CN111737683A - Access control method and related device - Google Patents

Access control method and related device Download PDF

Info

Publication number
CN111737683A
CN111737683A CN202010587161.0A CN202010587161A CN111737683A CN 111737683 A CN111737683 A CN 111737683A CN 202010587161 A CN202010587161 A CN 202010587161A CN 111737683 A CN111737683 A CN 111737683A
Authority
CN
China
Prior art keywords
behavior operation
access control
control condition
operation sequence
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010587161.0A
Other languages
Chinese (zh)
Inventor
张晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010587161.0A priority Critical patent/CN111737683A/en
Publication of CN111737683A publication Critical patent/CN111737683A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method for access control and a related device, wherein the method comprises the following steps: acquiring a current behavior operation sequence and a finished behavior operation sequence of chained storage of a target user; judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence; if so, releasing the current behavior operation, and storing the current behavior operation in a chained mode to the completed behavior operation sequence; and if not, rejecting the current behavior operation. The method is simple, convenient and good in compatibility, can avoid huge risks brought to a system by random or randomly combined application program interface transaction requests of intruders, and therefore improves and enhances the security level of access control.

Description

Access control method and related device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and a related apparatus for access control.
Background
The main stream web application program and the mobile phone software application program utilize a token or a session and other modes to carry out security access control, once the unique identification of the token or the session of a user is stolen, an intruder can randomly or randomly combine application program interface transaction requests. Because the web application program and the mobile phone software application program usually adopt an HTTP stateless protocol to realize the application program interface transaction request, the protocol has no memory capacity for transaction processing, so that the application program interface transaction request randomly or randomly combined by an intruder is not influenced by the context correlation of the application program interface transaction request to be successfully operated, the access control right is completely out of control, and huge risk is brought to the system, and the frequent access of the intruder also brings huge processing pressure to the system.
In the prior art, a Universal Unique Identifier (UUID) mode is mainly adopted to solve the problem that the HTTP stateless protocol has no memory capability for transaction processing. Specifically, in the process of realizing the application program interface transaction requests by adopting the HTTP stateless protocol, the field information of the associated UUID is added in each application program interface transaction request, so that the application program interface transaction requests are associated with the context. However, the inventor finds that the UUID method requires the front and back ends to modify the application program interface transaction request at the same time, that is, the front and back ends need to jointly add additional field information to ensure that the application program interface transaction request is associated with the context, which is complicated and poor in compatibility.
Disclosure of Invention
In view of this, embodiments of the present application provide an access control method and a related apparatus, where the method is simple, convenient, and good in compatibility, and can avoid a huge risk brought to a system by an intruder random or arbitrarily combined application program interface transaction request, so as to improve and enhance a security level of access control.
In a first aspect, an embodiment of the present application provides an access control method, where the method includes:
acquiring a current behavior operation sequence and a finished behavior operation sequence of chained storage of a target user;
judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence;
if so, releasing the current behavior operation, and storing the current behavior operation to the completed behavior operation sequence in a chained manner; and if not, rejecting the current behavior operation.
Optionally, the preset access control condition includes a general preset access control condition, and the general preset access control condition is preset based on a white list of behavior operation sequences stored in a chained manner and/or a black list of behavior operation sequences stored in a chained manner.
Optionally, the determining, based on the behavior operation sequence, whether the current behavior operation meets a preset access control condition specifically includes:
and judging whether the context association relation between the completed behavior operation sequence and the current behavior operation meets a general preset access control condition preset based on a white list of the behavior operation sequence and/or a general preset access control condition preset based on a black list of the behavior operation sequence.
Optionally, the preset access control conditions further include personalized preset access control conditions, and the personalized preset access control conditions are preset based on the chained personalized behavior operation sequence of the target user.
Optionally, the determining, based on the behavior operation sequence, whether the current behavior operation meets a preset access control condition specifically includes:
and judging whether the context association relation between the finished behavior operation sequence and the current behavior operation meets the personalized preset access control condition preset based on the personalized behavior operation sequence of the target user.
In a second aspect, an embodiment of the present application provides an apparatus for access control, where the apparatus includes:
the acquiring unit is used for acquiring the current behavior operation of the target user and the finished behavior operation sequence stored in a chained mode;
a judging unit, configured to judge whether the current behavior operation satisfies a preset access control condition based on the completed behavior operation sequence; if yes, the storage unit is released; if not, executing a rejection unit;
a release storage unit, configured to release the current behavior operation, and store the current behavior operation to the completed behavior operation sequence in a chained manner;
and the rejection unit is used for rejecting the current behavior operation.
Optionally, the preset access control condition includes a general preset access control condition, and the general preset access control condition is preset based on a white list of behavior operation sequences stored in a chained manner and/or a black list of behavior operation sequences stored in a chained manner.
Optionally, the preset access control conditions further include personalized preset access control conditions, and the personalized preset access control conditions are preset based on the chained personalized behavior operation sequence of the target user.
In a third aspect, an embodiment of the present application provides a terminal device, where the terminal device includes a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method for access control according to any one of the first aspect above according to instructions in the program code.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium for storing program codes, where the program codes are used to execute the method for access control in any one of the above first aspects.
Compared with the prior art, the method has the advantages that:
by adopting the technical scheme of the embodiment of the application, the current behavior operation of the target user and the finished behavior operation sequence of the chained storage are obtained; judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence; if so, releasing the current behavior operation, and storing the current behavior operation in a chained mode to the completed behavior operation sequence; and if not, rejecting the current behavior operation. Therefore, the completed behavior operation and the current behavior operation do not need to be modified, the storage of the completed behavior operation is realized in a chain storage mode, the context association relation between the completed behavior operation and the current behavior operation can be determined, whether the current behavior operation is allowed to be released or not is judged based on the preset access control conditions, the mode is simple, convenient and good in compatibility, and huge risks brought to a system by random or randomly combined application program interface transaction requests of an intruder can be avoided, so that the security level of access control is improved and enhanced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of a system framework related to an application scenario in an embodiment of the present application;
fig. 2 is a schematic flowchart of a method for access control according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an access control apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, under the access control scene of a web application program and a mobile phone software application program, a UUID mode is mainly adopted to solve the problem that an HTTP stateless protocol has no memory capacity for transaction processing, that is, field information associated with the UUID is added in each application program interface transaction request, so that the application program interface transaction request is associated with context, a token or a unique identifier of a session of a user is stolen, and the phenomenon that an intruder randomly or randomly combines the application program interface transaction requests and operates successfully without being influenced by the context association relation of the application program interface transaction requests is avoided. However, the inventor finds that the UUID method requires the front and back ends to modify the application program interface transaction request at the same time, that is, the front and back ends need to jointly add additional field information to ensure that the application program interface transaction request is associated with the context, which is complicated and poor in compatibility.
In order to solve the problem, in the embodiment of the application, the current behavior operation of a target user and a finished behavior operation sequence of chained storage are obtained; judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence; if so, releasing the current behavior operation, and storing the current behavior operation in a chained mode to the completed behavior operation sequence; and if not, rejecting the current behavior operation. Therefore, the completed behavior operation and the current behavior operation do not need to be modified, the storage of the completed behavior operation is realized in a chain storage mode, the context association relation between the completed behavior operation and the current behavior operation can be determined, whether the current behavior operation is allowed to be released or not is judged based on the preset access control conditions, the mode is simple, convenient and good in compatibility, and huge risks brought to a system by random or randomly combined application program interface transaction requests of an intruder can be avoided, so that the security level of access control is improved and enhanced.
For example, one of the scenarios in the embodiment of the present application may be applied to the scenario shown in fig. 1, where the scenario includes a user terminal 101 and a server 102, a target user performs a behavior operation through the user terminal 101, and the server 102 implements secure access control by using the implementation manner provided in the embodiment of the present application.
First, in the application scenario described above, although the actions of the embodiments provided by the embodiments of the present application are described as being performed by the server 102; the embodiments of the present application are not limited in terms of executing objects as long as the actions disclosed in the embodiments provided by the embodiments of the present application are performed.
Next, the above scenario is only one example of the scenario provided in the embodiment of the present application, and the embodiment of the present application is not limited to this scenario.
The following describes in detail a specific implementation manner of the method for access control and related apparatus in the embodiments of the present application by way of embodiments with reference to the accompanying drawings.
Exemplary method
Referring to fig. 2, a flowchart of a method for access control in an embodiment of the present application is shown. In this embodiment, the method may include, for example, the steps of:
step 201: and acquiring the current behavior operation of the target user and the finished behavior operation sequence of the chained storage.
Because the problem that the transaction processing of the HTTP stateless protocol has no memory capacity is solved by adopting the UUID mode in the prior art, the problem that the transaction processing of the HTTP stateless protocol has no memory capacity is solved by adopting the HTTP stateless protocol, namely, in the process of realizing the transaction requests of the application program interfaces by adopting the HTTP stateless protocol, field information related to the UUID is added in each transaction request of the application program interfaces, so that the transaction requests of the application program interfaces are related to the context, the transaction requests of the application program interfaces are required to be simultaneously modified by the front end and the back end, namely, the front end and the back end are required to jointly add extra. Therefore, in the embodiment of the present application, in order to solve the above problem caused by modifying the completed behavior operation and the current behavior operation, the processor stores the completed behavior operation in a chained storage manner to obtain a sequence of completed behavior operations, so as to record a context association relationship of the completed behavior operations. After the target user performs the behavior operation through the user terminal, not only the current behavior operation of the target user needs to be acquired, but also a completed behavior operation sequence which is related to the current behavior operation and represents the context association relationship of the completed behavior operation is needed, so that the context association relationship between the completed behavior operation and the current behavior operation can be defined.
Step 202: judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence; if yes, go to step 203; if not, go to step 204.
After the completed behavior operation sequence and the current behavior operation obtained in step 201, a context association relationship exists between the completed behavior operation and the current behavior operation, and whether the context association relationship properly affects whether the current behavior operation is released, that is, affects access control. Therefore, in the embodiment of the present application, in order to determine whether the current behavior operation allows releasing, a preset access control condition for determining whether the context association relationship is appropriate needs to be set in advance, after step 201 is executed, it is determined whether the current behavior operation satisfies the preset access control condition based on the completed behavior operation sequence, and a determination result of whether the satisfied current behavior operation corresponds to whether the current behavior operation allows releasing.
The preset access control condition may include a preset access control condition applicable to both the current behavior operation of any user and the completed behavior operation sequence stored in the chained manner, that is, a general preset access control condition. The preset access control condition is generally preset by a behavior operation sequence white list representing a normal behavior operation link, and the behavior operation sequence white list adopts a chain storage mode; or the behavior operation sequence blacklist representing the abnormal behavior operation link can be preset, and the chain storage mode is also adopted by the behavior operation sequence blacklist. Therefore, in an optional implementation manner of this embodiment of the present application, the preset access control condition includes a general preset access control condition, and the general preset access control condition is preset based on a white list and/or a black list of chained stored behavior operation sequences.
Correspondingly, in the specific implementation of step 201, in a case that the general preset access control condition is preset based on the white list of the behavior operation sequence stored in the chain, it needs to be determined whether the context association relationship between the completed behavior operation sequence and the current behavior operation exists in the white list of the behavior operation sequence stored in the chain. Under the condition that the general preset access control condition is preset based on the chain-type stored behavior operation sequence blacklist, whether the context association relationship between the completed behavior operation sequence and the current behavior operation exists outside the chain-type stored behavior operation sequence blacklist needs to be judged. Therefore, in an optional implementation manner of this embodiment of the present application, the step 202 may specifically be, for example: and judging whether the context association relation between the completed behavior operation sequence and the current behavior operation meets a general preset access control condition preset based on a white list of the behavior operation sequence and/or a general preset access control condition preset based on a black list of the behavior operation sequence.
Considering that the behavior operations of different users have personalized characteristics, the preset access control condition may further include a personalized access control condition for the current behavior operation of a specific user and the chained stored completed behavior operation sequence, that is, the personalized preset access control condition. The personalized access control condition is generally preset by a personalized behavior operation sequence which represents a personalized behavior operation link of a specific user, and the personalized behavior operation sequence adopts a chain storage mode. Therefore, in an optional implementation manner of the embodiment of the present application, the preset access control condition further includes a personalized preset access control condition, and the personalized preset access control condition is preset based on a personalized behavior operation sequence of the target user stored in a chained manner.
Correspondingly, in the specific implementation of step 201, when the personalized preset access control condition is preset based on the chained stored personalized behavior operation sequence of the target user, it needs to be determined whether the context association relationship between the completed behavior operation sequence and the current behavior operation exists in the chained stored personalized behavior operation sequence of the target user. Therefore, in an optional implementation manner of this embodiment of the present application, the step 202 may specifically be, for example: and judging whether the context association relation between the finished behavior operation sequence and the current behavior operation meets the personalized preset access control condition preset based on the personalized behavior operation sequence of the target user.
Step 203: and releasing the current behavior operation, and storing the current behavior operation to the completed behavior operation sequence in a chained mode.
In this embodiment of the application, if the determination result in the step 202 is yes, it indicates that the current behavior operation is allowed to be released on the basis of the completed behavior operation sequence of the chained storage, that is, the current behavior operation has an access right and needs to be released. After release, the current behavior operation represents a completed behavior operation, and in order to perform access control on the next behavior operation of a subsequent target user, the current behavior operation needs to be stored in a chain manner to the completed behavior operation sequence.
Step 204: rejecting the current behavior operation.
In this embodiment of the application, if the determination result in the step 202 is negative, it indicates that the current behavior operation is not allowed to be released on the basis of the completed behavior operation sequence stored in the chain, that is, the current behavior operation does not have an access right, and the current behavior operation needs to be rejected.
To summarize, as an example, assume that the XX trade chained store behavior operation sequence whitelist includes "A", "A-B-C", and "A-B-C-D", and the chained store completed behavior operation sequence is "A-B". If the current behavior operation of the target user is 'C', the context association relation between the completed behavior operation sequence 'A-B' and the current behavior operation 'C' is consistent with 'A-B-C' in a behavior operation sequence white list stored in a chained mode, the current behavior operation 'C' is judged to be satisfied with a general preset access control condition preset based on the behavior operation sequence white list, the current behavior operation 'C' is released, the current behavior operation 'C' is stored in the completed behavior operation sequence 'A-B' in a chained mode, and a new chained and stored completed behavior operation sequence 'A-B-C' is obtained. If the current behavior operation of the target user is 'D', the context association relation between the completed behavior operation sequence 'A-B' and the current behavior operation 'D' is not consistent with the behavior operation sequence white list stored in a chain way, the current behavior operation 'D' is rejected if the general preset access control condition preset based on the behavior operation sequence white list is not met.
Through various implementation manners provided by the embodiment, the current behavior operation of the target user and the finished behavior operation sequence of the chained storage are obtained; judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence; if so, releasing the current behavior operation, and storing the current behavior operation in a chained mode to the completed behavior operation sequence; and if not, rejecting the current behavior operation. Therefore, the completed behavior operation and the current behavior operation do not need to be modified, the storage of the completed behavior operation is realized in a chain storage mode, the context association relation between the completed behavior operation and the current behavior operation can be determined, whether the current behavior operation is allowed to be released or not is judged based on the preset access control conditions, the mode is simple, convenient and good in compatibility, and huge risks brought to a system by random or randomly combined application program interface transaction requests of an intruder can be avoided, so that the security level of access control is improved and enhanced.
Exemplary devices
Referring to fig. 3, a schematic structural diagram of an access control apparatus in an embodiment of the present application is shown. In this embodiment, the apparatus may specifically include:
an obtaining unit 301, configured to obtain a current behavior operation of a target user and a completed behavior operation sequence stored in a chained manner;
a determining unit 302, configured to determine whether the current behavior operation satisfies a preset access control condition based on the completed behavior operation sequence; if yes, the memory unit 303 is released; if not, the rejection unit 304 is executed;
a release storage unit 303, configured to release the current behavior operation, and store the current behavior operation to the completed behavior operation sequence in a chained manner;
a rejecting unit 304, configured to reject the current behavior operation.
In an optional implementation manner of the embodiment of the present application, the preset access control condition includes a general preset access control condition, where the general preset access control condition is preset based on a white list of behavior operation sequences stored in a chained manner and/or a black list of behavior operation sequences stored in a chained manner.
In an optional implementation manner of the embodiment of the present application, the determining unit 302 is specifically configured to:
and judging whether the context association relation between the completed behavior operation sequence and the current behavior operation meets a general preset access control condition preset based on a white list of the behavior operation sequence and/or a general preset access control condition preset based on a black list of the behavior operation sequence.
In an optional implementation manner of the embodiment of the present application, the preset access control condition further includes a personalized preset access control condition, and the personalized preset access control condition is preset based on a personalized behavior operation sequence of the target user stored in a chained manner.
In an optional implementation manner of the embodiment of the present application, the determining unit 302 is specifically configured to:
and judging whether the context association relation between the finished behavior operation sequence and the current behavior operation meets the personalized preset access control condition preset based on the personalized behavior operation sequence of the target user.
Through various implementation manners provided by the embodiment, the current behavior operation of the target user and the finished behavior operation sequence of the chained storage are obtained; judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence; if so, releasing the current behavior operation, and storing the current behavior operation in a chained mode to the completed behavior operation sequence; and if not, rejecting the current behavior operation. Therefore, the completed behavior operation and the current behavior operation do not need to be modified, the storage of the completed behavior operation is realized in a chain storage mode, the context association relation between the completed behavior operation and the current behavior operation can be determined, whether the current behavior operation is allowed to be released or not is judged based on the preset access control conditions, the mode is simple, convenient and good in compatibility, and huge risks brought to a system by random or randomly combined application program interface transaction requests of an intruder can be avoided, so that the security level of access control is improved and enhanced.
In addition, an embodiment of the present application further provides a terminal device, where the terminal device includes a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the method for access control according to the above method embodiments according to instructions in the program code.
The embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium is configured to store a program code, where the program code is configured to execute the method for access control in the foregoing method embodiment.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing is merely a preferred embodiment of the present application and is not intended to limit the present application in any way. Although the present application has been described with reference to the preferred embodiments, it is not intended to limit the present application. Those skilled in the art can now make numerous possible variations and modifications to the disclosed embodiments, or modify equivalent embodiments, using the methods and techniques disclosed above, without departing from the scope of the claimed embodiments. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical essence of the present application still fall within the protection scope of the technical solution of the present application without departing from the content of the technical solution of the present application.

Claims (10)

1. A method of access control, comprising:
acquiring a current behavior operation sequence and a finished behavior operation sequence of chained storage of a target user;
judging whether the current behavior operation meets a preset access control condition or not based on the completed behavior operation sequence;
if so, releasing the current behavior operation, and storing the current behavior operation to the completed behavior operation sequence in a chained manner; and if not, rejecting the current behavior operation.
2. The method according to claim 1, wherein the preset access control condition comprises a general preset access control condition, and the general preset access control condition is preset based on a white list of chained stored behavior operation sequences and/or a black list of chained stored behavior operation sequences.
3. The method according to claim 2, wherein the determining whether the current behavior operation satisfies a preset access control condition based on the behavior operation sequence includes:
and judging whether the context association relation between the completed behavior operation sequence and the current behavior operation meets a general preset access control condition preset based on a white list of the behavior operation sequence and/or a general preset access control condition preset based on a black list of the behavior operation sequence.
4. The method according to claim 1 or 2, wherein the preset access control condition further comprises a personalized preset access control condition, and the personalized preset access control condition is preset based on a personalized behavior operation sequence of the target user stored in a chained manner.
5. The method according to claim 4, wherein the determining whether the current behavior operation satisfies a preset access control condition based on the behavior operation sequence includes:
and judging whether the context association relation between the finished behavior operation sequence and the current behavior operation meets the personalized preset access control condition preset based on the personalized behavior operation sequence of the target user.
6. An apparatus for access control, comprising:
the acquiring unit is used for acquiring the current behavior operation of the target user and the finished behavior operation sequence stored in a chained mode;
a judging unit, configured to judge whether the current behavior operation satisfies a preset access control condition based on the completed behavior operation sequence; if yes, the storage unit is released; if not, executing a rejection unit;
a release storage unit, configured to release the current behavior operation, and store the current behavior operation to the completed behavior operation sequence in a chained manner;
and the rejection unit is used for rejecting the current behavior operation.
7. The apparatus of claim 6, wherein the preset access control condition comprises a general preset access control condition, and wherein the general preset access control condition is preset based on a white list of chained stored behavior operation sequences and/or a black list of chained stored behavior operation sequences.
8. The apparatus according to claim 6 or 7, wherein the preset access control condition further comprises a personalized preset access control condition, and the personalized preset access control condition is preset based on a chained stored personalized behavior operation sequence of the target user.
9. A terminal device, comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method of access control of any of claims 1-5 according to instructions in the program code.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium is configured to store a program code for performing the method of access control of any of claims 1-5.
CN202010587161.0A 2020-06-24 2020-06-24 Access control method and related device Pending CN111737683A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010587161.0A CN111737683A (en) 2020-06-24 2020-06-24 Access control method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010587161.0A CN111737683A (en) 2020-06-24 2020-06-24 Access control method and related device

Publications (1)

Publication Number Publication Date
CN111737683A true CN111737683A (en) 2020-10-02

Family

ID=72651406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010587161.0A Pending CN111737683A (en) 2020-06-24 2020-06-24 Access control method and related device

Country Status (1)

Country Link
CN (1) CN111737683A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184106A (en) * 2007-11-30 2008-05-21 北京航空航天大学 Associated transaction processing method of mobile database
CN104901971A (en) * 2015-06-23 2015-09-09 北京东方棱镜科技有限公司 Method and device for carrying out safety analysis on network behaviors
CN105049421A (en) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method based on use behavior characteristic of user, server, terminal, and system
CN109064168A (en) * 2018-06-12 2018-12-21 深圳前海微众银行股份有限公司 Authority control method, device and computer readable storage medium based on block chain
US20180375852A1 (en) * 2017-06-21 2018-12-27 Microsoft Technology Licensing, Llc Device with embedded certificate authority

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184106A (en) * 2007-11-30 2008-05-21 北京航空航天大学 Associated transaction processing method of mobile database
CN104901971A (en) * 2015-06-23 2015-09-09 北京东方棱镜科技有限公司 Method and device for carrying out safety analysis on network behaviors
CN105049421A (en) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method based on use behavior characteristic of user, server, terminal, and system
US20180375852A1 (en) * 2017-06-21 2018-12-27 Microsoft Technology Licensing, Llc Device with embedded certificate authority
CN109064168A (en) * 2018-06-12 2018-12-21 深圳前海微众银行股份有限公司 Authority control method, device and computer readable storage medium based on block chain

Similar Documents

Publication Publication Date Title
KR101881058B1 (en) Method, apparatus and system for voice verification
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
KR101814989B1 (en) Method of detecting fraud financial trade and server performing the same
CN108989263B (en) Short message verification code attack protection method, server and computer readable storage medium
CN105227321B (en) Information processing method, server and client
CN109688186B (en) Data interaction method, device, equipment and readable storage medium
US9830434B2 (en) System and method for security using one-time execution code
CN110795174B (en) Application program interface calling method, device, equipment and readable storage medium
CN110222085B (en) Processing method and device for certificate storage data and storage medium
CN102802150B (en) phone number verification method, system and terminal
CN109996229B (en) Data transmission method and device based on DHT network, electronic equipment and storage medium
TW201931832A (en) User tracking method, server, and client
CN107046516B (en) Wind control method and device for identifying mobile terminal identity
CN105553942B (en) Using the method and system jumped
CN110730446A (en) Login method, terminal and computer storage medium
CN106022027B (en) A kind of unlocking method and a device of mobile device
CN109688096B (en) IP address identification method, device, equipment and computer readable storage medium
CN113489741A (en) Password resetting method and device for Internet of things platform, Internet of things server and medium
CN111737683A (en) Access control method and related device
US10742802B2 (en) Methods and devices for verifying a communication number
CN111178893B (en) Anti-theft safety authentication method and device
CN112004228B (en) Real person authentication method and system
CN108595941B (en) Data processing method and system and electronic equipment
CN111010400A (en) Portal authentication method and device
CN110996272B (en) Game service verification method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201002