Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Object access strategy configuration method and device

An object access and policy technology, applied in the computer field, can solve the problem of low efficiency of object access policy configuration

Pending Publication Date: 2020-11-06
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present application provides a method and device for configuring an object access strategy, so as to at least solve the technical problem of low configuration efficiency of an object access strategy in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object access strategy configuration method and device
  • Object access strategy configuration method and device
  • Object access strategy configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0052] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an object access strategy configuration method and device. The method comprises the following steps: sending a strategy acquisition instruction to the first terminal, whereinthe strategy obtaining instruction is used for indicating the first terminal to obtain a target control strategy from the trusted management server, wherein the target control strategy is used for indicating a control operation performed on a behavior of accessing the target object, the target control strategy is generated through a first strategy learning process executed on the second terminal,and the first strategy learning process is a process of learning a first access log of the target object on the second terminal; under the condition that a strategy obtaining request sent by the firstterminal is received, sending a target control strategy to the first terminal in response to the strategy obtaining request; and receiving strategy effective information sent by the first terminal, the strategy effective information being used for indicating that the target control strategy is confirmed to be effective on the first terminal. According to the application, the technical problem that the configuration efficiency of the object access strategy is relatively low in related technologies is solved.

Description

technical field [0001] The present application relates to the field of computers, in particular to a method and device for configuring an object access policy. Background technique [0002] In the field of trusted computing, the trusted management server configures control policies for each terminal to control the access operations of objects on the terminal. In the current configuration method, the trusted management server selects configuration content item by item for different terminals and configures them for each terminal, which has low configuration efficiency. [0003] For the above problems, no effective solution has been proposed yet. Contents of the invention [0004] The present application provides a method and device for configuring an object access policy, so as to at least solve the technical problem of low configuration efficiency of an object access policy in the related art. [0005] According to an aspect of an embodiment of the present application, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/11G06F21/62G06F21/64H04L29/08
CPCG06F16/122G06F21/6227G06F21/64H04L67/06
Inventor 孙瑜何成成王伟夏攀王大海谢恩泽
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products