Zero-trust data storage access method and system

A data storage and access method technology, applied in the field of data processing, can solve problems such as the inability to guarantee data access security

Active Publication Date: 2020-12-18
南京云信达科技有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a zero-trust data storage access method and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-trust data storage access method and system
  • Zero-trust data storage access method and system
  • Zero-trust data storage access method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0025] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a zero-trust data storage access method and system, and relates to the technical field of data processing. The method comprises the following steps that: a client initiates an online request authorization authentication to an authorization server; after receiving the online request authorization authentication, the authorization server performs authorization authentication on the online request authorization authentication; after the authorization authentication succeeds, the authorization server generates corresponding authorization information and sends an access strategy to the client, so that the client sends an access message to a gateway server according to the access strategy; and the gateway server receives the authorization information and performs access management on the access message according to the authorization information. According to the method, through safety design of a zero-trust storage scheme, a conventional storage safety protection meansis broken through, and all types of accessible data storage is not limited to block storage, file storage and object storage.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a zero-trust data storage access method and system. Background technique [0002] With the development of network security, the popularization of the zero-trust network framework concept led by large foreign enterprises in recent years, and the formulation of general protocols have provided a new perspective on cloud border access security. With the general trend that a large number of enterprise services will be connected to the public cloud in the future, because of its centralized management, relatively low cost advantages, flexible deployment, and easy expansion, etc. are the advantages of service cloudification, and then for enterprises The most important thing is the impact on the security of your own business after the service is cloudified. The most important security here is access security and data security. The zero trust model provides a very good conc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 赵熙
Owner 南京云信达科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products