Access Control Method, Apparatus, and System
20220329566 · 2022-10-13
Inventors
Cpc classification
H04L9/088
ELECTRICITY
H04L63/0236
ELECTRICITY
H04L41/00
ELECTRICITY
H04L63/20
ELECTRICITY
International classification
Abstract
A control point obtains a correspondence between a plurality of groups and a plurality of access policies; determines that a user in a first group accesses a network by using a first policy enforcement point, where the first group belongs to the plurality of groups; and sends, to the first policy enforcement point, a first access policy corresponding to the first group, where the first access policy belongs to the plurality of access policies, and the first access policy is used to determine whether the first group is accessible by a second group.
Claims
1. A method, comprising: obtaining, by a first network device, a correspondence between a plurality of groups and a plurality of access policies; determining, by the first network device, that a user in a first group accesses a network using a second network device, wherein the first group belongs to the plurality of groups; and sending, by the first network device to the second network device, a first access policy corresponding to the first group, wherein the first access policy belongs to the plurality of access policies, and the first access policy is usable to determine whether the first group is accessible by a second group.
2. The method according to claim 1, further comprising: sending, by the first network device to a third network device, a second access policy corresponding to the first group, wherein the second access policy belongs to the plurality of access policies, and the second access policy is usable to determine whether the first group is capable of accessing a third group that accesses the network using the third network device.
3. The method according to claim 1, wherein the second network device authenticates the user in the first group, and the method further comprises: receiving, by the first network device, a request message from the second network device, wherein the request message requests the first access policy.
4. The method according to claim 1, wherein sending, by the first network device to the second network device, the first access policy corresponding to the first group comprises: sending, by the first network device to the second network device using a control and provisioning of wireless access points (CAPWAP) protocol or a border gateway protocol (BGP)-ethernet virtual private network (EVPN) protocol, the first access policy corresponding to the first group.
5. The method according to claim 1, wherein the second network device is an access layer device.
6. The method according to claim 1, wherein the first access policy is configured without considering a specification of the second network device.
7. An apparatus, comprising: at least one processor; one or more memories coupled to the at least one processor and storing instruction which when executed by the at least one processor, cause the apparatus to: obtain a correspondence between a plurality of groups and a plurality of access policies; determine that a user in a first group accesses a network by using a second network device, wherein the first group belongs to the plurality of groups; and send a first access policy corresponding to the first group to the second network device, wherein the first access policy belongs to the plurality of access policies, and the first access policy is usable to determine whether the first group is accessible by a second group.
8. The apparatus according to claim 7, wherein the instructions, when executed by the at least one processor, further cause the apparatus to: send, to a third network device, a second access policy corresponding to the first group, wherein the second access policy belongs to the plurality of access policies, and the second access policy is usable to determine whether the first group is capable of accessing a third group that accesses the network by using the third network device.
9. The apparatus according to claim 7, wherein the second network device authenticates the user in the first group, and wherein the instructions, when executed by the at least one processor, further cause the apparatus to: receive a request message from the second network device wherein the request message requests the first access policy.
10. The apparatus according to claim 7, wherein the instructions, when executed by the at least one processor, further cause the apparatus to: send, to the second network device by using a control and provisioning of wireless access points (CAPWAP) protocol or a border gateway protocol (BGP)-ethernet virtual private network (EVPN) protocol, the first access policy corresponding to the first group. ii. The apparatus according to claim 7, wherein the second network device is an access layer device.
12. The apparatus according to claim 7, wherein the first access policy is configured without considering a specification of the second network device.
13. The apparatus according to claim 7, wherein each access policy corresponds to a source group and a destination group.
14. A non-transitory storage medium storing a program, which when executed by one or more processors, cause the one or more processors to perform operations, the operations comprising: obtaining a correspondence between a plurality of groups and a plurality of access policies; determining that a user in a first group accesses a network using a second network device, wherein the first group belongs to the plurality of groups; and sending, to the second network device, a first access policy corresponding to the first group, wherein the first access policy belongs to the plurality of access policies, and the first access policy is usable to determine whether the first group is accessible by a second group.
15. The non-transitory storage medium according to claim 14, wherein the operations further comprise: sending, to a third network device, a second access policy corresponding to the first group, wherein the second access policy belongs to the plurality of access policies, and the second access policy is usable to determine whether the first group is capable of accessing a third group that accesses the network by using the third network device.
16. The non-transitory storage medium according to claim 14, wherein the second network device authenticates the user in the first group, and the operations further comprise: receiving a request message from the second network device, wherein the request message requests the first access policy.
17. The non-transitory storage medium according to claim 14, wherein the operations further comprise: sending, to the second network device by using a control and provisioning of wireless access points (CAPWAP) protocol or a border gateway protocol (BGP)-ethernet virtual private network (EVPN) protocol, the first access policy corresponding to the first group.
18. The non-transitory storage medium according to claim 14, wherein the second network device is an access layer device.
19. The non-transitory storage medium according to claim 14, wherein the first access policy is configured without considering a specification of the second network device.
20. The non-transitory storage medium according to claim 14, wherein each access policy corresponds to a source group and a destination group.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
[0066] In the specification, claims, and accompanying drawings of this application, the terms “first”, “second”, “third”, and the like are intended to distinguish between different objects but do not limit a particular order.
[0067] In embodiments of this application, the word “example” or “for example” is used to represent giving an example, an illustration, or a description. Any embodiment or design scheme described as an “example” or “for example” in embodiments of this application should not be explained as being more preferred or having more advantages than another embodiment or design scheme. Exactly, use of the word “example” or “for example” or the like is intended to present a relative concept in a specific manner.
[0068] For clear and concise descriptions of the following embodiments, nouns and related technologies in this specification are briefly described herein.
[0069] A group, also referred to as a security group, is a set of users. A user included in a group is referred to as a user in the group. The group described in this application is used to correspond to an access policy. A relationship between a user and a group may depend on a service feature, such as a type or an occupied bandwidth, of the user. This is not limited in this application. A group to which a user belongs is determined in a user authentication phase. A network device accessed by the user is known to the group to which the user belongs.
[0070] A group ID is used to uniquely indicate a group, and a form and content of the group ID are not limited in this application.
[0071] A control point may refer to a network device serving as a centralized control point on a network. The control point may be classified into a wireless control point device and a wired control point device.
[0072] An authentication point refers to a client device used for terminal user authentication. The authentication point may be usually a network device at the edge of a network.
[0073] A policy enforcement point (also referred to as a distributed policy enforcement point) is a network device responsible for performing rights and/or bandwidth control on traffic. The policy enforcement point may be usually a network device at the edge of a network.
[0074] An access policy (also referred to as a security policy) is a rule for performing network security control (rights control or the like). One access policy corresponds to a destination group and a source group.
[0075] Access control is explained as follows: When a network device serving as a destination-end policy enforcement point receives a traffic packet, the destination-end policy enforcement point finds a corresponding destination group ID in user authentication entries based on destination address information carried in the traffic packet, and uses a group to which a sender of the traffic packet belongs as a source group. The policy enforcement point performs policy control on the traffic packet based on an access policy corresponding to the source group and the destination group, and determines whether to send the packet to a destination user.
[0076] In a local area network architecture shown in
[0077] In this process, policy enforcement points are specified together and access policies are delivered together for static deployment. Full access policies are usually deployed at the policy enforcement point. The large scale of policies imposes a strict specification requirement for the policy enforcement point. In networking, the policy enforcement point usually needs to be arranged on a device at the aggregation or core layer for implementation. However, in an end-to-end VXLAN deployment scenario, an access layer device also serves as a policy enforcement point.
[0078] In a campus management network architecture shown in
[0079] It is easily figured out that different access policies can be delivered to different specified policy enforcement points by using the controller. However, this requires an administrator to perform a large quantity of manual arrangements. In addition, if personnel mobility exists, because a policy is statically arranged, the administrator needs to modify the policy continuously based on the personnel mobility, resulting in high maintenance costs.
[0080] In view of this, embodiments of this application provide an access control method. A basic principle of the method is as follows: A control point selects an access policy used to determine whether a group in which a user accesses a network by using a policy enforcement point is accessible, and sends the access policy to the policy enforcement point. The access policy sent to the policy enforcement point is an access policy that needs to be used when the policy enforcement point performs policy control. Therefore, on-demand configuration is implemented without deploying full access policies at the policy enforcement point, relaxing a specification requirement for the policy enforcement point. In an end-to-end VXLAN scenario, an access policy is configured without considering a specification of the policy enforcement point, improving networking flexibility.
[0081] The access control method provided in this application may be applied to a local area network architecture shown in
[0082] The control point 301 is configured to manage the plurality of policy enforcement points 302, and deliver an access policy to the policy enforcement point 302 by using the solution provided in this application.
[0083] The policy enforcement point 302 may be an access layer device, or may be an aggregation layer device, or may be a core layer device. This is not specifically limited in this embodiment of this application. For example, when the policy enforcement point 302 is an access layer device, a product form of the policy enforcement point 302 may be an AP, an LSW, or the like. This is not limited in this application.
[0084] The terminal 303, namely, a communications device used by a user, may be replaced by the user described in this application equivalently. The terminal 303 may be a mobile phone, a tablet computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a personal digital assistant (PDA), an e-book, a mobile television, a wearable device, a personal computer (PC), or the like. In communications systems of different standards, terminals may have different names, but all the terminals having different names may be understood as the terminal described in this application. A type of the terminal is not specifically limited in embodiments of this application either.
[0085] For example, in the network architecture shown in
[0086] Further, as shown in
[0087] For example, in the network architecture shown in
[0088] It should be noted that the protocol name used for communication between network elements in
[0089] It should be further noted that, an actual product form of each network element in the accompanying drawings of this application may be configured based on an actual requirement. The accompanying drawings merely illustrate a type of each network element, but do not specifically limit the foregoing network elements.
[0090] The following describes embodiments of this application in detail with reference to the accompanying drawings.
[0091] According to an aspect, an embodiment of this application provides an access control apparatus.
[0092] With reference to
[0093] The memory 402 may be a volatile memory, such as a random access memory (RAM); or a non-volatile memory, such as a read-only memory (ROM), a flash memory, a hard disk drive (HDD), or a solid-state drive (SSD); or a combination of the foregoing types of memories. The memory 402 is configured to store program code, a configuration file, or other content that can implement the methods in this application.
[0094] The processor 401 is a control center of the access control apparatus 40, and may be a central processing unit (CPU), or may be an application-specific integrated circuit (ASIC), or may be one or more integrated circuits configured to implement this embodiment of this application, for example, one or more microprocessors (DSPs), or one or more field programmable gate arrays (FPGAs).
[0095] The transceiver 403 is configured to communicate with and transmit data to another device.
[0096] In a possible implementation, the access control apparatus 40 is deployed on a control point. By running or executing a software program and/or module stored in the memory 402 and invoking data stored in the memory 402, the processor 401 performs the following functions: obtaining a correspondence between a plurality of groups and a plurality of access policies; determining that a user in a first group accesses a network by using a first policy enforcement point, where the first group belongs to the plurality of groups; sending, by using the transceiver 403 to the first policy enforcement point, a first access policy corresponding to the first group, where the first access policy belongs to the plurality of access policies, and the first access policy is used to determine whether the first group is accessible by a second group.
[0097] In another possible implementation, the access control apparatus 40 is deployed on a policy enforcement point. By running or executing a software program and/or module stored in the memory 402 and invoking data stored in the memory 402, the processor 401 performs the following functions: determining that a user requesting to access a network belongs to a first group; obtaining, from the control point, a first access policy corresponding to the first group, where the first access policy is used to determine whether the first group is accessible by a second group; receiving a first packet whose destination is the user and group information indicating that a sender of the first packet belongs to a second group; and determining, based on the first access policy and the group information, whether to send the first packet to the user.
[0098] According to another aspect, an embodiment of this application further provides an access control method. The method is applied to an interaction process between a control point and a policy enforcement point. It should be noted that there is a same interaction process between the control point and each policy enforcement point controlled by the control point. In the following embodiment of this application, only an interaction process between the control point and one policy enforcement point (a first policy enforcement point) managed by the control point is used as an example for description. Details are not described one by one.
[0099] As shown in
[0100] S501. A control point obtains a correspondence between a plurality of groups and a plurality of access policies.
[0101] In a possible implementation, in S501, the control point may receive, from a controller, the correspondence between the plurality of groups and the plurality of access policies. An interaction protocol and a specific interaction manner between the control point and the controller are not limited in this embodiment of this application.
[0102] For example, the controller may deliver the correspondence between the plurality of groups and the plurality of access policies to the control point by using a NETCONF protocol.
[0103] For example, the controller may be a campus controller in a campus management system, and the control point may be a border or an AC device. An actual product form of the network element is not limited in this embodiment of this application.
[0104] In another possible implementation, in S501, the control point may receive the correspondence between the plurality of groups and the plurality of access policies that is configured by an administrator.
[0105] Specifically, in the correspondence between the plurality of groups and the plurality of access policies that is obtained by the control point in S501, each access policy corresponds to a source group and a destination group. The source group and the destination group may be indicated by using a source group ID and a destination group ID, and details are not described one by one.
[0106] A source group and a destination group corresponding to an access policy are used to indicate a packet controlled by the access policy. For example, when a network device serving as a destination-end policy enforcement point receives a traffic packet, the destination-end policy enforcement point finds a corresponding destination group ID in user authentication entries based on destination address information carried in the traffic packet, and obtains a source group ID to which a sender of the traffic packet belongs. The destination-end policy enforcement point selects an access policy corresponding to the source group ID and the destination group ID and determines whether to send the traffic packet to the destination user.
[0107] For example, Table 1 shows the correspondence between the plurality of groups and the plurality of access policies that is obtained by the control point in S501, and a row in Table 1 indicates a correspondence between one access policy and a source group ID and a destination group ID that are of the access policy.
TABLE-US-00001 TABLE 1 Access policies Source group ID Destination group ID Access policy 1 ID a ID b Access policy 2 ID c ID d Access policy 3 ID e ID f . . . . . . . . .
[0108] It should be noted that Table 1 is merely an example for description, but does not specifically limit a form and content of the correspondence between the plurality of groups and the plurality of access policies.
[0109] It should be further noted that, the correspondence between the plurality of groups and the plurality of access policies that is obtained by the control point in S501 may be a correspondence between all or some access policies deployed on the network and source groups and destination groups. This is not limited in this application.
[0110] S502. The control point determines that a user in a first group accesses a network by using a first policy enforcement point.
[0111] The first group belongs to the foregoing plurality of groups. The first policy enforcement point is a policy enforcement point device managed by the control point. The management relationship between the control point and the policy enforcement point may be configured by the administrator or determined in another manner, and is not limited in this embodiment of this application.
[0112] Specifically, a policy enforcement point for a user to access a network may be determined in an authentication phase for the user to access the network, the access relationship is recorded on the control point, and the access relationship records a user that accesses the network by using each policy enforcement point managed by the control point and a group to which the user belongs. For example, in S502, the control point determines, based on the access relationship, that the user in the first group accesses the network by using the first policy enforcement point.
[0113] Further, there may be one or more users who access the network by using the first policy enforcement point, and the one or more users may belong to one or more groups. Correspondingly, there may be one or more first groups.
[0114] S503. The control point sends, to the first policy enforcement point, a first access policy corresponding to the first group.
[0115] The first access policy belongs to the foregoing plurality of access policies, and the first access policy is used to determine whether the first group is accessible by a second group. It should be understood that, that the first access policy is used to determine whether the first group is accessible by the second group may mean that the first access policy is an access policy in which a source group is the second group and a destination group is the first group and that is in the correspondence between the plurality of groups and the plurality of access policies. There may be one or more first access policies.
[0116] The second group may be a source group obtained when a destination group is the first group in the correspondence between the plurality of groups and the plurality of access policies.
[0117] For example, based on the correspondence between the plurality of groups and the plurality of access policies shown in Table 1, if identifiers of groups to which all terminals accessing the network by using one policy enforcement point belong are an ID f and an ID b, for the control point in S503, a first access policy corresponding to the policy enforcement point may be an access policy 1 and an access policy 3.
[0118] Specifically, in S503, the control point may send the first access policy to the first policy enforcement point by using a communications protocol between the control point and the first policy enforcement point.
[0119] For example, that the control point sends the first access policy to the first policy enforcement point in S503 may be specifically implemented as follows: The control point sends the first access policy to the first policy enforcement point by using a CAPWAP protocol or a BGP-EVPN protocol.
[0120] Optionally, the first policy enforcement point may be an access layer device. Certainly, the first policy enforcement point may be alternatively an aggregation layer device, a core layer device, or the like.
[0121] S504. The first policy enforcement point determines that a user requesting to access the network belongs to the first group.
[0122] In S504, the first policy enforcement point may determine, based on a service of the user, a configuration of a terminal used by the user, or other content, a group to which the user requesting to access the network belongs. A specific determining solution is not specifically limited in this embodiment of this application.
[0123] S505. The first policy enforcement point obtains, from the control point, the first access policy corresponding to the first group.
[0124] The first access policy obtained by the first policy enforcement point from the control point in S505 is the first access policy sent by the control point to the first policy enforcement point in S503. Details are not described herein again.
[0125] For example, that the first policy enforcement point receives the first access policy from the control point in S505 may be specifically implemented as follows: The first policy enforcement point receives the first access policy from the control point by using a CAPWAP protocol or a BGP-EVPN protocol.
[0126] S506. The first policy enforcement point receives a first packet whose destination is the user in the first group and group information indicating that a sender of the first packet belongs to the second group.
[0127] The first packet may include the group information. The group information may be an ID of the second group, in other words, may be group information indicating that the sender of the first packet belongs to the second group.
[0128] Specifically, the first packet is a packet obtained after traffic sent by a user of a source terminal arrives at the access layer device and the access layer device encapsulates the traffic.
[0129] Further, the first packet may further include a destination identifier, used to indicate a destination of the first packet.
[0130] Optionally, in S506, when receiving the first packet, the first policy enforcement point determines, based on the destination of the first packet, whether a destination terminal accesses the first policy enforcement point. If the first policy enforcement point determines that the destination terminal accesses the first policy enforcement point, the first policy enforcement point performs S507 for policy control. If the first policy enforcement point determines that the destination terminal does not access the first policy enforcement point, the first policy enforcement point performs forwarding. A forwarding process is not described in this embodiment of this application.
[0131] S507. The first policy enforcement point determines, based on the first access policy and the group information indicating that the sender of the first packet belongs to the second group, whether to send the first packet to the destination user.
[0132] Specifically, in S507, the first policy enforcement point selects, from the first access policy, an access policy corresponding to the source group ID (an identifier of the second group) and the destination group ID (an ID of the group to which the destination belongs, namely, the first group), performs policy control on the first packet, and determines whether to send the first packet to the destination user.
[0133] It should be noted that the first group and the second group described in this embodiment of this application describe the solution of this application only from a perspective of one group, and constitute no specific limitation. In actual application, each group may be considered as the first group and/or the second group to perform the solution of this application. Specific implementation is similar, and details are not described one by one.
[0134] By using the access control method provided in this application, the control point selects an access policy that needs to be used when a policy enforcement point performs policy control (the access policy is used to determine whether a group in which a user accesses the network by using the policy enforcement point is accessible), and sends the access policy to the policy enforcement point, to implement on-demand configuration without deploying full access policies at the policy enforcement point, relaxing a specification requirement for the policy enforcement point. In an end-to-end VXLAN scenario, an access policy is configured without considering a specification of the policy enforcement point, improving networking flexibility.
[0135] Further, the foregoing process from S501 to S507 describes an interaction process between the control point and the first policy enforcement point when the first policy enforcement point serves as a destination-end device. Certainly, in actual application, the first policy enforcement point may also serve as a source-end network device, and the control point may send, to a policy enforcement point other than the first policy enforcement point, an access policy corresponding to the first group serving as the source group in the correspondence. As shown in
[0136] S508. The control point sends, to a second policy enforcement point, a second access policy corresponding to the first group.
[0137] The second access policy belongs to the plurality of access policies, and the second access policy is used to determine whether the first group is capable of accessing a third group that accesses the network by using the second policy enforcement point.
[0138] It should be understood that, that the second access policy is used to determine whether the first group is capable of accessing the third group that accesses the network by using the second policy enforcement point may mean that the second access policy is an access policy in which a source group is the first group and a destination group is the third group and that is in the correspondence between the plurality of groups and the plurality of access policies. There may be one or more second access policies.
[0139] The third group may be a destination group obtained when a source group is the first group in the correspondence between the plurality of groups and the plurality of access policies.
[0140] Further, when the first policy enforcement point serves as a source-end network device, the first policy enforcement point may further send a packet of the user to the destination. As shown in
[0141] S509. The first policy enforcement point receives a second packet sent by the user in the first group.
[0142] The first policy enforcement point receives the second packet sent by the user in the first group, and the second packet indicates a destination of the second packet. After encapsulating the second packet, the first policy enforcement point performs S510 to send the encapsulated second packet to the destination.
[0143] For example, the second packet may include destination address information to indicate the destination of the second packet.
[0144] S510. The first policy enforcement point sends the second packet and an identifier of the first group based on the destination of the second packet.
[0145] Specifically, the first policy enforcement point may send the second packet based on the destination of the second packet along a network path to the destination, and simultaneously send the identifier of the first group, so that a destination policy enforcement point may select an access policy based on the identifier of the first group, and determine whether to send the second packet to the destination user. For a specific operation of the destination policy enforcement point, refer to the foregoing policy control process of the first policy enforcement point. Details are not described again.
[0146] For example, in S510, the first policy enforcement point sends, based on the destination of the second packet, the second packet that carries the identifier of the first group.
[0147] Further, the terminal may be configured to perform authentication at the control point, or at the policy enforcement point. When the first policy enforcement point is an authentication point for the user in the first group, as shown in
[0148] S511. The first policy enforcement point sends a request message to the control point.
[0149] The request message is used to request the first access policy corresponding to the first group; to be specific, the request message is used to request an access policy for a destination group to which the terminal accessing the network by using the first policy enforcement point belongs.
[0150] In a possible implementation, after the terminal completes authentication, the first policy enforcement point may perform S511. An execution occasion of S511 is not specifically limited in this application.
[0151] S512. The control point receives the request message from the first policy enforcement point.
[0152] The request message received by the control point from the first policy enforcement point in S512 is the request message sent by the first policy enforcement point in S511. Details are not described herein again.
[0153] Further, after receiving the request message in S512, the control point may perform S503 to send the first access policy to the first policy enforcement point.
[0154] It should be noted that, an execution sequence of the foregoing steps included in the access control method provided in this embodiment of this application may be configured based on an actual requirement.
[0155] The solution provided in this application is described below by using a specific example.
[0156]
[0157] The controller delivers static global access policies to the AC by using the NETCONF protocol. The AC synchronizes, to the LSW (GW) by using the extended BGP-EVPN protocol, an access policy corresponding to a destination group to which the accessed terminal on the LSW (GW) device belongs. The AC sends, to the AP through a CAPWAP channel, an access policy corresponding to a destination group to which the station belongs.
[0158] Further, the AC functions as an authentication point for a wireless user and performs authentication on a wireless terminal. Authorization security group information of the terminal is synchronized to the AP through the CAPWAP tunnel.
[0159] For a traffic packet in a direction 1 shown in
[0160] For a traffic packet in a direction 2 shown in
[0161] The foregoing mainly describes the solutions provided in embodiments of this application from the perspective of interaction between network elements. It may be understood that, to implement the foregoing functions, the foregoing control point and policy enforcement point include corresponding hardware structures and/or software modules for performing the functions. A functional unit that implements the foregoing access control method on the control point and the policy enforcement point is referred to as an access control apparatus. A person skilled in the art should easily be aware that, in combination with units and algorithm steps of the examples described in embodiments disclosed in this specification, this application may be implemented by hardware or a combination of hardware and computer software. Whether a function is performed by hardware or hardware driven by computer software depends on particular applications and design constraints of the technical solutions. A person skilled in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of this application.
[0162] In embodiments of this application, the access control apparatus may be divided into functional modules based on the foregoing method examples. For example, each functional module may be obtained through division based on each corresponding function, or two or more functions may be integrated into one processing module. The integrated module may be implemented in a form of hardware, or may be implemented in a form of a software functional module. It should be noted that, in embodiments of this application, module division is an example, and is merely logical function division. There may be another division manner during actual implementation.
[0163] When each functional module is obtained through division corresponding to each function,
[0164] Further, as shown in
[0165] When an integrated unit is used,
[0166] The processing module 901 may be the processor 401 in an entity structure of the access control apparatus 40 shown in
[0167] When the processing module 901 is a processor, the communications module 902 is a transceiver, and the storage module 903 is a memory, the access control apparatus 90 in
[0168] As described above, the access control apparatus 80 or the access control apparatus 90 provided in this embodiment of this application may be configured to implement functions of the control point in the method implemented in embodiments of this application. For ease of description, only a part related to this embodiment of this application is shown. For specific undisclosed technical details, refer to embodiments of this application.
[0169] When each functional module is obtained through division corresponding to each function,
[0170] Further, as shown in
[0171] When an integrated unit is used,
[0172] The processing module 1101 may be the processor 401 in an entity structure of the access control apparatus 40 shown in
[0173] When the processing module 1101 is a processor, the communications module 1102 is a transceiver, and the storage module 1103 is a memory, the access control apparatus 110 in
[0174] As described above, the access control apparatus 100 or the access control apparatus 110 provided in this embodiment of this application may be configured to implement functions of the policy enforcement point in the method implemented in embodiments of this application. For ease of description, only a part related to this embodiment of this application is shown. For specific undisclosed technical details, refer to embodiments of this application.
[0175] According to another aspect, this application provides an access control system, including an apparatus configured to perform functions of the control point in the foregoing method, and one or more apparatuses configured to perform functions of the first policy enforcement point in the foregoing method.
[0176] In another form of this embodiment, a computer-readable storage medium storing instructions is provided, and when the instructions are executed, the access control method in the foregoing method embodiments is performed.
[0177] In another form of this embodiment, a computer program product including instructions is provided, and when the computer program product runs on a computer, the computer is enabled to perform the access control method in the foregoing method embodiments.
[0178] An embodiment of this application further provides a chip system. The chip system includes a processor, configured to implement the technical methods in embodiments of the present invention. In a possible design, the chip system further includes a memory, configured to store program instructions and/or data that are/is necessary in this embodiment of the present invention. In a possible design, the chip system further includes a memory, configured to enable the processor to invoke application program code stored in the memory. The chip system may include one or more chips, or may include a chip and another discrete component. This is not specifically limited in this embodiment of this application.
[0179] A person skilled in the art may clearly understand that, for the purpose of convenient and brief description, for detailed working processes of the foregoing system, apparatuses, and units, refer to corresponding processes in the foregoing method embodiments. Details are not described herein again.
[0180] A person skilled in the art should be aware that in one or more of the foregoing examples, the functions described in this application may be implemented by using hardware, software, firmware, or any combination thereof. When software is used to implement the functions, the functions may be stored in a computer-readable medium or transmitted as one or more instructions or code in the computer-readable medium. The computer-readable medium includes a computer storage medium and a communications medium, where the communications medium includes any medium that enables a computer program to be transmitted from one place to another. The storage medium may be any available medium accessible to a general-purpose or dedicated computer. A person skilled in the art may clearly understand that, for the purpose of convenient and brief description, for detailed working processes of the foregoing system, apparatuses, and units, refer to corresponding processes in the foregoing method embodiments. Details are not described herein again.
[0181] In the several embodiments provided in this application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the described apparatus embodiments are merely examples. For example, unit division is merely logical function division. There may be another division manner during actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communications connections may be implemented through some interfaces. The indirect couplings or communications connections between the apparatuses or units may be implemented in an electrical form or another form.
[0182] The units described as separate components may or may not be physically separate, and components displayed as units may or may not be physical units. To be specific, the components may be located at one position, or may be distributed on a plurality of network units. Some or all of the units may be selected based on actual requirements to achieve the objectives of the solutions of embodiments.
[0183] In addition, functional units in embodiments of this application may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units may be integrated into one unit. The integrated unit may be implemented in a form of hardware, or may be implemented in a form of hardware in addition to a software functional unit.
[0184] In embodiments of this application, content corresponding to a solid-line box may be alternatively optional.
[0185] When the foregoing integrated unit is implemented in a form of a software functional unit, the integrated unit may be stored in a computer-readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) to perform some of the steps of the methods described in embodiments of this application. The foregoing storage medium includes any medium that can store program code, such as a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disc.
[0186] Finally, it should be noted that the foregoing embodiments are merely intended for describing the technical solutions of this application, but not for limiting this application. Although this application is described in detail with reference to the foregoing embodiments, persons of ordinary skill in the art should understand that they may still make modifications to the technical solutions described in the foregoing embodiments or make equivalent replacements to some technical features thereof, without departing from the spirit and scope of the technical solutions of embodiments of this application.