Service access method and apparatus, terminal, server and storage medium

A business access and server technology, applied in the field of communications, can solve the problems of easy discovery and attack of cloud business systems, and achieve the effect of avoiding discovery or attack

Inactive Publication Date: 2019-02-05
MEITONGYUNDONG BEIJING TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of the present invention is to provide a service access method, device, terminal, se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service access method and apparatus, terminal, server and storage medium
  • Service access method and apparatus, terminal, server and storage medium
  • Service access method and apparatus, terminal, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] This embodiment provides a service access method, the execution subject is an authentication server, and the authentication server is set on the side of the service server.

[0030] Such as figure 1 As shown, the service access method provided in this embodiment includes the following steps.

[0031] Step 11. The authentication server receives authentication information from a client, and the client is a client associated with the authentication server.

[0032] The client is installed on the terminal used by the user. The terminal can be a mobile terminal, such as a mobile phone, a tablet computer, a notebook, etc.; the terminal can also be a personal computer. Specifically, the client may be a browser.

[0033] The client is associated with the authentication server, and the specific association method can be pre-configured by a dedicated person.

[0034] The address of the authentication server is not public, and only the client associated with the authentication...

Embodiment 2

[0053] This embodiment provides a service access device, such as figure 2 As shown, the service access device includes:

[0054] The first communication unit 21 is configured to receive authentication information from a client, the client is a client associated with the service access device,

[0055] A processing unit 22, configured to establish a communication link between the service access device and the client according to the authentication information; the communication link is used to receive a service access request from the client, and the service access Request is used to request access to the service server.

[0056] The service access device provided in this embodiment can be implemented with reference to the contents recorded in Embodiment 1, and details are not repeated here.

[0057] This embodiment has the following advantages: the service system is hidden behind the service access device, the service system can always remain invisible, and the hidden servi...

Embodiment 3

[0059] This embodiment provides a service access device, such as image 3 As shown, the service access device includes:

[0060] The second communication unit 31 is configured to send authentication information to the authentication server through the client, the client is a client associated with the authentication server, and the authentication server is set on the service server side; the authentication information is used for Establishing a communication link between the authentication server and the client; the communication link is used to send a service access request to the authentication server through the client, and the service access request is used to request access to the service server .

[0061] The service access device provided in this embodiment can be implemented with reference to the contents recorded in Embodiment 1, and details are not repeated here.

[0062] This embodiment has the following advantages: the service system is hidden behind the authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a service access method and apparatus, a terminal, a server and a storage medium. The service access method comprises the following steps: receiving, by an authentication server, authentication information from a client, wherein the client is a client associated with the authentication server; and establishing a communication link between the authentication server and the client according to the authentication information, wherein the communication link is used for receiving a service access request from the client, and the service access request is used for requesting to access the service server. The service access method and apparatus disclosed by the embodiment of the invention has the following advantages: a service system is hidden behind theauthentication server, the service system can always remain invisible, and the hidden service system becomes an invisible boundary; and a user can access the service system through the communicationlink between the client and the authentication server, thereby preventing the service system from being discovered or attacked without affecting the access to the service system by the server.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a service access method, device, terminal, server and storage medium. Background technique [0002] With the development of the Internet, enterprise IT architecture is changing from "boundary" to "boundaryless". [0003] In the past, enterprise IT infrastructure and user offices were located on the enterprise intranet, and the enterprise IT architecture was bounded. In the context of mobility and cloudification, more and more business systems are migrated to the cloud, and the network environment of enterprises is becoming more and more complex. [0004] When an enterprise's business systems (OA, CRM, CMS, etc.) are migrated to the cloud, each business system of the enterprise is exposed on the public cloud, which is very easy to be detected and attacked. Contents of the invention [0005] The purpose of the embodiments of the present invention is to provide a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/141H04L67/51
Inventor 陈本峰付安龙崔琳琳
Owner MEITONGYUNDONG BEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products