Unlock instant, AI-driven research and patent intelligence for your innovation.

Blacklist-based access control method and system, terminal and storage medium

An access control and blacklist technology, applied in the computer field, can solve the problems of high maintenance cost and high blacklist maintenance cost, and achieve the effect of reducing maintenance cost, reliable design principle and simple structure

Active Publication Date: 2021-01-08
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, most blacklist systems need to be updated manually. This method requires high maintenance costs. As a result, when some users use the blacklist system for access control, such as business trips or network replacements, the blacklist needs to be updated. The maintenance cost of the blacklist is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blacklist-based access control method and system, terminal and storage medium
  • Blacklist-based access control method and system, terminal and storage medium
  • Blacklist-based access control method and system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056]In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0057] figure 1 is a schematic flowchart of a method in one embodiment of the present invention.

[0058] Such as figure 1 As shown, the method includes:

[0059] When the user logs in, record the user's IP, user name and password;

[0060] Judging whether the IP is currently prohibited from logging in: if so, prohibiting the IP from...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a blacklist-based access control method and system, a terminal and a storage medium, and the method comprises the steps: recording an IP, a user name and a password of a user when the user logs in; judging whether the IP is forbidden to log in or not at present; if not, verifying whether a user name and a password are matched or not; if not, counting the total number of first, second and third failures; judging whether the first total failure number, the second total failure number and the third total failure number reach respective corresponding threshold values or not;if judging that the first total failure number reaches the corresponding threshold value and judging that at least one of the second total failure number and the third total failure number does not reach the corresponding threshold value, prohibiting the user name from logging in within t1; if it is judged that the second failure total number and the third failure total number both reach the respective corresponding threshold values, judging whether the IP is in a first-level blacklist or not; if it is judged that the IP is in the first-level blacklist, adding the IP into a second-level blacklist; if it is judged that the IP is not in the first-level blacklist, adding the IP into the first-level blacklist. The method and the device are used for reducing the maintenance cost of the blacklist during access control.

Description

technical field [0001] The invention relates to the field of computers, in particular to a blacklist-based access control method, system, terminal and storage medium. Background technique [0002] More and more users are paying attention to access control. The access control strategy can well control the person, IP, time, etc. of the system being accessed, which can improve the security and availability of the system and reduce the risk of system being attacked. [0003] At present, most of the access control strategies used within the company use the blacklist method. However, at present, most blacklist systems need to be updated manually. This method requires high maintenance costs. As a result, when some users use the blacklist system for access control, such as business trips or network replacements, the blacklist needs to be updated. The maintenance cost of the blacklist is relatively high. [0004] Therefore, the present invention provides a blacklist-based access co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/101
Inventor 朱进强
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD