Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and device, medium and equipment

An access control and pending access technology, which is applied in the field of network security, can solve the problems of poor security of the sub-systems to be accessed, and achieve the effect of reducing illegal access, avoiding system burden, and improving security

Pending Publication Date: 2020-12-04
NSFOCUS INFORMATION TECHNOLOGY CO LTD +2
View PDF13 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides an access control method, device, medium and equipment, which are used to solve the problem of poor security of the subsystem to be accessed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device, medium and equipment
  • Access control method and device, medium and equipment
  • Access control method and device, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] It should be noted that the "multiple or several" mentioned herein refers to two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. The character " / " generally indicates that the contextual objects are an "or" relationship.

[0041]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control method and device, a medium and equipment. According to the scheme provided by the embodiment of the invention, the special access control subsystem is addedbetween the service access subsystem and the to-be-accessed subsystem to dynamically generate the authentication information for the access between the service access subsystem and the to-be-accessedsubsystem. An access request sent by the service access subsystem to the to-be-accessed subsystem carries a system identifier and latest authentication information, and the to-be-accessed subsystem accesses the to-be-accessed subsystem according to the system identifier and the authentication information carried in the access request. Dual authentication of system identification and authentication information is carried out on the service access subsystem, so that the security of the to-be-accessed subsystem is effectively improved, and illegal access is reduced. And the newly added access control subsystem is used for dynamically generating the authentication information, so that the increase of system burdens of the service access subsystem and the to-be-accessed subsystem can be avoided, and the smooth operation of service access is ensured.

Description

technical field [0001] The present invention relates to the field of network security, in particular to an access control method, device, medium and equipment. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] Under various computer operating system platforms, the business access subsystem can conduct business access to the subsystems to be accessed (such as various databases) that provide services (such as file or data storage services) to obtain required services. [0004] In order to ensure the security of the subsystem to be accessed, the subsystem to be accessed can generate authentication information (such as account name and password) for the business access subsystem, and the business access subsystem can access the subsystem to be accessed according to the authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45
Inventor 谭皇樊宇苗宇何坤叶晓虎
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD