Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure access method of application system

An application system and security access technology, which is applied in the field of application system security access, can solve the problems of malicious attacks by hackers, leakage of secrets, and vulnerability to attacks, etc., and achieve the effect of preventing illegal access, preventing illegal interception, and avoiding data leakage

Active Publication Date: 2017-05-17
厦门天锐科技股份有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Only the IP address of the terminal entering the application system is restricted, the identity of the visitor cannot be confirmed, and the IP address is easy to be stolen, and the restrictions will have great limitations on the convenience of access
[0006] 2. Due to business needs, many application systems have to expose addresses and ports to the external network, which is easily attacked by hackers
[0007] 3. Only restricting access to the application system requires an account number and password, which will expose the application system. The account number and password are easy to be cracked, and if the application system has loopholes, it is also easy to be attacked or bypass verification and directly enter the application system.
[0008] 4. Many application systems have the function of remembering passwords, which is convenient for users and easy for others to enter the application system
[0009] 5. After the user logs in to the application system, if he leaves the application system for some reason or does not completely exit the application system, it is also prone to hidden dangers of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method of application system
  • Secure access method of application system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] Such as Figure 1 to Figure 2 As shown, the present invention provides a security access method for an application system, the method provides a gateway server LdNetServer.exe, a configuration server LdDataServer.exe and a plurality of security terminals, the security access method comprises the following steps:

[0027] S01: Set the configuration data of the configuration server, and verify the user identity of the security terminal through the configuration data. If the user identity verification is passed, step S02 is executed. If the user ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure access method of an application system. The method includes the following steps that: the configuration data of a configuration server are set, the identity of the user of a secure terminal is verified through the configuration data; the user sends an encrypted request data packet to a gateway server through the secure terminal; the gateway server decrypts the request data packet, analyzes out the identification code of the secure terminal and the name of the application system which the secure terminal is to access, and calls the configuration server to verify the access authority of the secure terminal to the application system; and the gateway server forwards the decrypted request data packet to the application system and is responsible for encrypting a data packet returned by the application system and returning the encrypted data packet to the secure terminal. According to the secure access method of the application system of the invention, multiple measures are adopted to protect access, namely, terminal authentication, user login, authority verification and data encryption interaction are adopted, so that computers accessing the application system can be effectively restricted, illegal access can be prevented, the security of the application system can be ensured, and the security of data can be ensured.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method for secure access to an application system. Background technique [0002] In today's Internet era, application systems such as ERP, OA, and CRM have formed an indispensable part of enterprise office, but because of the vulnerability of software, leaks occur frequently, and application system security has become a problem of great concern to enterprises. . [0003] Implementation methods in the prior art include restricting access to the IP address of the terminal of the application system, restricting access to the application system requires an account number and a password, and the like. [0004] But, there is following defect in existing method or product: [0005] 1. Only the IP address of the terminal entering the application system is restricted, the identity of the visitor cannot be confirmed, and the IP address is also easily stolen, and the restriction will have g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10
Inventor 吴炜斌涂高元邱志斌陈雅贤
Owner 厦门天锐科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products