Access control method, terminal, server and system

An access control and server technology, applied in the computer field, can solve problems such as illegally obtaining server resources, and achieve the effect of avoiding illegal access

Inactive Publication Date: 2019-07-23
BEIJING QIANXIN TECH
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing single-packet authorization is based on a pre-established static single-factor authentication strategy
Once the authentication information is leaked, it is easy to forg

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, terminal, server and system
  • Access control method, terminal, server and system
  • Access control method, terminal, server and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] In order to make the objectives, features, and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the description is The embodiments are only a part of the embodiments of the present invention, but not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work shall fall within the protection scope of the present invention.

[0041] See figure 1 , figure 1 It is a schematic flowchart of an access control method applied to a terminal according to an embodiment of the present invention, and the method mainly includes the following steps S101 to S103:

[0042] S101: When it is detected that the resource requester in the terminal sends an access request to the ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method applied to a terminal. The method comprises the following steps: when a resource requester in a terminal is detected to send an access request to a server, collecting preset information of a resource requester, wherein the preset information comprises a plurality of pieces of attribute information related to the resource requester; generating a single data packet authorization request based on the preset information and the access request, and sending the single data packet authorization request to a server, and enabling the server to open a resource access port to a resource requester under the condition that the single data packet authorization request is forwarded to an authorization control system by the server and the authorization control system verifies the single data packet authorization request successfully. The invention also discloses an access control method applied to the server, a terminal, the server and an access controlsystem. The preset information of the resource requester is used as the authorization certificate, so that an attacker cannot forge the authorization data of the single data packet easily, and illegal access caused by leakage of the authorization information is avoided.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an access control method, terminal, server and system. Background technique [0002] SPA (Single Packet Authorization, single packet authorization) is based on the filtering strategy of discarding packets by default, sending authentication and authorization requests through a single encrypted packet, so that the protected server opens a port to a specific client, and Clients that have not passed authentication and authorization cannot detect the protected service port, thereby improving system security. [0003] However, the existing single-packet authorization is based on a pre-established static single-factor authentication strategy. Once the authentication information is leaked, it is easy to forge the authentication request to obtain port access rights and illegally obtain server resources; In this case, the attacker can directly access server resources through th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0838H04L63/0853H04L63/0876
Inventor 刘成伟魏勇简明张泽洲
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products