Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for accessing cross-domain resources

An access method and access device technology, applied in the Internet field, can solve the problems of increasing system risks and complicated user operations, and achieve the effects of improving security, speeding up, and reducing authentication steps.

Active Publication Date: 2018-10-02
ULTRAPOWER SOFTWARE
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, if a user wants to access application resources in multiple network security domains, security authentication must be performed in each network security domain, and multiple security authentications will increase system risks and complicate user operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for accessing cross-domain resources
  • A method and device for accessing cross-domain resources
  • A method and device for accessing cross-domain resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060]In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the following describes the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings For further detailed explanation.

[0061] An embodiment of the present invention provides a method for accessing cross-domain resources, the specific process is as follows figure 1 As shown, can include:

[0062] Step 101. Obtain an access mapping relationship between a first security domain and a second security domain in another security domain.

[0063] In the embodiment of the present invention, the network security domain where the user logs in is called the "first security domain", and the network security domain that the user accesses across domains throu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a cross-domain resource access method and device. The cross-domain resource access method comprises the steps of obtaining an access mapping relation between a first safety domain, and a second safety domain in other safety domains; receiving an access request for logging in the first safety domain, and carrying out authentication on the access request; and when the access request passes through the authentication, carrying out cross-domain access on the second safety domain according to the access mapping relation. Through the cross-domain resource access method and device disclosed by the embodiment of the invention, the access for a cross-domain resource can be realized, and the operation that a user accesses the network safety domains is simplified.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a method and device for accessing cross-domain resources. Background technique [0002] A network security domain refers to a subnet or network that has the same security protection requirements, mutual trust, and the same security access control and boundary control policies in the same system. The same network security domain shares the same security policy, while different network security domains share the same security policy. Firewalls need to be set up between domains for security protection. Usually, security verification information needs to be configured in the network security domain, that is, user information (including user name and password information), and the current access user is authenticated through the security verification information. [0003] When a user needs to access application resources in a certain target network security domain, the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 王星亮苏砫周建波王秀娟张晓琳高峰张建军
Owner ULTRAPOWER SOFTWARE