Unlock instant, AI-driven research and patent intelligence for your innovation.

Zero-trust access control method and device and electronic equipment

A technology of access control and access control strategy, applied in the Internet field, can solve problems such as low security and frequent network attacks, and achieve the effect of increasing security

Pending Publication Date: 2021-12-10
CHINA EVERBRIGHT BANK +1
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of computer networks, the network has a high degree of openness and good programmability, which makes large-scale and flexible network authentication access possible. However, this flexible access control mechanism makes network attacks occur more frequently. , less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-trust access control method and device and electronic equipment
  • Zero-trust access control method and device and electronic equipment
  • Zero-trust access control method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Implementing any technical solution of the embodiments of the present application does not necessarily need to achieve all the above advantages at the same time.

[0041] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] In the technical solution of the embodiment of the present application, based on the set credibility measurement model, the legality of the identity of the access subject...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a zero-trust access control method and device and electronic equipment, and the method comprises the steps: carrying out the legality authentication of an identity of an access subject which initiates an access request based on a set trusted measurement model; carrying out real-time monitoring on behaviors of the access subject subjected to legality authentication, and carrying out dynamic trusted measurement according to the behaviors monitored in real time; and dynamically adjusting an access control strategy of the access subject according to a result of the dynamic trusted measurement, so the security is improved.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a zero-trust access control method, device and electronic equipment. Background technique [0002] With the development of computer networks, the network has a high degree of openness and good programmability, which makes large-scale and flexible network authentication access possible. However, this flexible access control mechanism makes network attacks occur more frequently. , which is less secure. Contents of the invention [0003] Based on the above problems, embodiments of the present application provide a zero-trust access control method, device, and electronic equipment. [0004] The embodiment of the application discloses the following technical solutions: [0005] A zero-trust access control method comprising: [0006] Based on the set trust measurement model, the identity of the access subject who initiates the access request is authenticated; [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/205
Inventor 解培张先强阮安邦魏明陈凯
Owner CHINA EVERBRIGHT BANK