Data access method and device

A data access and data technology, applied in the Internet field to achieve the effect of improving the degree of protection

Active Publication Date: 2015-06-17
XIAOMI INC
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In related technologies, when an attacker obtains a user name and password with permission to access sensitive data, the attacker can determine a device with proxy services through the internal LAN of the company to which the sensitive data belongs. When the attacker accesses sensitive data externally , the access request can be sent to the device with proxy service, and then the device sends an access request that needs to access the sensitive data to the server storing the sensitive data. In this case, the server will think that the access request comes from Internal LAN, which in turn allows attackers to access sensitive data, resulting in sensitive data being successfully attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method and device
  • Data access method and device
  • Data access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0079] figure 1 is a flowchart of a data access method shown according to an exemplary embodiment, and the data access method can be applied on a server, such as figure 1 As shown, the data access method includes the following steps S101-S103:

[0080] In step S101, when a data access request from a terminal device is received, the user identification corresponding to the data access request i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data access method and device. The data access method and device are used for improving the data access protection degree. The method comprises the steps that when a data access request from a terminal device is received, a user identification corresponding to the data access request is certified; after the user identification passes the certification, the network position of the terminal device is certified; after the network position of the terminal device passes the certification, a device identification of the terminal device is certified, and if the device identification passes the certification, the terminal device is allowed to have access to data corresponding to the data access request. The data access method and device can well prevent an attacker from having access to data with sensitive attributes, and the data access protection degree is greatly improved.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, in particular to a data access method and device. Background technique [0002] With the increasingly fierce competition in the Internet industry, information security issues have become more and more serious. Sensitive data owned by various companies (such as company financial statements, business strategies, etc.) It needs to be provided to specific personnel of the company, and sensitive data needs to be specially protected to prevent it from being obtained by attackers. In related technologies, when an attacker obtains a user name and password with permission to access sensitive data, the attacker can determine a device with proxy services through the internal LAN of the company to which the sensitive data belongs. When the attacker accesses sensitive data externally , the access request can be sent to the device with proxy service, and then the device sends an access request t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10
Inventor 尹智宇尹家进郑志光
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products