Method and equipment for implementing safety access

A technology for secure access and equipment, applied in the computer field, can solve problems such as lack of predictability and early warning effects, safety detection lag, and safety problems that cannot be eliminated, so as to prevent potential safety hazards, solve the constraints of gateway physical links, and reduce resources. The effect of occupation

Active Publication Date: 2016-11-09
SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, for the security protection corresponding to the user network request, for example, the security judgment and processing of the transmission data corresponding to the network request, it is usually necessary to analyze the security of the local file after the transmission data reaches the l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for implementing safety access
  • Method and equipment for implementing safety access
  • Method and equipment for implementing safety access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The application will be described in further detail below in conjunction with the accompanying drawings.

[0029] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0030] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0031] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application aims to provide a method and equipment for implementing safety access. The method comprises the steps of: acquiring access response information corresponding to an access request sent by a VPN (Virtual Private Network) client; executing a safety detection operation on the access response information; and when a corresponding safety detection result is that the access response information is safe, providing the access response information to user equipment corresponding to the VPN client. Compared with the prior art, according to the method and equipment provided by the application, the acquired access response information corresponding to the access request sent by the VPN client of the user equipment is subjected to the safety detection operation by network equipment, and the access response information, of which the safety detection result is that the access response information is safe, is sent to the user equipment, thereby avoiding direct acquisition of the user equipment on network transmission data which is not subjected to safety detection, effectively implementing interception on access response information with the safety problem and preventing the potential safety hazard brought to the user equipment by the access response information.

Description

technical field [0001] The present application relates to the field of computers, and in particular to a technology for realizing safe access. Background technique [0002] In the prior art, for the security protection corresponding to the user's network request, such as the security judgment and processing of the transmission data corresponding to the network request, it is usually necessary to analyze the security of the local file after the transmission data reaches the local user device , or upload the local file information and perform security verification. At this time, the security detection is relatively lagging behind, lacking predictability and early warning effects, especially the security problems caused by the local data to the local user equipment cannot be eliminated. Contents of the invention [0003] The purpose of this application is to provide a method and device for implementing secure access. [0004] According to one aspect of the present applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L12/4641H04L63/0428H04L63/10H04L63/1408H04L63/1425H04L63/145
Inventor 龚蔚侯立军陈超王训印
Owner SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products