Unlock instant, AI-driven research and patent intelligence for your innovation.

An access protection method and system

A technology of access request and data access, applied in the direction of transmission system, electrical components, etc., can solve illegal use, illegal use of dongle software, etc., and achieve the effect of preventing illegal use, safe seamless connection, and strong applicability

Active Publication Date: 2019-12-13
BEIJING SENSESHIELD TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the dongle is lost or obtained illegally, it will result in illegal use of the dongle and thus the software
In the prior art, in order to prevent others from obtaining the encryption lock and using it illegally, the user can set account password and other information on the encryption lock. However, once the account is also stolen, illegal use will occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access protection method and system
  • An access protection method and system
  • An access protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Hereinafter, specific embodiments of the present invention will be described in detail with reference to the accompanying drawings, but it is not a limitation of the present invention.

[0058] The embodiments of the present invention provide an access protection method and system. The access protection method is suitable for secure access of hardware devices and access to the cloud, or access to other applications, web pages, etc., to provide secure login of accounts and access to devices / data. Secure access. Specifically, the embodiment of the present invention narrows the scope of the authorized area so that the user can only access the authorized device or software product within the authorized geographic area. Once you leave the authorized area, you will be restricted from access and cannot be used.

[0059] Specific, such as figure 1 As shown, the embodiment of the present invention provides a principle flowchart of an access protection method, which may include the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access protection method and system. The method comprises the steps of S1, receiving an access request; S2, obtaining region information of an initiator of the access request; and S3, judging whether the region information and the access request are valid or not and allowing to perform access operation requested by the access request when the region information and the access request are valid. According to the method and the system, the access security intensity of a device or software application can be further improved.

Description

Technical field [0001] The invention relates to the field of data security access, in particular to an access protection method and system. Background technique [0002] At present, with the development of network informatization, people are paying more and more attention to the safe use of networks and the safe use of equipment. For example, a hardware encryption lock, as a security device that protects the copyright of a product, is commonly used to encrypt software. If the dongle is lost or illegally obtained by someone, it will cause illegal use of the dongle and thus the software. In the prior art, in order to prevent others from obtaining the encryption lock and using it illegally, the user can set information such as account password on the encryption lock. However, once the account is also stolen, illegal use will occur. [0003] In addition, due to the increase in hardware costs, and in order to improve work efficiency and save costs, a cloud lock that can basically repl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/107
Inventor 孙吉平张文彬
Owner BEIJING SENSESHIELD TECH