Access control method, electronic equipment and storage medium

A technology of access control and access control strategy, which is applied in the field of communication, can solve the problems of complex access control process and low access control efficiency of edge computing, and achieve the effect of improving access control efficiency and simplifying the access control process

Active Publication Date: 2021-01-19
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the related edge computing access control method has the following problems: before providing the requested service for the client, the key pair needs to be negotiated multiple times; The control process is complex and the access control efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, electronic equipment and storage medium
  • Access control method, electronic equipment and storage medium
  • Access control method, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0024] The first embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the field of communication, and discloses an access control method, electronic equipment and a storage medium. The access control method comprises the following steps: acquiring second region information, wherein the second region information comprises each management node in the second region and information of each user accessing each management node inthe second region; generating an access control strategy of each user; and issuing an access control strategy to each management node in the second area, so that each management node in the second area performs access control according to the access control strategy corresponding to the user initiating the access request inquired in the access control strategy of each user. The access control method provided by the embodiment of the invention can simplify the access control process and improve the access control efficiency.

Description

technical field [0001] The embodiments of the present invention relate to the communication field, and in particular, to an access control method, electronic equipment, and a storage medium. Background technique [0002] Edge computing refers to an open platform that integrates network, computing, storage, and application core capabilities on the side close to the source of objects or data, and provides computing resources nearby. The number of edge clusters is large and the distribution is scattered. These characteristics make the cluster devices at the edge end vulnerable to attacks and difficult to manage resources. [0003] Related edge computing access control methods use secret keys for access control, requiring the server and client to send requests multiple times to negotiate a secret key pair. When using it, the secret key pairing is performed first. After the matching is successful, the server processes the access request for the client. Among them, the client's a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0807H04L63/20H04L63/10H04L9/3213
Inventor 王犇徐佳棋梁露文廖德甫
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products