Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system

A technology of identity authentication and access control, which is applied in transmission systems, network data retrieval, special data processing applications, etc. It can solve the problems that computers are vulnerable to viruses and hackers, and ordinary browsers cannot

Active Publication Date: 2015-04-08
中软信息系统工程有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, unauthorized users are likely to perform illegal operations such as visiting virus websites and downloading virus files. At this time, the computer is easily threatened by viruses and hackers; on the other hand, ordinary browsers have no user identity and authority to identify, When accessing sensitive websites, it is impossible to control the user's operating authority, so that users have no restrictions, and can even exploit WEB site vulnerabilities or use hacking methods to attack WEB sites

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system
  • Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] Such as Figure 1-2 Shown, a kind of identity authentication method of MIPS platform network system access control, described MIPS platform comprises safe browser client end, WEB server end and safe browser server end, and described client end is safe browser terminal, and described server The terminal can log in and control the system access to the secure browser of the secure browser terminal, and the identity authentication method specifically includes the following steps:

[0017] 1. User A opens the browser, enters the user name and password in the input box of the browser authentication and grouping module, and sends the user information to the login grouping server on the WEB server side;

[0018] 2. Log in to the group server to verify the legitimacy of the user name and password. If the authentication fails, an error message will be returned; if the legitimacy is passed, the URL list information that user A can access will be returned. This information is invis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method for access control of an MIPS (Million Instructions Per Second) platform network system. The identity authentication method adopts a mechanism of providing a login identity authentication of a browser and using different encryption algorithms to provide protection for HTTP (Hyper Text Transfer Protocol) transmission data according to an identity of a login user when the user accesses different URLs. The identity authentication method has the advantages that confirmation of identity authentication can be carried out on access of the MIPS platform network system and control of access permission can be carried out according to personal identities.

Description

technical field [0001] The invention relates to a network identity authentication method, in particular to an identity authentication method for MIPS platform network system access control, and belongs to the field of network identity authentication methods. Background technique [0002] System access control authentication is a process for the system to examine the user's identity, so as to determine whether the user has access and use rights to certain resources. Existing browsers lack the function of user access control authentication and verification, and there must be the following problems. If the browser cannot identify and authenticate the user, an attacker can easily break into the system. On the one hand, unauthorized users are likely to perform illegal operations such as visiting virus websites and downloading virus files. At this time, the computer is easily threatened by viruses and hackers; on the other hand, ordinary browsers have no user identity and authorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCG06F16/95H04L63/0815H04L63/0846H04L67/02H04L67/146
Inventor 陈鲁符兴斌李锁在郑永飞刘向军韩鹏黄明胡春玲徐志亮胡松葛江华李亮袁泉李贺肖利建马利君陈文静
Owner 中软信息系统工程有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products