Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-strategy access control login method and device, computer equipment and storage medium

An access control and login method technology, applied in the field of cloud security, which can solve the problems of single access control, single access control function, and limited application scenarios.

Active Publication Date: 2020-10-20
PINGAN INT SMART CITY TECH CO LTD
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a multi-policy access control login method, device, computer equipment, and storage media, aiming to solve the problem that the access control policies in the prior art are all based on a single policy, such as a single role-based, or a single Based on user groups, the access control function is relatively simple, the applicable scenarios are limited, and the security of system resource data is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-strategy access control login method and device, computer equipment and storage medium
  • Multi-strategy access control login method and device, computer equipment and storage medium
  • Multi-strategy access control login method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0045] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-strategy access control login method and a device thereof, computer equipment and a storage medium, which relate to the techniques of cloud security, wherein the resource access control in a server is to select at least two from role-based access control strategies, user group-based access control strategies, rule-based access control strategies, user attribute-based access control strategies and user-based access control strategies; and the token data of the user is analyzed to obtain corresponding authority information when the user logs in later, and if the authority information corresponds to the access authority, the corresponding authority data of the to-be-accessed resource is sent to the user side. The invention also relates to a blockchain technology, which realizes multi-control strategy access, adapts to more access control scenes, and improves resource data security.

Description

technical field [0001] The present invention relates to the technical field of cloud security, in particular to a multi-strategy access control login method, device, computer equipment and storage medium. Background technique [0002] Access control refers to judging whether an authenticated user has permission to access certain specified resources. It is a basic function of the system and plays a vital role in the security of the system. [0003] Currently, the commonly used access control policies are as follows: [0004] 1. Role-based access control (RBAC for short), which is mainly based on user role attributes, determines whether a user can access a certain resource through the association between the role bound by the user and the resource; [0005] 2. Group-based access control (GBAC for short), which is mainly based on user group attributes, determines whether a user can access a certain resource through the association between the group to which the user belongs a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3213H04L9/3226H04L9/3247H04L63/0442H04L63/105H04L63/20H04L67/10
Inventor 徐小健
Owner PINGAN INT SMART CITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products