Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Token-based application access control method and device, equipment and storage medium

A technology of application access and control methods, applied in the field of security access control, can solve problems such as low efficiency, affecting gateway blocking performance, and inability to meet the flexible setting of application access control, so as to achieve the effect of increasing access rate and improving security performance

Active Publication Date: 2021-12-24
北京吉大正元信息技术有限公司 +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, due to the variety of applications and the popularization of the Internet, there are more and more applications-based access control strategies in the https environment, and the requirements are more diverse. Among them, the one-size-fits-all model of the iptables solution cannot satisfy different application access under the same IP address or port. Flexible control settings, especially in zero-trust application scenarios, users need to implement real-time blocking based on content through the gateway to achieve fine-grained application access control
However, in the existing technology, the user's access information is generally stored centrally in the form of a database. When implementing access control, it is necessary to reorganize and search the content, which is inefficient and indirectly affects the blocking performance of the gateway.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token-based application access control method and device, equipment and storage medium
  • Token-based application access control method and device, equipment and storage medium
  • Token-based application access control method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a flow chart of a token-based application access control method provided by the embodiment of the present invention. This embodiment is applicable to the situation where a user client accesses an application, and the method can be executed by a token-based application access control device, specifically including Follow the steps below:

[0031] S110. Obtain a corresponding credential token value according to the user access information.

[0032] When the user client accesses the application system, the gateway detects the user access information. If it detects that there is no token value in the user access information, it will force the client to transfer to the authentication center, which needs to verify the user information (username, password, ID, etc.) for authentication, and if the authentication passes, the authentication center sends the authenticated token value to the client. When the user client accesses the application through the gateway ...

Embodiment 2

[0092] Figure 8 It is a schematic structural diagram of a token-based application access control device provided by an embodiment of the present invention. Such as Figure 8 As shown, the device includes:

[0093] A credential building module 510, configured to set up corresponding credential token information according to user access information;

[0094] The credential comparison module 520 is used to compare the token information with the authenticated token value stored in the connection information structure; the connection information structure includes the authenticated token value and its connection information;

[0095] The access blocking module 530 is configured to allow the user to access the application when the value of the token is the same as that of the authenticated token, has not expired, and has corresponding access rights.

[0096] In this embodiment, when the user client accesses the application through gateway authentication, a corresponding connect...

Embodiment 3

[0102] Figure 9 It is a schematic structural diagram of a computer device provided by an embodiment of the present invention. Figure 9 A block diagram of a computer device 312 suitable for implementing embodiments of the invention is shown. Figure 9 The computer device 312 shown is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present invention. Device 312 is a typical computing device for token-based application access control.

[0103] Such as Figure 9 As shown, computer device 312 takes the form of a general-purpose computing device. Components of computer device 312 may include, but are not limited to: one or more processors 316, storage 328, bus 318 connecting various system components including storage 328 and processor 316.

[0104] Bus 318 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a token-based application access control method and device, equipment and a storage medium. The method comprises the following steps: acquiring a corresponding credential token value according to user access information; comparing the token value with an authenticated token value stored in a connection information structure body; wherein the connection information structural body stores authenticated token information, and the authenticated token information comprises an authenticated token value; and if the token value is the same as the authenticated token value, the token value is not expired and has the corresponding access authority, allowing the user to access the application. According to the technical scheme provided by the invention, the rate of accessing the application by the user is improved.

Description

technical field [0001] The present invention relates to the technical field of security access control, in particular to a token-based application access control method and its device, equipment, and storage medium. Background technique [0002] At present, due to the variety of applications and the popularization of the Internet, there are more and more applications-based access control strategies in the https environment, and the requirements are more diverse. Among them, the one-size-fits-all model of the iptables solution cannot satisfy different application access under the same IP address or port. Flexible control settings, especially in zero-trust application scenarios, users need to implement real-time blocking based on content through the gateway, so as to achieve the purpose of fine-grained application access control. However, in the prior art, user access information is generally stored centrally in the form of a database. When access control is implemented, conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33H04L29/06
CPCG06F21/33H04L63/10H04L63/108H04L63/0807G06F2221/2141
Inventor 雅志业王毅史志伟
Owner 北京吉大正元信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products