Memory system access authorizing method based on communication network

A communication network and storage system technology, applied in transmission systems, instruments, digital data authentication, etc., can solve problems such as authorization failure, remote office for out-of-office personnel, file key/password management and weak information security protection methods, etc. Achieve the effect of avoiding password leakage and avoiding loss and damage

Inactive Publication Date: 2011-05-18
无锡网芯科技有限公司 +1
View PDF4 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the two existing authorization methods, the authorization device independent of the authorization terminal system (such as a smart card or a USB storage device with a key file stored therein), will lead to authorization failure if the authorization device is lost, damaged or not carried , which may affect the normal enterprise business or the remote office work of the out-of-office staff; the password authorization method is used, al

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory system access authorizing method based on communication network
  • Memory system access authorizing method based on communication network
  • Memory system access authorizing method based on communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0042] like figure 1 As shown, the access authorization system of the present invention is composed of the following parts, and the functions of each part are as follows:

[0043] 1. An authorized terminal (such as a personal computer or a notebook computer) waiting to access the storage system and an authorization request code generation program and an authorization code verification program 10 running therein.

[0044] When requesting authorization, an authorization request code 102 is generated based on parameters such as the hardware feature code of the running terminal and the system date and time (may also include the user password), and is passed through the short-distance transmission technology 103 (or through input devices such as the keyboard of the communication device) Input the authorization request code into the communication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a memory system access authorizing method based on a communication network, which comprises the following steps of: utilizing communication equipment, an authorized computer and an authorizing server as the replacement or supplement of the traditional authorizing technology; authenticating equipment for transmitting an authorizing request code and receiving an authorizing code by an authorizing system and isolating the equipment from authorized computer equipment; transferring the authorizing request code and the authorizing code by a ciphertext and a communication technology which is independent of the authorized computer system; and carrying out multi-identity authentication in the access authorizing process, wherein the authorizing request code and the authorizing code are only effective in limited time. Compared with the traditional password authorizing mechanism, an authorized computer does not need to be accessed into any communication network, the authorizing code is generated during authorization and has limited life cycle, and the risk brought by authorizing code leakage can be prevented; and compared with the traditional file key authorizing mechanism, the invention can prevent loss and damage of authorizing equipment or inconvenience without portability, is safe enough and has the characteristics of convenience and flexibility.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authorization method, in particular to a storage system access authorization method based on a communication network. Background technique [0002] In addition to using firewalls and anti-virus products to defend against external threats, the information systems of modern enterprises have also become the main tool for protecting enterprise information assets. Secure storage system data for devices such as laptops, workstations and servers with data encryption solutions. Without authorization, the storage system will be encrypted and protected, even if it is connected to the network or other devices, the storage system data cannot be accessed. For computer equipment using storage system data encryption technology, all data on the storage system will be protected, and the risk of confidential data leakage is greatly reduced. [0003] Each storage system encryption product r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06G06F21/00G06F21/44
Inventor 张启晨郑有为丁贤根何慈康
Owner 无锡网芯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products