Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access security control method and system

An access security control and legal technology, which is applied in the field of access security control methods and systems, can solve the problems of inability to effectively prevent illegal terminal access, low security factor of access security control, and high probability of being attacked, so as to save network operation costs , reduce the probability of being attacked, and enhance the effect of security

Inactive Publication Date: 2019-04-12
DONGGUAN JIANDA INFORMATION TECH CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of this subject, traditional password encryption, decryption, authentication, and update methods cannot effectively prevent illegal terminal access, access security control has a low safety factor, and the probability of being attacked is high, which directly leads to an increase in operating costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access security control method and system
  • Access security control method and system
  • Access security control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0026] Please refer to figure 1 and image 3 As shown, in the access security control method provided by the present invention, the method includes: S101 The terminal sends a service request to the server, and obtains the current device's identity number and device address according to the received service response; ID and the device address are encrypted and sent to the server; S103 matches the pre-stored data according to the ID number and the device address; S104, when the matching is passed, the server responds to the service request of the terminal ; Wherein, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access security control method and system. The method includes: sending a service request to a server by a terminal, and obtaining an identity identification number and an equipment address of the current equipment according to received service response; respectively encrypting the identity identification number and the equipment address, and then sending the same to theserver; carrying out matching with pre-stored data according to the identity identification number and the equipment address; and responding to the service request of the terminal by the server when matching is successful. Therefore, a security factor of security access control is increased, probability of being attacked is lowered, and network operation costs are saved.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to an access security control method and system. Background technique [0002] "Internet" refers to a global information system, which is an interactive platform that can communicate with each other, communicate with each other, and participate in each other. Therefore, Internet security issues should be prevented before they happen, just like the fire prevention and anti-theft issues of every household. When you don't even think that you will become a target, the threat has already appeared. Once it happens, you are often caught off guard and cause great losses; if you communicate with the external and internal networks, the machine security of the internal network will be threatened. , but also affects many other systems on the same network. For this, we must first monitor and discover various security events and risks in the network. Risks can only be controlled if they are know...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/0876H04L63/10
Inventor 王兴军冯发润白育文黄海平
Owner DONGGUAN JIANDA INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products