CN107426182B - Access control method and system for storage management system - Google Patents

Access control method and system for storage management system Download PDF

Info

Publication number
CN107426182B
CN107426182B CN201710474649.0A CN201710474649A CN107426182B CN 107426182 B CN107426182 B CN 107426182B CN 201710474649 A CN201710474649 A CN 201710474649A CN 107426182 B CN107426182 B CN 107426182B
Authority
CN
China
Prior art keywords
access
user terminal
user
list
management system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710474649.0A
Other languages
Chinese (zh)
Other versions
CN107426182A (en
Inventor
贾东伟
李强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710474649.0A priority Critical patent/CN107426182B/en
Publication of CN107426182A publication Critical patent/CN107426182A/en
Application granted granted Critical
Publication of CN107426182B publication Critical patent/CN107426182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an access control method of a storage management system, which comprises the following steps: setting a user access rule; when an access request sent by a user terminal is acquired, the access request is utilized to inquire the user access rule so as to judge whether the user terminal has access authority, if so, the user terminal is allowed to operate the storage management system corresponding to the access authority, and if not, the user terminal is forbidden to operate the storage management system. In the invention, before responding to the access request initiated by the user terminal, the user access rule is set first, and then the user access rule is utilized to determine whether the user terminal initiating the access request has the access right, if the user terminal does not have the access right, the user terminal is prohibited from operating the storage management system, thereby preventing the data in the storage management system from suffering the access attack of an illegal user terminal, and further improving the safety of the storage management system to a greater extent.

Description

Access control method and system for storage management system
Technical Field
The present invention relates to a storage management system, and in particular, to an access control method and system for a storage management system.
Background
With the rapid development of the internet, network attacks are increasingly common and frequent, and the security of the network is more and more emphasized. Illegal users may use a huge amount of access attack means, so that the system cannot respond to requests in time, the system burden is increased, and the system response is delayed and the like. In contrast, a general storage management system omits the design of access control security because fewer people are used. Some illegal users can utilize the defect to modify, leak and even destroy the data maliciously, and users using the storage management system suffer loss which is difficult to measure.
Disclosure of Invention
In view of the above, the present invention provides an access control method and system for a storage management system, which ensure security of network access. The specific scheme is as follows:
an access control method of a storage management system, comprising:
setting a user access rule;
when an access request sent by a user terminal is acquired, the access request is utilized to inquire the user access rule so as to judge whether the user terminal has access authority, if so, the user terminal is allowed to operate the storage management system corresponding to the access authority, and if not, the user terminal is forbidden to operate the storage management system.
Preferably, the process of setting the user access rule includes:
and setting a user list allowing and/or prohibiting access to obtain a corresponding white list and/or black list.
Preferably, the process of setting a list of users allowed to access and obtaining a corresponding white list includes:
and recording the IP address of the user terminal allowed to access and/or the allowed access time period to obtain the white list.
Preferably, the process of setting a list of users with access prohibited to obtain a corresponding blacklist includes:
and recording the IP address of the user terminal which is forbidden to access and/or the forbidden access time period to obtain the blacklist.
Preferably, the process of setting the user access rule includes:
and setting corresponding access authority for each user list in the white list.
Preferably, the access right corresponding to each user list in the white list includes a read-only right and/or a write-only right and/or a read-write right and/or a data encryption right.
Correspondingly, the invention also provides an access control system of the storage management system, which comprises:
the access rule setting module is used for setting user access rules;
and the access control module is used for inquiring the user access rule by utilizing the access request when the access request sent by the user terminal is acquired so as to judge whether the user terminal has the access authority, if so, the user terminal is allowed to carry out the operation corresponding to the access authority on the storage management system, and if not, the user terminal is forbidden to carry out the operation on the storage management system.
Preferably, the access rule setting module includes a white list creation unit and/or a black list creation unit; the white list creating unit is used for recording the IP address of the user terminal allowed to access and/or the allowed access time period to obtain a white list; and the blacklist creating unit is used for recording the IP address and/or the access prohibition time period of the user terminal which is prohibited to access, so as to obtain the blacklist.
Preferably, the white list creating unit is configured to set a corresponding access right for each user list in the white list.
Preferably, the access right corresponding to each user list in the white list includes a read-only right and/or a write-only right and/or a read-write right and/or a data encryption right.
In the invention, before responding to the access request initiated by the user terminal, the user access rule is set, and then the user access rule can be utilized to determine whether the user terminal initiating the access request has the access right, if the user terminal does not have the access right, the user terminal is forbidden to operate the storage management system, thereby preventing the data in the storage management system from being attacked by the access of illegal user terminals, and further improving the safety of the storage management system to a greater extent.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flowchart of a first method for controlling access to a storage management system according to an embodiment of the present invention;
FIG. 2 is a flowchart of an access control method of a second storage management system according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating an access control method of a third storage management system according to an embodiment of the present invention;
FIG. 4 is a flowchart of an access control method of a fourth storage management system according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating an access control method of a fifth storage management system according to an embodiment of the present invention;
fig. 6 is a block diagram of an access control system of a storage management system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses an access control method of a storage management system, which is shown in figure 1 and comprises the following steps:
s11: setting a user access rule;
s12: when an access request sent by a user terminal is acquired, inquiring the user access rule by using the access request so as to judge whether the user terminal has access authority;
s13: if the user terminal is judged to have the access authority, allowing the user terminal to perform operation corresponding to the access authority on the storage management system;
s14: and if the user terminal is judged to have no access right, the user terminal is prohibited from operating the storage management system.
It can be understood that, in this embodiment, the access request specifically includes information that can be used to verify whether the user terminal has an access right, where the information may be unique identification information of the user terminal, and this embodiment may query the user access rule by using the identification information in the access request, and if the access right corresponding to the identification information is found from the user access rule, the user terminal may be allowed to perform corresponding operation on the storage management system, otherwise, the user terminal is prohibited from performing operation on the storage management system. The identification information may specifically include, but is not limited to, an IP address and/or a MAC address (MAC, i.e., a Media Access Control, physical address) and/or a mobile phone number, etc.
Certainly, the information for verifying whether the user terminal has the access right in the access request may also be some verification password, for example, a numeric password or a character string password, in this embodiment, the verification password in the access request may be used to query the user access rule, if the access right corresponding to the verification password is found from the user access rule, the user terminal may be allowed to perform corresponding operation on the storage management system, and otherwise, the user terminal is prohibited from operating the storage management system.
In the embodiment of the invention, before responding to the access request initiated by the user terminal, the user access rule is set, and then the user access rule can be utilized to determine whether the user terminal initiating the access request has the access right, if the user terminal does not have the access right, the user terminal is forbidden to operate the storage management system, so that the data in the storage management system can be prevented from being attacked by the access of illegal user terminals, and the safety of the storage management system is improved to a greater extent.
The embodiment of the invention discloses a specific access control method of a storage management system, and compared with the previous embodiment, the embodiment further describes and optimizes the technical scheme. Referring to fig. 2, the specific steps include:
s21: setting a user list allowing access to obtain a corresponding white list;
s22: when an access request sent by a user terminal is acquired, inquiring the white list by using the access request;
s23: if the IP address of the user terminal is inquired in the white list, the user terminal is judged to have the access authority, and the user terminal is allowed to perform operation corresponding to the access authority in the white list on the storage management system;
s24: if the IP address of the user terminal is not in the white list, the user terminal is judged to have no access right, and the user terminal is forbidden to operate the storage management system.
In this embodiment, the process of setting the user list allowed to be accessed to obtain the corresponding white list may specifically include:
and recording the IP address of the user terminal allowed to access and/or the allowed access time period to obtain the white list.
It can be understood that, in this embodiment, a corresponding access right needs to be set for the user list, and specifically, the present embodiment may set a corresponding access right for the white list. That is, the process of setting the user access rule may include:
and setting corresponding access authority for each user list in the white list.
It can be understood that, in the white list, the access right corresponding to each user list includes read-only right and/or write-only right and/or read-write right and/or data encryption right.
In this embodiment, the user name list includes IP addresses of the user terminals, and since the IP addresses of each user terminal are different, the purpose of setting corresponding access rights and access times for different user terminals can be achieved by allocating corresponding access rights and access times to different IP addresses. In this embodiment, the access rights include, but are not limited to, the following: forbidden access, read-only right, write-only right, read-write right and data encryption right. And selecting one or more access authorities from the access authorities as the access authorities of the user terminals in the white list.
It can be understood that the users in the white list have corresponding access rights, which may include read-only rights and/or write-only rights and/or read-write rights and/or data encryption rights, and the above-mentioned rights are specifically selected into the white list when the system is set up. For example, in a certain database storage system, only two types of read-only permission and read-write permission are selected, a reader can only obtain the read-only permission, and a database administrator can obtain the read-write permission. For example, in a certain internal match list recording system, two types of read-only permission and write-only permission are selected, the entry players can obtain the write-only permission to record the information of the entry players into the list, and the field audiences can obtain the read-only permission to inquire the information of others. And setting and selecting the authority according to the requirement of the storage management system and the number of the user terminals corresponding to the authority.
The embodiment of the invention discloses a specific access control method of a storage management system, and compared with the previous embodiment, the embodiment further describes and optimizes the technical scheme. Referring to fig. 3, the specific steps include:
s31: setting a user list forbidden to access to obtain a corresponding blacklist;
s32: when an access request sent by a user terminal is acquired, inquiring the blacklist by using the access request;
s33: if the IP address of the user terminal is not inquired in the blacklist, judging that the user terminal has the access authority, and allowing the user terminal to perform operation corresponding to the access authority on the storage management system;
s34: if the IP address of the user terminal is inquired to be in the blacklist, the user terminal is judged to have no access right, and the user terminal is forbidden to operate the storage management system.
It can be understood that, in this embodiment, the IP address written in the blacklist is an IP address of a user terminal that is prohibited from accessing, and more specifically, the above process of setting the user list that is prohibited from accessing to obtain a corresponding blacklist may include:
and recording the IP address of the user terminal which is forbidden to access and/or the forbidden access time period to obtain the blacklist.
Further, the limitation of the access time period allows the user to select time control, date control, and week control. Time control, which means allowing or prohibiting access from a few minutes per day to a few minutes per day; date control, which means to allow or prohibit access from a certain point of day to a certain point of day; week control means allowing or prohibiting access from the week of several weeks to the week of several weeks. Prohibiting a terminal user corresponding to the user IP address on the blacklist from accessing within the time period limit of the blacklist; and allowing the terminal user corresponding to the user IP address on the white list to perform corresponding access authority operation within the time limit of the white list.
The embodiment of the invention discloses a specific access control method of a storage management system, and compared with the previous embodiment, the embodiment further describes and optimizes the technical scheme. Referring to fig. 4, the specific steps include:
s41: setting a user list allowing or prohibiting access to obtain a corresponding white list and a corresponding black list;
s42: when an access request sent by a user terminal is acquired, the access request is utilized to inquire the white list and the black list so as to judge whether the IP address of the user terminal is in the white list or the black list;
s43: if the IP address of the user terminal is inquired in the white list, the user terminal is judged to have a first access right, and the user terminal is allowed to perform operation corresponding to the first access right on the storage management system;
s44: if the IP address of the user terminal is inquired to be in the blacklist, judging that the user terminal has no access right, and forbidding the user terminal to operate the storage management system;
s45: and if the IP address of the user terminal is not in the white list or the black list, judging that the user terminal has a second access right, and allowing the user terminal to perform operation corresponding to the second access right on the storage management system.
In this embodiment, the terminal user who needs to set the explicit authority is added to the white list or the black list, and the same default access authority is set for other access terminal users. At this time, the terminal users are divided into three categories, the first category is the terminal users who are forbidden to access on the black list, the second category is the terminal users who are distributed with the first access authority on the white list, and the third category is other terminal users who are not on the black list and the white list. The access right of the third type of terminal user is also a preset second access right, the access right level is between the user access right levels of the white list and the black list, for example, the white list right is a read-write right, the black list is a forbidden access, and the access right of the third type of terminal user is a read-only right.
Because all users accessing the storage system cannot be exhausted, and the system does not need to consume time and cost to exhaust all the access users, a unified second access right is set for the users not on the black list and the white list, so that a simple and hierarchical user access rule is formed.
The embodiment of the invention discloses a specific access control method of a storage management system, and compared with the previous embodiment, the embodiment further describes and optimizes the technical scheme. Referring to fig. 5, the specific steps include:
s51: setting a user list allowing or prohibiting access to obtain a corresponding white list and a corresponding black list;
s52: when an access request sent by a user terminal is acquired, whether a blacklist or a white list is started is judged;
s53: inquiring the enabled white list or black list by using the access request;
s54: if the white list is inquired and the IP address of the user terminal is inquired to be in the white list, judging that the user terminal has the access authority, and allowing the user terminal to perform operation corresponding to the access authority in the white list on the storage management system;
s55: and if the starting white list is inquired and the IP address of the user terminal is not inquired in the white list, judging that the user terminal has no access right, and forbidding the user terminal to operate the storage management system.
S56: if the blacklist is inquired and the IP address of the user terminal is inquired to be in the blacklist, judging that the user terminal has no access right, and forbidding the user terminal to operate the storage management system;
s57: and if the blacklist is inquired and the IP address of the user terminal is not inquired in the blacklist, judging that the user terminal has the access authority, and allowing the user terminal to perform operation corresponding to the access authority on the storage management system.
It can be seen that the above access control method has two access rules, the first is to open only the white list, and the second is to open only the black list. Of course, there may be a third access rule, i.e. to open both white and black lists. At this time, the access rule is determined in step S52, and then the next step is performed, and the access rule is queried by using the IP address of the user terminal, which is similar to the fourth embodiment.
In the embodiment, different access rules can be selected, and the storage management system has a plurality of access management methods, so that the access to the stored data content is effectively managed.
The embodiment of the present invention also discloses an access control system of a storage management system, as shown in fig. 6, the system includes:
an access rule setting module 11, configured to set a user access rule;
the access control module 12 is configured to, when an access request sent by the user terminal is acquired, query the user access rule by using the access request to determine whether the user terminal has an access right, if so, allow the user terminal to perform an operation corresponding to the access right on the storage management system, and if not, prohibit the user terminal from performing an operation on the storage management system.
Further, the access rule setting module may include a white list creating unit and/or a black list creating unit; the white list creating unit is used for recording the IP address of the user terminal allowed to access and/or the access allowing time period to obtain a white list; the blacklist creating unit is used for recording the IP address and/or the access prohibition time period of the user terminal which is prohibited from accessing, and obtaining the blacklist.
Further, the white list creating unit may be configured to set a corresponding access right for each user list in the white list, where the access right corresponding to each user list in the white list may include a read-only right and/or a write-only right and/or a read-write right and/or a data encryption right.
The access control system of the storage management system sets a restriction rule for a request from the outside, so that the safety and the reliability of the storage management system during use are improved, and the use risk is reduced.
Finally, it should also be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing describes in detail an access control method and system of a storage management system provided by the present invention, and a specific example is applied in the present disclosure to explain the principle and the implementation of the present invention, and the above description of the embodiment is only used to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (9)

1. An access control method for a storage management system, comprising:
setting a user access rule;
when an access request sent by a user terminal is acquired, inquiring the user access rule by using the access request to judge whether the user terminal has access authority, if so, allowing the user terminal to perform operation corresponding to the access authority on the storage management system, and if not, forbidding the user terminal to perform operation on the storage management system;
the process of setting the user access rule comprises the following steps:
setting a user list allowing or prohibiting access to obtain a corresponding white list and a corresponding black list;
correspondingly, the process of querying the user access rule by using the access request to judge whether the user terminal has the access right specifically includes:
inquiring the white list and the black list by using the access request so as to judge whether the IP address of the user terminal is in the black list or the white list;
if the user terminal is in the white list, judging that the user terminal has a first access right, and allowing the user terminal to perform operation corresponding to the first access right on the storage management system;
if the current address is in the blacklist, judging that the user terminal has no access right, and forbidding the user terminal to operate the storage management system;
and if the access authority is not in the white list or the black list, judging that the user terminal has a second access authority, and allowing the user terminal to perform operation corresponding to the second access authority on the storage management system.
2. The access control method according to claim 1, wherein the process of setting a list of users allowed to access and obtaining a corresponding white list comprises:
and recording the IP address of the user terminal allowed to access and/or the allowed access time period to obtain the white list.
3. The access control method according to claim 1, wherein the process of setting a list of users with access prohibited to obtain a corresponding blacklist comprises:
and recording the IP address of the user terminal which is forbidden to access and/or the forbidden access time period to obtain the blacklist.
4. The access control method according to any one of claims 1 to 3, wherein the process of setting the user access rule includes:
and setting corresponding access authority for each user list in the white list.
5. The access control method according to claim 4,
and the access authority corresponding to each user list in the white list comprises read-only authority and/or write-only authority and/or read-write authority and/or data encryption authority.
6. An access control system of a storage management system, the system comprising:
the access rule setting module is used for setting user access rules;
the access control module is used for inquiring the user access rule by utilizing the access request when the access request sent by the user terminal is acquired so as to judge whether the user terminal has the access authority, if so, the user terminal is allowed to carry out the operation corresponding to the access authority on the storage management system, and if not, the user terminal is forbidden to carry out the operation on the storage management system;
wherein the access rule setting module is specifically configured to:
setting a user list allowing or prohibiting access to obtain a corresponding white list and a corresponding black list;
correspondingly, the access control module is specifically configured to:
inquiring the white list and the black list by using the access request so as to judge whether the IP address of the user terminal is in the black list or the white list;
if the user terminal is in the white list, judging that the user terminal has a first access right, and allowing the user terminal to perform operation corresponding to the first access right on the storage management system;
if the current address is in the blacklist, judging that the user terminal has no access right, and forbidding the user terminal to operate the storage management system;
and if the access authority is not in the white list or the black list, judging that the user terminal has a second access authority, and allowing the user terminal to perform operation corresponding to the second access authority on the storage management system.
7. The access control system according to claim 6, wherein the access rule setting module includes a white list creation unit and/or a black list creation unit; wherein the content of the first and second substances,
the white list creating unit is used for recording the IP address of the user terminal allowed to access and/or the allowed access time period to obtain a white list;
and the blacklist creating unit is used for recording the IP address and/or the access prohibition time period of the user terminal which is prohibited to access, so as to obtain the blacklist.
8. The access control system according to claim 7, wherein the white list creating unit is configured to set a corresponding access right for each user list in the white list.
9. The access control system according to claim 8, wherein the access right corresponding to each user list in the white list comprises read-only right and/or write-only right and/or read-write right and/or data encryption right.
CN201710474649.0A 2017-06-21 2017-06-21 Access control method and system for storage management system Active CN107426182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710474649.0A CN107426182B (en) 2017-06-21 2017-06-21 Access control method and system for storage management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710474649.0A CN107426182B (en) 2017-06-21 2017-06-21 Access control method and system for storage management system

Publications (2)

Publication Number Publication Date
CN107426182A CN107426182A (en) 2017-12-01
CN107426182B true CN107426182B (en) 2020-05-29

Family

ID=60426694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710474649.0A Active CN107426182B (en) 2017-06-21 2017-06-21 Access control method and system for storage management system

Country Status (1)

Country Link
CN (1) CN107426182B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088875A (en) * 2018-08-24 2018-12-25 郑州云海信息技术有限公司 A kind of access authority method of calibration and device
CN109981338A (en) * 2019-02-13 2019-07-05 上海易点时空网络有限公司 Alarm method, device and the storage medium that code pulls
CN110598445B (en) * 2019-09-12 2022-05-20 金蝶蝶金云计算有限公司 Database access control method, system and related equipment
CN112968880B (en) * 2021-02-01 2022-07-12 浪潮思科网络科技有限公司 SDN architecture-based permission control method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163149A (en) * 2006-10-13 2008-04-16 华为技术有限公司 Network storage system and network storage content access control method
CN105429933A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Access method of network equipment in local area network, access equipment and system
CN106302400A (en) * 2016-07-29 2017-01-04 锐捷网络股份有限公司 The processing method and processing device of access request

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI516151B (en) * 2013-04-26 2016-01-01 緯創資通股份有限公司 Telecommunication method and telecommunication system
CN103699849A (en) * 2013-12-23 2014-04-02 国云科技股份有限公司 Data access authorization protection method
CN103729590A (en) * 2013-12-27 2014-04-16 四川长虹电器股份有限公司 Method, device and system for setting equipment access right
CN105577720B (en) * 2014-10-15 2020-04-10 中兴通讯股份有限公司 Method and system for packaging mobile application

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163149A (en) * 2006-10-13 2008-04-16 华为技术有限公司 Network storage system and network storage content access control method
CN105429933A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Access method of network equipment in local area network, access equipment and system
CN106302400A (en) * 2016-07-29 2017-01-04 锐捷网络股份有限公司 The processing method and processing device of access request

Also Published As

Publication number Publication date
CN107426182A (en) 2017-12-01

Similar Documents

Publication Publication Date Title
CN107426182B (en) Access control method and system for storage management system
EP3905078A1 (en) Identity verification method and system therefor
US7562385B2 (en) Systems and methods for dynamic authentication using physical keys
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
CN104717223B (en) Data access method and device
CN109756446B (en) Access method and system for vehicle-mounted equipment
EP2278523A2 (en) Network access protection
KR20060089658A (en) Process for the secure management of the execution of an application
JP2006085697A (en) Method and system for controlling access privilege for trusted network node
JPWO2011089788A1 (en) Confidential information leakage prevention system, confidential information leakage prevention method, and confidential information leakage prevention program
CN106899561B (en) TNC (network node controller) authority control method and system based on ACL (Access control List)
US20160187827A1 (en) Methods and systems for determining authenticity of a consumable product
US11146552B1 (en) Decentralized application authentication
CN113132404B (en) Identity authentication method, terminal and storage medium
US20160105417A1 (en) Computer network security management system and method
CN112738100A (en) Authentication method, device, authentication equipment and authentication system for data access
CN107358118B (en) SFS access control method and system, SFS and terminal equipment
CN106941504B (en) Cloud management authority control method and system
US8326654B2 (en) Providing a service to a service requester
KR100386852B1 (en) System for Security Kernel for Security through Various Step based on Electronic Signature Authentication
CN109450953B (en) Authorization method and device, electronic equipment and computer readable storage medium
KR100386853B1 (en) System for Security Kernel for Security based on Duty using Electronic Signature Authentication
CN117336101B (en) Fine-grained network access control method, system, equipment and medium
CN114531303B (en) Server port hiding method and system
CN115866585B (en) Mobile phone APP information protection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant