Access control method and device for security gateway
An access control and security gateway technology, applied in the field of gateways, can solve problems such as inability to accurately identify users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] According to the embodiment of the present invention, a method embodiment that can be used to implement the embodiment of the device of the present application is provided. It should be noted that the steps shown in the flow charts of the drawings can be performed on a computer such as a set of computer-executable instructions system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0033] According to an embodiment of the present invention, an access control method of a security gateway is provided. figure 1 is a flow chart of the access control method of the security gateway according to the embodiment of the present invention, such as figure 1 As shown, the method includes the following steps S102 to S110, wherein:
[0034] S102: Receive a data packet of a webpage access request. Specifically, the webpage access request may be a hypertex...
Embodiment 2
[0079] According to an embodiment of the present invention, there is also provided an access control device of a security gateway for implementing the access control method of the above security gateway, the access control device is mainly used to implement the access control method provided by the above content of the embodiment of the present invention, The following is a specific introduction to the access control device of the security gateway provided by the embodiment of the present invention:
[0080] image 3 is a schematic diagram of an access control device of a security gateway according to an embodiment of the present invention, such as image 3 As shown, the device mainly includes: a first receiving unit 10, a computing unit 20, a determining unit 30, an acquiring unit 40 and a processing unit 50, wherein:
[0081] The first receiving unit 10 is configured to receive a data packet of a webpage access request. Specifically, the web page access request may be a hy...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com