Unlock instant, AI-driven research and patent intelligence for your innovation.

A security access control method and device

A security access control and access control technology, applied in the computer field, can solve the problems of low access speed and long access time, and achieve the effects of increasing control speed, shortening matching time, and shortening judgment time

Active Publication Date: 2022-07-08
北京天空卫士网络安全技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing access control method needs to match each condition to get the result of the final Boolean expression. This safe matching takes a long time, resulting in a relatively low access speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security access control method and device
  • A security access control method and device
  • A security access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054]Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding and should be considered as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted from the following description for clarity and conciseness.

[0055] figure 1 is a security access control method according to an embodiment of the present invention, such as figure 1 As shown, the security access control method may include the following steps:

[0056] Step S101: obtaining access data;

[0057] The access data may be information stored by the access server sent by the client or terminal to the server, or a website sup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security access control method and device, and relates to the technical field of computers. A specific implementation of the method includes: acquiring access data; selecting a preset ordered binary decision graph for indicating an access strategy for the access data, wherein the ordered binary decision graph includes at least one condition node, a result node And a plurality of associated links between at least one condition node and the result node, each condition node indicates a target access condition in the multiple access conditions included in the access policy; the access data is matched with at least one target access condition; according to According to the matching result, the target association link is determined from the multiple association links, and the result node pointed to by the target association link is searched; according to the result information indicated by the result node pointed to by the target association relationship, the access data is controlled. This embodiment can effectively improve the access speed.

Description

technical field [0001] The present invention relates to the field of computer technology, and in particular, to a method and device for security access control. Background technique [0002] In the Internet, there are inevitably some risky or abnormal access data, which will threaten the security of enterprise management systems, government management systems and other systems. At present, one or more sets of rules are defined for access behaviors mainly through access control policies, and the access data generated by users accessing the Internet is detected according to the rules, so as to more strictly regulate users' access behaviors. [0003] An access control policy is usually composed of one or more rules, and each rule usually includes a Boolean expression composed of multiple conditions combined with logical operators such as AND, OR, and NOT, and after each condition is satisfied (that is, the Boolean expression gives The result is true) is composed of the actions...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/10
Inventor 刘中砥赵军徐超
Owner 北京天空卫士网络安全技术有限公司