Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and device, computer equipment and storage medium

An access control and access-to-access technology, applied in the field of network communication, can solve the problems of time-consuming increase, cost increase, consumption of large network overhead, authentication service machine overhead, etc., to achieve the effect of improving efficiency and security

Active Publication Date: 2020-08-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF11 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing access control methods usually use centralized decryption credentials and centralized authentication services to control access, which not only consumes a lot of network overhead and authentication service machine overhead, but also makes The cost of multiple remote calls increases and the time-consuming increases
[0004] Therefore, the current access control method has the problem of low control efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device, computer equipment and storage medium
  • Access control method and device, computer equipment and storage medium
  • Access control method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0053] First of all, it should be explained that the access control method provided by this application mainly involves cloud technology (Cloud technology), which refers to the unification of hardware, software, network and other series resources in a wide area network or local area network to realize data calculation and storage. , processing and sharing is a hosted technology. Similarly, this technology is a general term for network technology, information technology, integration technology, management platform technology, application technology, etc. based on cloud comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control method and device, computer equipment and a storage medium. The method comprises the following steps: receiving a service access request of a terminal; obtaining a to-be-accessed resource node of the service access request; based on an authority rule corresponding to the resource node, obtaining information corresponding to the authority rule in the service access request as context attribute information of the service access request; and releasing or intercepting the service access request according to an authentication result obtained by authenticating the context attribute information and the authority rule. The security of access control can be effectively improved, and the efficiency of access control is further improved.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to an access control method, device, computer equipment and storage medium. Background technique [0002] With the rapid development of Internet technology, access control technology, as one of the core means to ensure network information security, has been widely used in various application scenarios, such as cloud computing, mobile computing and other application scenarios. [0003] However, the existing access control methods usually use centralized decryption credentials and centralized authentication services to control access, which not only consumes a lot of network overhead and authentication service machine overhead, but also makes The cost of multiple remote calls increases and the time consumption increases. [0004] Therefore, the current access control method has the problem of low control efficiency. Contents of the invention [0005] Based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F16/953
CPCG06F21/604G06F16/953
Inventor 刘嘉俊
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products