Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blacklist-based access control method, system, terminal and storage medium

An access control and blacklist technology, applied in the computer field, can solve the problems of high maintenance cost and high maintenance cost of the blacklist, and achieve the effect of reliable design principle, reduced maintenance cost and wide application prospect.

Active Publication Date: 2022-05-13
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, most blacklist systems need to be updated manually. This method requires high maintenance costs. As a result, when some users use the blacklist system for access control, such as business trips or network replacements, the blacklist needs to be updated. The maintenance cost of the blacklist is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blacklist-based access control method, system, terminal and storage medium
  • A blacklist-based access control method, system, terminal and storage medium
  • A blacklist-based access control method, system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056]In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0057] figure 1 is a schematic flowchart of a method in one embodiment of the present invention.

[0058] Such as figure 1 As shown, the method includes:

[0059] When the user logs in, record the user's IP, user name and password;

[0060] Judging whether the IP is currently prohibited from logging in: if so, prohibiting the IP from...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a blacklist-based access control method, system, terminal and storage medium, all of which include: when a user logs in, recording the user's IP, user name and password; judging whether the IP is currently prohibited from logging in: if not, then Verify whether the username and password match; if the verification does not match, count the total number of first, second and third failures; determine whether the total number of first, second and third failures reach their respective thresholds: if it is determined that the total number of first failures reaches It corresponds to the threshold and determines that at least one of the second and third total failures does not reach the corresponding threshold, then the user name is prohibited from logging in within t1; if it is determined that both the second and third total failures reach their corresponding thresholds, then determine Whether the IP is in the first-level blacklist: If it is determined that the IP is in the first-level blacklist, add the IP to the second-level blacklist; if it is determined that the IP is not in the first-level blacklist, add the IP to the first-level blacklist. The present invention is used to reduce the maintenance cost of the blacklist when performing access control.

Description

technical field [0001] The invention relates to the field of computers, in particular to a blacklist-based access control method, system, terminal and storage medium. Background technique [0002] More and more users are paying attention to access control. The access control strategy can well control the person, IP, time, etc. of the system being accessed, which can improve the security and availability of the system and reduce the risk of system being attacked. [0003] At present, most of the access control strategies used within the company use the blacklist method. However, at present, most blacklist systems need to be updated manually. This method requires high maintenance costs. As a result, when some users use the blacklist system for access control, such as business trips or network replacements, the blacklist needs to be updated. The maintenance cost of the blacklist is relatively high. [0004] Therefore, the present invention provides a blacklist-based access co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/083H04L63/101
Inventor 朱进强
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products