Token-based application access control method and device, device and storage medium thereof
An application access and control method technology, applied in the field of security access control, can solve the problems of low efficiency, affecting the blocking performance of the gateway, unable to meet the flexible settings of application access control, etc., to achieve the effect of improving security performance and increasing access rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] figure 1 This is a flowchart of a token-based application access control method provided by an embodiment of the present invention. This embodiment is applicable to a situation where a user client accesses an application. The method can be executed by a token-based application access control device, and specifically includes: Follow the steps below:
[0031] S110. Acquire a corresponding credential token value according to the user access information.
[0032] When the user client accesses the application system, the gateway detects the user access information. If it detects that there is no token value in the user access information, it forces the client to go to the authentication center. The authentication center needs to check the user information (username, password, If the authentication is passed, the authentication center sends the authenticated token value to the client. When the user client accesses the application through the gateway again, the user access ...
Embodiment 2
[0092] Figure 8 It is a schematic structural diagram of a token-based application access control device provided by an embodiment of the present invention. like Figure 8 As shown, the device includes:
[0093] a credential establishment module 510, configured to establish corresponding credential token information according to the user access information;
[0094] The credential comparison module 520 is used to compare the token information with the authenticated token value stored in the connection information structure; the connection information structure contains the authenticated token value and its connection information;
[0095] The access blocking module 530 is used to allow the user to access the application when the token value is the same as the authenticated token value, has not expired, and has corresponding access rights.
[0096] In this embodiment, when the user client accesses the application through gateway authentication, a corresponding connection inf...
Embodiment 3
[0102] Figure 9 This is a schematic structural diagram of a computer device according to an embodiment of the present invention. Figure 9 A block diagram of a computer device 312 suitable for use in implementing embodiments of the present invention is shown. Figure 9 The computer device 312 shown is only an example, and should not impose any limitations on the functionality and scope of use of the embodiments of the present invention. Device 312 is a typical computing device for token-based application access control.
[0103] like Figure 9 As shown, computer device 312 takes the form of a general-purpose computing device. Components of computer device 312 may include, but are not limited to, one or more processors 316, storage 328, and a bus 318 connecting various system components including storage 328 and processor 316.
[0104] The bus 318 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a gra...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com