Zero-trust access control method and device and electronic equipment
A technology of access control and access control strategy, applied in the Internet field, can solve problems such as low security and frequent network attacks, and achieve the effect of increasing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Implementing any technical solution of the embodiments of the present application does not necessarily need to achieve all the above advantages at the same time.
[0041] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0042] In the technical solution of the embodiment of the present application, based on the set credibility measurement model, the legality of the identity of the access subject...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


