Check patentability & draft patents in minutes with Patsnap Eureka AI!

An access control system, access control method and related device

A technology for access control and node control, applied in the field of network security, can solve the problems of high investment and operation costs, lack of implementability, waste of security resources, etc., achieve low operation and maintenance costs, improve ease of use and utilization, and improve The effect of utilization

Active Publication Date: 2022-03-29
NEW H3C SECURITY TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the user security access protection requirements of cloud security, a zero-trust system should be deployed for each tenant's virtual private cloud (Virtual Private Cloud, VPC), and if a set of zero-trust security protection system is deployed for each VPC, its The investment and operating costs will be very high, and there is also a large waste of security resources; in addition, when there are a large number of VPCs, it is not feasible to deploy a zero-trust system for each VPC

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control system, access control method and related device
  • An access control system, access control method and related device
  • An access control system, access control method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application.

[0052]The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein refers to and includes any and all...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an access control system, access control method and related devices. The method includes receiving a user's service access permission request; generating an authentication page according to the service access permission request and setting the authentication uniform resource locator of the authentication page The URL is sent to the policy center, and the URL includes the cloud identifier of the virtualized private cloud provided by the virtual trusted control node; the service access request sent by the user is received, and the service access request carries the identity Token and service information of the requested service; sending an authentication request to the policy center, the authentication request carrying the identity token, the service information and the cloud identification; receiving the policy center According to the feedback authentication result, the service access request is controlled according to the authentication result. In this way, the purpose of VPC security protection and low maintenance cost is achieved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an access control system, an access control method and related devices. Background technique [0002] With the gradual implementation of the zero-trust protection system, the use of the zero-trust security protection system for protection of application business user access control has become more and more respected. In the user security access protection requirements of cloud security, a zero-trust system should be deployed for each tenant's virtual private cloud (Virtual Private Cloud, VPC), and if a set of zero-trust security protection system is deployed for each VPC, its The investment and operating costs will be very high, and there is also a large waste of security resources; in addition, when there are a large number of VPCs, it is not feasible to deploy a zero-trust system for each VPC. [0003] Therefore, how to deploy security protection for VPC and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0218H04L63/0236H04L63/0807
Inventor 岳炳词
Owner NEW H3C SECURITY TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More