Security policy matching authentication method and system

The invention relates to the technical field of security policy matching, and particularly discloses a security policy matching authentication method and system, and the method comprises the steps: obtaining the identity information of a user during one-time login, and building a hosting policy and...

Full description

Saved in:
Bibliographic Details
Main Authors LIU XIAOYU, YAN JUNYI, LI PEIWEN, XIE PENGFEI, SUN CHONGWU, WU JIAN, CAO GAOMIN, ZHU JIAXIN, LI DONGLIANG
Format Patent
LanguageChinese
English
Published 23.06.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention relates to the technical field of security policy matching, and particularly discloses a security policy matching authentication method and system, and the method comprises the steps: obtaining the identity information of a user during one-time login, and building a hosting policy and an inline policy according to the identity information of the user; establishing a temporary user authentication strategy chain according to the trusteeship strategy and the inline strategy, matching the temporary user authentication strategy chain with the identity authentication strategy chain stored in the database, and if the inline strategy matching between the temporary user authentication strategy chain and the identity authentication strategy chain fails and the trusteeship strategy matching authentication succeeds, establishing a temporary password strategy; once temporary login is allowed, and the lowest access strategy is opened. The temporary user authentication strategy chain is established through the
Bibliography:Application Number: CN202310189511