Unlock instant, AI-driven research and patent intelligence for your innovation.

User security access method

A security access and user technology, applied in the field of information security, can solve the problem of insufficient security of user security access methods, and achieve the effect of satisfying use and high security

Active Publication Date: 2019-10-11
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem of insufficient security of the current user security access method, and to provide a user security access method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] The user security access method in the embodiment of the present invention specifically includes the following steps:

[0034] Step 1. The access device is started, and the terminal blacklist and access information table are initialized.

[0035] In this step, the blacklist may at least include the IP address of the user terminal and the last access information of the corresponding user terminal. The access information table can at least include the IP address 3001 of the user terminal, the number of visits of the user terminal and whether it satisfies the PING access strategy, etc., and whether each user terminal in the access information table satisfies the PING access strategy is preferably defaulted to no.

[0036] Step 2. The access device issues a PING access policy.

[0037] In this step, the PING access policy refers to a set of behaviors for performing PING access to the agreed port of the access device.

[0038] Step 3. The access device closes the PING res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information security technology. In order to solve the problem that the existing user security access method is not enough in security, the invention provides a user security access method. The technical scheme of the method can be summarized by the following steps: firstly, starting an access device, and initializing a terminal blacklist and an access information table; after that, using the access device to issue a PING access strategy and closing PING response, and then enabling a user terminal to visit the access device according to the PING access strategy; using the access device to judge whether the IP of the user terminal is included in the blacklist or not; if yes, enabling the access device to reject the visit of the user terminal; if not, using the access device to judge whether an access sequence of the user terminal is consistent with a sequence of the PING access strategy of the access device or not and judge whether the access behavior of the user terminal needs to be recorded on the backlist or not; if yes, enabling the access device to respond to the PING of the user terminal; if not, recording the user terminal on the blacklist. The user security access method has the beneficial effect of improving the security, thus being suitable for user security access.

Description

technical field [0001] The invention relates to information security technology, in particular to user security access technology. Background technique [0002] With the rapid development of the Internet and mobile informatization, more and more users access the Internet, and there are more and more types of Internet devices. Network security risks have gradually become a more prominent problem. Various phenomena such as stealing users' private information and stealing user accounts emerge in an endless stream on the Internet. How to effectively provide secure connections to legal users has attracted widespread attention in the industry, because only by first ensuring the secure access of users is the basis for providing high-quality services to users. [0003] At present, there are many ways for the server to identify legitimate users and provide secure access to real users, and the technical solution implemented may be a combination of these methods, such as installing an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李强
Owner SICHUAN CHANGHONG ELECTRIC CO LTD