Unlock instant, AI-driven research and patent intelligence for your innovation.

Resource access method, permission verification method, information processing method, equipment and storage medium

A resource access and permission technology, applied in the field of data processing, can solve the problems of high cost and long time.

Pending Publication Date: 2021-11-12
ALIBABA GRP HLDG LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the authority control relationship is changed, the system needs to be redeveloped, which takes a long time and costs a lot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method, permission verification method, information processing method, equipment and storage medium
  • Resource access method, permission verification method, information processing method, equipment and storage medium
  • Resource access method, permission verification method, information processing method, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0054] The current authority control products only provide static authority binding and control functions. Developers need to connect authority control products during the system development stage, and statically bind resources that require authority control with authority points. After the system is running, This authority control relationship is det...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a resource access method, a permission verification method, an information processing method, equipment and a storage medium. In some embodiments of the invention, after a user initiates an access request for a target resource, docking party equipment firstly intercepts the access request, and determines whether the target resource is bound with an authority point in existing resource authority data; when it is determined that the target resource is bound with the permission, a permission verification request is sent to the permission management and control equipment to verify whether the user has the use right of the permission point, and after the permission management and control equipment verifies that the user has the use right of the permission point, the docking party equipment can allow the access request to access the target resource; and data interaction is performed between the docking party equipment and the permission management and control equipment. The permission management and control method for locally determining the posterior permission of the resource permission data is provided.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular to a method, device, and storage medium for resource access, authority verification, and information processing. Background technique [0002] Permission management generally refers to that according to the security rules or security policies of the system equipment, users can access and only access the resources they are authorized to, no more, no less. For example, after setting permissions for an API (Application Programming Interface, application programming interface), only authorized users can have access to the API. [0003] At present, in the system development stage, it is necessary to statically bind the resources controlled by the authority to the authority point. After the system is running, the authority management and control relationship is determined. If the authority control relationship is changed, the system needs to be redeveloped, which ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/604
Inventor 夏雷
Owner ALIBABA GRP HLDG LTD