Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and client device for accessing high safety resource

A high-security, secure account technology, applied in the field of system security, to solve the problem of decryption conflicts, reduce the possibility, and ensure normal and stable operation

Inactive Publication Date: 2009-07-01
CHINA UNIONPAY
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a method, a system and a client device for accessing high-security resources, so as to solve the system security problems caused by administrator account access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and client device for accessing high safety resource
  • Method, system and client device for accessing high safety resource
  • Method, system and client device for accessing high safety resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] The embodiment of the present invention provides a method for accessing high-security resources, which adopts a secondary login method, that is, setting a common access account for common resources and setting a special account for resources with high security requirements. When accessing resources with relatively low security requirements, use ordinary accounts for access; and when accessing resources with relatively high security requirements, use the secondary login method. This is not only convenient and fast, but also improves the security of the system.

[0043] Wherein, the high-security resources refer to resources with higher security levels, including encrypted information of accounts accessing these resources; th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for accessing high-security resources and a client device, which solve the security problem arising from accessing with an administrator account. The method comprises the following steps: logging in with a common account to access common resources; reading encrypted security amount information with the common account when requiring access to high-security resources; decrypting the encrypted information according to a pre-configured encryption / decryption algorithm; re-logging in with the decrypted security account so as to access the high-security resources; and immediately logging off the security account after the operation. The method is automatically carried out by a system, and an operator does not know specific processing procedures, so as to improve the system security and reduce uncontrollable factors arising from human intervention. Moreover, the encryption / decryption algorithm is replaceable, so as to reduce the possibility of being cracked in case of using a single encryption key and improve the security of high-security resources.

Description

technical field [0001] The invention relates to system security technology, in particular to a method, a system and a client device for accessing high security resources. Background technique [0002] In many business application systems, maintenance personnel usually use a permission-based access mechanism to manage the system, that is, set different levels of access permissions for system resources. Different permissions mean that users can perform different operations. Users of each permission level cannot perform operations beyond the permission, that is, when low-privilege users need to access resources with higher permission levels, they cannot use their own accounts to directly access them. In this way, the minimum authority can be realized and the security of the system can be guaranteed. [0003] The specific process of the access with sub-privileges is: use a common account to log in to the system and perform general tasks (such as writing documents, sending and r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L9/28H04L29/06
Inventor 陈逢源张奇张工厂
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products