Computer remote security control method

A security control and computer technology, applied in the direction of user identity/authority verification, transmission system, electrical components, etc., can solve the problems of lack of authority control information transmission, lack of identity authentication of participating nodes, etc., to ensure system security and legitimacy , the effect of ensuring stability

Active Publication Date: 2010-06-16
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The present invention proposes a computer remote security control method, which solves the problems of lack of identity authentication, authority control and information transmission process of participating nodes in existing control methods, and provides a complete set of security mechanisms for remote control in the Internet environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer remote security control method
  • Computer remote security control method
  • Computer remote security control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Such as figure 1 Shown, the present invention carries out following steps in sequence:

[0066] The initialization step of A mainly includes verifying the matching situation of the certificate file; setting the server side so that the server side is in the state of link listening.

[0067] In the node B authentication step, the client sends information to the server, and the server sends its own certificate to the client. The client verifies the server's certificate and asks the server to verify its identity. The server sends information signed by the private key to the client to verify its identity. Finally, the client sends the session key information encrypted with the public key to the server. If the server can use this session key to communicate with the client, the authentication between nodes is successful.

[0068] In step C of verification, the server generates a random number and sends it to the client, and the client uses the user's login password to encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer remote security control method, which belongs to a method for managing and controlling a computer network and aims to solve the problem that in the conventional control method, identity authentication and authority control of involved nodes and security control of an information transmission process are absent, and also to provide a complete set of security mechanism for remote control in an Internet environment. The computer remote security control method is used for a network information processing system consisting of a client node and a server node, which orderly comprises a step A of initialization, a step B of node authentication, a step C of verification and a step D of data transmission. The computer remote security control method has the advantages of effectively verifying the identities of the nodes and users involved in a remote control network and control authorities thereof, providing the security control for the access of the users, providing secure socket links for the encrypted transmission of various information and data, and greatly enhancing the confidentiality and security of the data transmission in the network environment, and is applied to remote control systems in the current complex, open and remote Internet environment.

Description

technical field [0001] The invention belongs to a computer network management and control method, in particular to a computer remote security control method. Background technique [0002] As a key link in the integration of information processing systems, computer remote security control accesses and controls the core resources of information processing systems, including various data and applications; although effective control and reduction of information processing system management costs are obvious goals, it is even more impossible Ignore the security risks brought about by incomplete deployment and implementation. [0003] In a network information processing system composed of computer nodes, most of the application software is highly specialized, and they often require different operating environments and are located in different geographical locations. The decentralized management and control of them by managers will bring great Inconvenience, resulting in a waste o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 冯丹施展华宇史晓东万勇明亮
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products