Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Token-based application access control method and device, device and storage medium thereof

An application access and control method technology, applied in the field of security access control, can solve the problems of low efficiency, affecting the blocking performance of the gateway, unable to meet the flexible settings of application access control, etc., to achieve the effect of improving security performance and increasing access rate

Active Publication Date: 2022-07-12
北京吉大正元信息技术有限公司 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, due to the variety of applications and the popularization of the Internet, there are more and more applications-based access control strategies in the https environment, and the requirements are more diverse. Among them, the one-size-fits-all model of the iptables solution cannot satisfy different application access under the same IP address or port. Flexible control settings, especially in zero-trust application scenarios, users need to implement real-time blocking based on content through the gateway to achieve fine-grained application access control
However, in the existing technology, the user's access information is generally stored centrally in the form of a database. When implementing access control, it is necessary to reorganize and search the content, which is inefficient and indirectly affects the blocking performance of the gateway.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token-based application access control method and device, device and storage medium thereof
  • Token-based application access control method and device, device and storage medium thereof
  • Token-based application access control method and device, device and storage medium thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 This is a flowchart of a token-based application access control method provided by an embodiment of the present invention. This embodiment is applicable to a situation where a user client accesses an application. The method can be executed by a token-based application access control device, and specifically includes: Follow the steps below:

[0031] S110. Acquire a corresponding credential token value according to the user access information.

[0032] When the user client accesses the application system, the gateway detects the user access information. If it detects that there is no token value in the user access information, it forces the client to go to the authentication center. The authentication center needs to check the user information (username, password, If the authentication is passed, the authentication center sends the authenticated token value to the client. When the user client accesses the application through the gateway again, the user access ...

Embodiment 2

[0092] Figure 8 It is a schematic structural diagram of a token-based application access control device provided by an embodiment of the present invention. like Figure 8 As shown, the device includes:

[0093] a credential establishment module 510, configured to establish corresponding credential token information according to the user access information;

[0094] The credential comparison module 520 is used to compare the token information with the authenticated token value stored in the connection information structure; the connection information structure contains the authenticated token value and its connection information;

[0095] The access blocking module 530 is used to allow the user to access the application when the token value is the same as the authenticated token value, has not expired, and has corresponding access rights.

[0096] In this embodiment, when the user client accesses the application through gateway authentication, a corresponding connection inf...

Embodiment 3

[0102] Figure 9 This is a schematic structural diagram of a computer device according to an embodiment of the present invention. Figure 9 A block diagram of a computer device 312 suitable for use in implementing embodiments of the present invention is shown. Figure 9 The computer device 312 shown is only an example, and should not impose any limitations on the functionality and scope of use of the embodiments of the present invention. Device 312 is a typical computing device for token-based application access control.

[0103] like Figure 9 As shown, computer device 312 takes the form of a general-purpose computing device. Components of computer device 312 may include, but are not limited to, one or more processors 316, storage 328, and a bus 318 connecting various system components including storage 328 and processor 316.

[0104] The bus 318 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a gra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a token-based application access control method and device, equipment and storage medium thereof, wherein the token-based application access control method comprises: obtaining a corresponding credential token value according to user access information; connecting the token value with a connection Compare the authenticated token values ​​stored in the information structure; the connection information structure stores authenticated token information; the authenticated token information includes the authenticated token value; if the token value is the same as the authenticated token value , not expired, and have the appropriate access permissions to allow the user to access the app. The technical scheme provided by the present invention can improve the speed of the user accessing the application.

Description

technical field [0001] The present invention relates to the technical field of security access control, in particular to a token-based application access control method and device, equipment and storage medium thereof. Background technique [0002] At present, due to the variety of applications and the popularity of the network, there are more and more applications based on access control policies in the https environment, and the requirements are more diverse. Among them, the one-size-fits-all model of the iptables solution cannot meet the access of different applications under the same IP address or port. Flexible settings of control, especially in zero-trust application scenarios, users need to implement real-time blocking according to content through the gateway to achieve the purpose of fine-grained application access control. However, in the prior art, user access information is generally stored centrally in the form of a database. When implementing access control, con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33H04L9/40
CPCG06F21/33H04L63/10H04L63/108H04L63/0807G06F2221/2141
Inventor 雅志业王毅史志伟
Owner 北京吉大正元信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products