Security protection method, device and equipment and computer readable storage medium
A security protection and equipment technology, applied in the field of network information security, to achieve the effect of improving flexibility, avoiding protection redundancy, and reducing the risk of illegal operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0066] Further, based on the first embodiment of the security protection method of the present invention, a second embodiment of the security protection method of the present invention is proposed, the step S100 is to obtain a preset or dynamically updated protection strategy, and determine the protection object in the protection strategy steps, including:
[0067] Obtaining a preset or dynamically updated protection strategy, step a, analyzing the protection strategy, and obtaining the hierarchical condition restrictions in the protection strategy;
[0068] Step b, filtering out the protected objects based on the hierarchical conditions.
[0069]In this embodiment, it should be noted that the protected object refers to the subject that needs to be protected, and if there is a related operation command for the protected object, the operation command needs to be protected. Wherein, the protection object may be determined according to object information such as user type, user ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


