Information security protection method, device, electronic equipment and storage medium

A technology for information security and protection devices, applied in computer security devices, digital data protection, platform integrity maintenance, etc., can solve problems such as easy cracking of credit granting methods, reduce the risk of cracking, improve security levels, and protect information security Effect

Pending Publication Date: 2021-04-02
BEIJING JINFENG HUINENG TECH CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the shortcomings of the existing methods, this application proposes an information security protection method, device, electronic equipment and storage medium to solve the technical problem that the credit granting method in the existing information security protection is easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security protection method, device, electronic equipment and storage medium
  • Information security protection method, device, electronic equipment and storage medium
  • Information security protection method, device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present application is described in detail below, and examples of embodiments of the present application are shown in the drawings, wherein the same or similar reference numerals denote the same or similar components or components having the same or similar functions throughout. Also, detailed descriptions of known technologies will be omitted if they are not necessary to illustrate the features of the present application. The embodiments described below by referring to the figures are exemplary only for explaining the present application, and are not construed as limiting the present application.

[0029] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meanings as commonly understood by those of ordinary skill in the art to which this application belongs. It should also be understood that terms, such as those defined in commonly used dictionaries, should be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information security protection method, a device, electronic equipment and a storage medium. The information security protection method comprises the steps of receiving the request operation information of a user; according to a verification condition in the resource pool, performing credit granting verification of at least one level on the request operation information;if the credit granting verification of each level is passed, determining that the credit granting of the request operation of the user is successful, and granting a unique security identifier to the request operation of the user; if the credit granting verification of any level is not passed, determining that the request operation of the user fails in credit granting; wherein the at least one hierarchy comprises a behavior layer, performing credit granting verification of the at least one hierarchy on the request operation information according to a verification condition in the resource pool,and the method comprises the steps of determining whether an operation behavior in the request operation information is matched with a pre-registered operation type in a database or not; if so, determining that the credit granting verification of the behavior layer is passed; and if not, determining that the credit granting verification of the behavior layer does not pass. The method is helpful for improving the security level of the system.

Description

technical field [0001] The present application relates to the technical field of information protection, and specifically, the present application relates to an information security protection method, device, electronic equipment and storage medium. Background technique [0002] In recent years, with the legal development of information technology, information security protection has become more and more important. However, the existing information security protection methods cannot protect the security of the system well. The inventors of this application found that the existing information security protection methods lack all-round protection modes. Access control usually adopts the server address + port access credit mode, and the authentication process adopts the user name + password trust mode. Cracking greatly reduces the security of the system. Contents of the invention [0003] In view of the shortcomings of the existing methods, the present application proposes a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/46G06F21/57
CPCG06F21/46G06F21/577G06F21/6218
Inventor 马晓亮
Owner BEIJING JINFENG HUINENG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products