Access control method based on zero-trust security, device, and storage medium
Assignee
TENCENT CLOUD COMPUTING (BEIJING) CO., LTD
Inventors
Lianying Wang, Chuanda Ding, Yang Yu
Abstract
In an access control method, a service access request of a service application is received. The service access request includes identity information of a user. An identity validation request is sent to a server. The identity validation request includes the identity information of the user. Challenge information is received from the server based on the identity information of the user in the identity validation request being determined to be valid. Signature information of the challenge information is generated based on the challenge information and a private key. The signature information is sent to the server. A signature valid message is received from the server based on the challenge information being obtained from the signature information with a public key associated with the identity information of the user. Based on the signature valid message, the service access request is sent to the server.
CPC Classifications
Filing Date
2023-03-20
Application No.
18123690
Claims
20