Access request authentication method, apparatus and device, and readable storage medium

An access request and authentication technology, which is applied in the field of data security, can solve problems such as long permission verification links, long system response time, and low performance, and achieve the effects of improving efficiency, improving response performance, and improving adaptability

Pending Publication Date: 2021-04-13
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although this method realizes the query of resource information, due to the long permission verification link, the system response time is long, resulting in relatively low performance. load

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request authentication method, apparatus and device, and readable storage medium
  • Access request authentication method, apparatus and device, and readable storage medium
  • Access request authentication method, apparatus and device, and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0028] The flow charts shown in the drawings are just illustrations, and do not necessarily include all contents and operations / steps, nor must they be performed in the order described. For example, some operations / steps can be decomposed, combined or partly combined, so the actual order of execution may be changed according to the actual situation.

[0029] It should be understood that the terms used in the specification of this application are for the purpose of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of data security and discloses an access request authentication method. The method comprises the following steps of receiving an access request, and identifying the identity information contained in the access request; querying in a service cache according to the identity information, and determining whether to perform access authentication currently; if it is determined that access authentication is performed currently, determining a user identifier according to the identity information so as to perform query in a hotspot list according to the user identifier; when it is determined that the hotspot list does not contain the resource identifier corresponding to the user identifier, obtaining a standard resource identifier corresponding to the access request according to the identity information; and determining whether to respond to the access request or not according to the standard resource identifier. The invention further provides a device, computer equipment and a storage medium. The method is advantaged in that high efficiency of resource access is effectively improved, and response performance of the system is also improved.

Description

technical field [0001] The present application relates to the technical field of data security, and in particular to an access request authentication method, an access request authentication device, computer equipment, and a computer-readable storage medium. Background technique [0002] In order to ensure system security and prevent user-level unauthorized operations, ACL (Access Control List, Access Control List) permission control is usually used as a general solution used by the system, which is an indispensable function. When a user accesses system functions, different users have different operation permissions. For the resources visible to the user, the user has the corresponding operation permission, but for the resources invisible to the user, the user cannot perform corresponding operations, such as query , delete and add etc. [0003] In the existing ACL permission control link, three elements are generally involved: users, roles, and resources. Then, by construct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/31G06F21/604G06F2221/2141
Inventor 靳向峰
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products