Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure access logic control method based on terminal access behavior and platform server

A technology of secure access and logical control, applied in the field of terminal access control, can solve the problems of inconvenient use of the system, inability to recognize remote desktop command operation commands, failure to achieve unified logical control of terminal access behavior, and unified authority allocation and operation unified auditing, etc. To achieve the effect of simplifying the complexity of operation and simplifying the difficulty of resource management

Active Publication Date: 2013-03-20
STATE GRID ZHEJIANG ELECTRIC POWER +3
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, most secure access platforms only realize the secure access function of terminals accessing intranet resources. Terminal access behaviors and access rights are controlled separately by each system, and functions such as unified logical control of terminal access behaviors, unified distribution of permissions, and unified auditing of operations are not realized. It cannot recognize the remote desktop commands and the operation commands of the user's own interface system, but can only recognize the text commands such as ftp, telnet, ssh, etc. that control the controllable programs of the application layer, which brings inconvenience to the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access logic control method based on terminal access behavior and platform server
  • Secure access logic control method based on terminal access behavior and platform server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.

[0036] as attached figure 1 As shown, this embodiment mainly solves the problems of repeated distribution of permissions in the current information system, redundant authentication, and uncontrollable terminal behavior, and provides a secure access platform server, unified identity authentication for terminals, and unified control of access permissions at the network layer. , access behavior unified control, access log unified audit security access logic control method, the security access platform server is deployed with a functional module and a supporting database, the functional module includes a web service interface module used as the entrance of the terminal to access the intranet resource machine, Realize the identity authentication module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure access logic control method based on a terminal access behavior and a secure access platform server. A logic control module of the terminal access behavior is arranged at a secure access platform server terminal; information, such as terminal access authority, scene judging parameters, a dot matrix area command comparison table and the like is configured; each data package of terminal access intranet resource is redirected into an agent program which corresponds to the logic control module; and the logic control module identifies the terminal access behavior in various modes to control forwarding or discard. The method of the invention executes classification and identification of character commands, such as FTP (File Transfer Protocol), TELNET, SSH (Secure Shell) and the like, RDF (Resource Description Framework) graphical interface operation and user free interface system operation for the terminal access behavior on the secure access platform server terminal, and judges whether the execution is permitted or not according to identified commands and user authority logic control, so that the difficulty of resource management is simplified, the repeated authentication of each system is avoided; and the identification and the logic control of the character commands, the graphical interface operation and the like are solved.

Description

technical field [0001] The present invention relates to a terminal access control method in the technical field of information security, in particular to a secure access logic control method based on terminal access behavior and a secure access platform server. Background technique [0002] The traditional method of using information systems is mainly based on physical access, and each system is managed separately. Users need to switch systems frequently, and perform identity authentication and authority control repeatedly. With the rapid development and wide application of information technology, the number and complexity of information systems have greatly increased, and people have higher requirements for access to information systems, such as unified user identity verification, unified access authority allocation, and unified behavior audit operations. . [0003] In some secret-related units or large enterprises, a platform for secure access to intranet resources has be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 黄斌顾伟敏赵甫刘行朱英伟卢冰
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products