Token-based application access control method and device, equipment and storage medium
A technology of application access and control methods, applied in the field of security access control, can solve problems such as low efficiency, affecting gateway blocking performance, and inability to meet the flexible setting of application access control, so as to achieve the effect of increasing access rate and improving security performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] figure 1 It is a flow chart of a token-based application access control method provided by the embodiment of the present invention. This embodiment is applicable to the situation where a user client accesses an application, and the method can be executed by a token-based application access control device, specifically including Follow the steps below:
[0031] S110. Obtain a corresponding credential token value according to the user access information.
[0032] When the user client accesses the application system, the gateway detects the user access information. If it detects that there is no token value in the user access information, it will force the client to transfer to the authentication center, which needs to verify the user information (username, password, ID, etc.) for authentication, and if the authentication passes, the authentication center sends the authenticated token value to the client. When the user client accesses the application through the gateway ...
Embodiment 2
[0092] Figure 8 It is a schematic structural diagram of a token-based application access control device provided by an embodiment of the present invention. Such as Figure 8 As shown, the device includes:
[0093] A credential building module 510, configured to set up corresponding credential token information according to user access information;
[0094] The credential comparison module 520 is used to compare the token information with the authenticated token value stored in the connection information structure; the connection information structure includes the authenticated token value and its connection information;
[0095] The access blocking module 530 is configured to allow the user to access the application when the value of the token is the same as that of the authenticated token, has not expired, and has corresponding access rights.
[0096] In this embodiment, when the user client accesses the application through gateway authentication, a corresponding connect...
Embodiment 3
[0102] Figure 9 It is a schematic structural diagram of a computer device provided by an embodiment of the present invention. Figure 9 A block diagram of a computer device 312 suitable for implementing embodiments of the invention is shown. Figure 9 The computer device 312 shown is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present invention. Device 312 is a typical computing device for token-based application access control.
[0103] Such as Figure 9 As shown, computer device 312 takes the form of a general-purpose computing device. Components of computer device 312 may include, but are not limited to: one or more processors 316, storage 328, bus 318 connecting various system components including storage 328 and processor 316.
[0104] Bus 318 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a pro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com