Unlock instant, AI-driven research and patent intelligence for your innovation.

User non-perception image bastion machine method and system

A non-sensing, bastion machine technology, applied in the field of network security, can solve problems such as adding steps to use, and achieve the effect of optimizing user experience

Inactive Publication Date: 2019-04-23
中电福富信息科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, if you need to remember the account password (single sign-on function), you need to host the account password to the bastion machine, and you must log in to the web system first to access the windows server, which increases the use steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User non-perception image bastion machine method and system
  • User non-perception image bastion machine method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as figure 1 As shown in or 2, the present invention discloses a user-insensitive image bastion machine method, and the system adopted includes a client, a management platform, a proxy server and WINDOWS assets; the client communicates with the management platform and the proxy server respectively, and the management platform Connect proxy server, the management platform is preset with accessible WINDOWS asset list information, the proxy server is provided with RDP service end, wherein RDP (Remote Desktop Protocol) Remote Desktop Protocol; method comprises the following steps:

[0026] Step 1, the user enters the user name and password to log in to the client

[0027] Step 2, after the client authentication is passed, obtain the accessible WINDOWS asset list information from the management platform for display;

[0028] Step 3, the user selects the actual WINDOWS asset and connects to the actual WINDOWS asset;

[0029] Step 4, the client redirects the access traff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user non-perception image bastion machine method and system. The method comprises the following steps that: S1, a user inputs a user name and a password to log in a client; S2, after identity verification of the client is passed, accessable WINDOWS asset list information is acquired from a management platform to be displayed; S3, the user selects an actual WINDOWS asset and is connected with the actual WINDOWS asset; S4, the client redirects and connects access traffic to a proxy server by a WFP driver; S5, an RDP (Remote Desktop Protocol) server side of the proxy server receives the access traffic and verifies whether the user has an access authority; S6, the RDP server side acquires connection information that the user is connected to the actual WINDOWS asset; S7, the RDP server side of the proxy server connects and forwards the access traffic to the actual WINDOWS asset; and S8, the RDP server side of the proxy server carries out audit and video recording on a forwarded RDP. According to the invention, non-perception audio and authority control are carried out on operation of the user on windows.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a user-unaware image bastion machine method and system. Background technique [0002] In the traditional bastion host network structure, if the user needs to access the windows server, he needs to access the web system first, and then access the windows server on the web system. In this way, if you need to remember the account password (single sign-on function), you need to host the account password to the bastion host, and you must log in to the web system first to access the windows server, which increases the use steps. If you can directly use the mstsc tool to access the windows server and maintain the auditing and recording functions of the bastion host, this will greatly improve the usability of the system. Contents of the invention [0003] The purpose of the present invention is to provide a user-insensitive image bastion machine method and system. [0004] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/101H04L63/306H04L67/141H04L67/563H04L67/56
Inventor 胡荣汤义成黄丽荣林文芯
Owner 中电福富信息科技有限公司