Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Zero-trust dynamic authorization method and device and computer equipment

A technology of dynamic authorization and computer programs, applied in the field of network security, can solve the problem of low security of authority management in the operation and maintenance audit system, and achieve the effect of improving security

Pending Publication Date: 2021-01-01
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a zero-trust dynamic authorization method, device, and computer equipment to at least solve the problem of low security of the operation and maintenance audit system rights management in the operation and maintenance audit system using a pre-configured resource access management model in the related art The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-trust dynamic authorization method and device and computer equipment
  • Zero-trust dynamic authorization method and device and computer equipment
  • Zero-trust dynamic authorization method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described and illustrated below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0043] Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a zero-trust dynamic authorization method and device and computer equipment, and the method comprises the steps: obtaining the current environment information of accessed terminal equipment, wherein the environment information at least comprises the network environment of the terminal equipment; according to the terminal equipment, obtaining current user identity information corresponding to the terminal equipment, wherein the user identity information at least comprises the identity level of the user; and determining the current access authority of the terminal equipment according to the environment information and the user identity information. According to the method, the low security of authority management of an operation and maintenance auditing system due tothe fact that the operation and maintenance auditing system uses a pre-configured resource access management model in the prior art is solved, and the security of authority management of the operation and maintenance auditing system is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a zero-trust dynamic authorization method, device and computer equipment. Background technique [0002] The operation and maintenance audit system is a new generation of operation and maintenance security audit products, which can carry out fine-grained authorization on the access process of operation and maintenance personnel, the operation record and control of the whole process, all-round operation audit and support for post-operation process playback function, to achieve The "pre-prevention, mid-event control, and post-event audit" of the operation and maintenance process, while simplifying the operation and maintenance operations, comprehensively solve the operation and maintenance security issues in various complex environments. [0003] In related technologies, the operation and maintenance audit system adopts a pre-configured resource access management ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/105H04L63/08H04L63/0815H04L63/20
Inventor 吴焱范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products