service systems, so that the adaptation problem of various service systems can be solved, independent development for different service systems is not needed, and the development cost and time are effectively saved.

Description

technical field [0001] The present application relates to the field of computer technology, and more specifically, to a service access control method and system, an electronic device, and a computer-readable storage medium. Background technique [0002] Zero trust system is a concept to prevent data leakage from an organization's trusted network, that is, always verify and never trust. In some traditional schemes that use zero-trust systems to control user permissions, access control is usually based on applications, that is, different applications are added to the zero-trust system control center according to the characteristics of the business system, such as web applications or tunnel applications. After evaluating the user's trust level, the control center interacts with the network proxy server to block or allow specified application access requests. However, in this way, it is difficult to adapt to various business systems. Taking web applications as an example, some...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/60
CPCG06F21/45G06F21/604G06F2221/2141
Inventor 黄诗智
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products