Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and device

An access control and access request technology, applied in the Internet field, can solve problems such as successful attacks and unproposed attacks, and achieve the effect of reducing data volume, low data load, and accurate security control

Pending Publication Date: 2021-12-07
CHINA CONSTRUCTION BANK
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the password reset function, the first step of the transaction needs to verify the user information, after the verification is successful, the second step resets the password, if the second step resets the password without authentication, the attacker can replay the request, bypassing the first step After step verification, reset the new password, which leads to the success of the attack
[0008] As for how to prevent and control the above-mentioned ultra vires behaviors, no effective solutions have been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0051] figure 1 It is a method flowchart of an embodiment of the access control method provided by this application. Although the present application provides method operation steps or device structures as shown in the following embodiments or accompanying drawings, more or less operation steps or module units may be included in the meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method and device. The method comprises the steps: receiving an access request of a target user, wherein the access request carries a token; matching user data of the target user according to the token; determining a user role to which the target user belongs according to the user data; calling a request rule base, and obtaining a request rule associated with the user role in the request rule base; and determining whether the access request is matched with the associated request rule, and if yes, determining that the access verification is passed. Through the scheme, the problems of low security degree and overlarge data load in the existing access control process are solved, and the technical effects of accurate security control and relatively low data load are achieved.

Description

technical field [0001] The present application belongs to the technical field of the Internet, and in particular relates to an access control method and device. Background technique [0002] Privilege Escalation (privilege escalation) means that an attacker can perform some operations that he is not qualified to perform, which belongs to the issue of "access control". Unauthorized access is divided into vertical unauthorized access and horizontal unauthorized access. Vertical overreach refers to the overreach between different user levels, such as ordinary users executing the authority of administrator users. Horizontal unauthorized operations refer to unauthorized operations between users at the same level. For a normal web request, the general process is: login - submit request - verify permissions - database query - return results. If there is too much trust in the front-end request and there is no effective verification, it will lead to unauthorized behavior. Common p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06G06F21/31G06F21/62
CPCH04L63/10H04L9/3213G06F21/31G06F21/62
Inventor 张茜黄坤
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products