Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Resource access method and device, computing equipment and storage medium

A resource access and resource access technology, applied in the fields of computing equipment, storage media, devices, and resource access methods, can solve problems such as malicious attacks and affect user access speed, and achieve the effects of improving work performance and reducing authentication time.

Active Publication Date: 2019-09-03
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF15 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of information technology, users can access many resource systems through the Internet, such as video servers, music servers, cloud storage servers, etc., to obtain more and more At the same time, for many resource systems, there are threats of malicious attacks from illegal users or malicious users. Therefore, in order to protect the security of resource systems, users who access resource systems need to be authenticated. To ensure that users without permissions cannot access the corresponding resources, but for a resource system with a large number of resources, it will inevitably affect the user's access rate, so how to reduce this impact is the key to solving the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method and device, computing equipment and storage medium
  • Resource access method and device, computing equipment and storage medium
  • Resource access method and device, computing equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] For the sake of brevity and intuition in description, the solution of the present invention is described below by describing several representative embodiments. Numerous details in the examples are provided only to aid in the understanding of the aspects of the invention. But obviously, the technical solutions of the present invention may not be limited to these details when implemented. In order to avoid unnecessarily obscuring the solut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a resource access method, and the method comprises the steps: receiving an access request sent by a client, the access request carrying the information of an access user, the information of access resources, and the information of an access operation; when it is determined that the number of the authorization strategies of the access user reaches a preset threshold value according to the information of the access user, searching for an authorization strategy set corresponding to the information of the access resource; authenticating the access user according to the searched authorization strategy set, the information of the access user, the information of the access resource and the information of the access operation; and when the access user passes the authentication, executing the access operation on the access resource according to the access request.

Description

technical field [0001] The present application relates to the field of information technology, and in particular to a resource access method, device, computing device and storage medium. Background technique [0002] With the development of information technology, users can access many resource systems through the Internet, such as video servers, music servers, cloud storage servers, etc., to obtain more and more information they want. At the same time, for many resource systems Therefore, in order to protect the security of the resource system, it is necessary to authenticate users accessing the resource system to ensure that users without authorization cannot access the corresponding resources. , but for a resource system with a large number of resources, it will inevitably affect the user's access rate, so how to reduce this impact is the key to solving the above problems. Contents of the invention [0003] This application proposes the following technical solutions, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6218G06F2221/2141
Inventor 袁哲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products