Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method, device and system

A technology of access control and access strategy, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as low decision-making efficiency, and achieve the effect of improving efficiency and shortening time

Active Publication Date: 2022-02-25
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this process, the policy decision point needs to call the remote interface multiple times to obtain the required attribute information from the remote policy information point, resulting in low decision-making efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and system
  • Access control method, device and system
  • Access control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solution in this application will be described below with reference to the accompanying drawings.

[0027] As used in this application, the terms "component", "module", "system" and the like are used to denote a computer-related entity, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. By way of illustration, both an application running on a computing device and the computing device can be components. One or more components can reside within a process and / or thread of execution and a component can be localized on one computer and / or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. A component may, for examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an access control method, device, and system. The method includes: determining mapping relationship information according to a plurality of policy information, each policy information is used to indicate an access policy corresponding to at least one parameter group, and the mapping relationship The information is used to indicate the access policy corresponding to each parameter; when a first access request including multiple target parameters is received, the target access policy is determined according to the mapping relationship information, and the target access policy is related to each target parameter A corresponding access policy: performing access control on the first access request according to the target access policy. In the access control process of the present application, the attribute information does not need to be called multiple times through the remote interface, thereby improving the efficiency of access control.

Description

technical field [0001] The present application relates to the field of access control in information security, in particular to an access control method, device and system. Background technique [0002] Access control is an indispensable security mechanism in network management. It is usually used to control users' access to certain information items, such as servers, directories, files and other network resources, through predefined access control policies. With the rapid development of emerging technologies such as big data, cloud computing, and the Internet of Things, enterprise applications are integrated, and application boundaries are gradually disappearing. Traditional role-based access control (Role-Based Access Control, RBAC) no longer meets the needs of use. Attribute-Based Access Control (ABAC) emerged as a new generation of access control technology. [0003] The basic principle of ABAC technology is: according to user attributes, resource attributes, dynamicall...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/20
Inventor 颜剑何中华
Owner HUAWEI TECH CO LTD