Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic minimized privilege access control method and device

An access control and minimization technology, applied in the direction of instruments, character and pattern recognition, electrical components, etc.

Pending Publication Date: 2020-10-20
广州海颐信息安全技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no effective method to avoid unauthorized access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic minimized privilege access control method and device
  • Dynamic minimized privilege access control method and device
  • Dynamic minimized privilege access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0038] In the embodiments of the method and device for dynamically minimizing privileged access control of the present invention, the flow chart of the method for dynamically minimizing privileged access control is as follows: figure 1 As shown, the flow chart of the method for dynamically minimizing privileged access control is as follows figure 2 Shown. figure 1 , The method for dynamically minimizing privileged access control includes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic minimized privilege access control method and a dynamic minimized privilege access control device. The method comprises the following steps that different privilege access rules are distributed to corresponding privilege access users; after the user logs in, only the privileged account in the corresponding privileged access rule range can be seen, and only the privileged access in the privileged access rule range can be performed on the privileged account; commands or operations carried out in the privilege access process and seen data are judged whether to accord with privilege access rules or not by the dynamic permission execution module; if not, the privileged access operation of the user is intercepted, or the displayed data is shielded; and when an activity record inconsistent with the use track is generated, the privilege behavior analysis module defines the activity record as a threat, and the dynamic permission execution module judges whetherthe current privilege access operation needs to be intercepted or not according to the privilege access rule. According to the invention, related personnel can only carry out privileged access with the minimum permission matched with the personnel, and personnel unauthorized operation is effectively avoided.

Description

Technical field [0001] The invention relates to the field of privileged access security control, in particular to a method and device for dynamically minimizing privileged access control. Background technique [0002] Privileged access refers to the process of using / accessing privileged accounts with high risks (such as administrator accounts that can start and stop devices) or high value (such as application accounts that can read business sensitive data), but not all privileges All the permissions or functions of the privileged account are required for access. Major security incidents (deleted databases / data leaks) that have occurred in recent years are often due to the privilege scope of the privileged account owned by the person who needs privileged access is far greater than the privilege he needs to use, so that the person can be "legitimate" Of illegal operations. Therefore, it is particularly important to dynamically control the privileged access of related personnel wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/08H04L63/105H04L63/10G06F18/24
Inventor 邓祯恒何建豪
Owner 广州海颐信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products