Supercharge Your Innovation With Domain-Expert AI Agents!

Intelligent optimization system and method for access control strategy

An access control strategy, intelligent optimization technology, applied in the fields of instruments, electrical digital data processing, digital data protection, etc., can solve problems such as performance degradation, and achieve the effect of solving extensive, improving efficiency and refinement level

Active Publication Date: 2021-07-16
北京中启赛博科技有限公司
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides an access control policy intelligent optimization system and method to solve the technical problem that the traditional computer network border protection system gradually expands over time and its performance gradually declines.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent optimization system and method for access control strategy
  • Intelligent optimization system and method for access control strategy
  • Intelligent optimization system and method for access control strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with specific embodiments of the present invention and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] The technical solutions provided by various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0034] An embodiment of the present invention provides an access control policy intelligent optimization system, which is characterized in that it includes a data acquisition module, a real-time ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent optimization system and method for an access control strategy, and belongs to the technical field of network boundary protection systems. The system comprises a data collection module which receives session information, logs and messages from equipment; a real-time distributed data processing module which analyzes the data in real time and calculates attributes of the analyzed data to form feature parameters; a feature processing module which calculates and processes the access control strategy information according to the feature parameters; and an alarm module which performs optimization prompt and alarm on the efficiency of the access control strategy. According to the system, the efficiency and accuracy of the access control strategy can be improved.

Description

technical field [0001] The invention relates to the technical field of network border protection systems, in particular to an access control strategy intelligent optimization system and method. Background technique [0002] The access control strategy is a networked method of authority control for subjects and objects, which can be used to control the connection relationship and access authorization between subjects and objects in the network. Precise control and authorization are the original intention and purpose of the formulation of access control policies, and are an important method to prevent illegal subjects from accessing objects beyond authorization. [0003] In the case of fewer informatized object resources, managers can manually check one by one to ensure the legitimacy of access to object permissions. However, as the number of subject-object resources increases, the connection relationship between subject and object will inevitably change over time. Gradually ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F2221/2141
Inventor 冉剑辉陈汝军
Owner 北京中启赛博科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More