Access control method, system and device and computing equipment

A technology of access control and access control unit, which is applied in the field of cloud security and can solve problems such as business system security risks, low access control effectiveness, and large network security risks

Pending Publication Date: 2020-12-11
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above access control method, after confirming that the user's network location is credible, the device is allowed to enter the network. Once entering the network, the device can access internal network services through any application in the device, including some malicious codes. The ability to infiltrate the network to invade the business system, resulting in security risks in the business system
That is to say, the access control mechanism in related technologies has a relatively large network security risk, and the effectiveness of access control is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, system and device and computing equipment
  • Access control method, system and device and computing equipment
  • Access control method, system and device and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purpose, technical solutions and advantages of the application clearer, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the drawings in the embodiments of the application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the application. In the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0066] The terms "first" and "second" in the specification an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method, system and device and computing equipment, relates to the technical field of cloud, in particular to the field of cloud security in the technical fieldof cloud, and is used for improving the effectiveness of access control and reducing network security risks. The method comprises the following steps: in response to an access triggering operation, initiating a service access request through a target application process; obtaining process feature information of the target application process, wherein the process feature information is used for identifying the target application process; obtaining process authorization information corresponding to the target application process when the process feature information passes credible verification;and sending the service access request and the process authorization information to an admission gateway so as to release or intercept the service access request through the admission gateway according to an authentication result of the service access request, and authenticating the service access request through the authorization information.

Description

technical field [0001] The present application relates to the field of cloud technology, in particular to the field of cloud security technology, and in particular to an access control method, system, device and computing equipment. Background technique [0002] With the rapid development of Internet technology, access control technology, as one of the core means to ensure network information security, has been widely used in various application scenarios, such as cloud computing, cloud security and other application scenarios. [0003] Taking the access control scenario as an example, the related technologies generally adopt a zone-based credit control mechanism, that is, divide trust zones based on the network location of the user (such as IP (Internet Protocol, network mind) address), and perform access control. At this time, it is determined whether to intercept or release the user's access request by judging whether the network location of the user is credible. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04L63/10H04L63/145H04L63/1466
Inventor 蔡东赟吴岳廷
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products