Check patentability & draft patents in minutes with Patsnap Eureka AI!

Waterproof wall system and authentication method thereof

A technology of system verification and waterproof wall, applied in the transmission system, electrical components, etc., can solve problems such as easy cracking, security risks, interception and data packet playback, and achieve the effects of ensuring synchronization, protecting reliability, and enhancing security

Active Publication Date: 2011-06-15
黄泽鑫
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Static password authentication is easy to use, but it also shows some security risks: First, there are security problems in the transmission process of static passwords
Static password data packets are easily intercepted and played back by illegal users during the transmission process from the client to the authentication server during the Internet / Intranet transmission process, stealing passwords and access rights; second, it is easy to crack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Waterproof wall system and authentication method thereof
  • Waterproof wall system and authentication method thereof
  • Waterproof wall system and authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a waterproof wall system comprising an LDAP (Lightweight Directory Access Protocol) authentication system, a dynamic password authentication system, a dynamic password bank, a VPN (Virtual Private Network) authentication server, a core database server and a client side, wherein the LDAP authentication system is used for authenticating a user and an access right thereof; the dynamic password authentication system is used for authenticating the legal identity of the user; the dynamic password bank is used for organizing, storing and managing dynamic passwords; the VPN authentication server is used for carrying out permission authentication on the user and opening a VPN tunnel for the user; the core database server is a mechanism used for organizing, storing and managing core data; and the client side is used for providing a local service program for the user. After user information is subjected to secondary filtration, the reliability on identity authentication can be effectively protected; and because the client side is bound to be subjected to dynamic password authentication for access, security monitoring and auditing can be carried out in the authentication system so that the security of the system is further enhanced.

Description

A waterproof wall system and verification method thereof technical field The invention relates to a network data leakage prevention system, in particular to a waterproof wall system and a verification method thereof. Background technique With the development of network informatization, enterprises have higher and higher requirements for information security, especially for some important and sensitive information, how to prevent the leakage of such information has become a concern of enterprises. According to the statistics provided by the international authoritative organization CSI / FBI, among the many attacks and incidents, the most important and the most security incidents are information leakage incidents; the attackers mainly come from inside the enterprise, not from external hackers and other attackers The most important economic loss caused by security incidents is the economic loss caused by intentional or unintentional information leakage incidents by insiders. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 黄泽鑫
Owner 黄泽鑫
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More