Resource access method, device and system and electronic device
A resource access and gateway device technology, applied in the network field, can solve problems such as insufficient authentication, and achieve the effect of achieving integrity and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0101] In order to facilitate the understanding of this embodiment, an operating environment for executing a resource access method disclosed in the embodiment of the present application is first introduced in detail.
[0102] Such as figure 1 As shown in , it is a schematic diagram of the environment of the resource access system provided by the embodiment of the present application. The security gateway 120 communicates with one or more client terminals 110 for data communication or interaction. The client terminal 110 may be a personal computer (personal computer, PC), a tablet computer, a smart phone, a personal digital assistant (personal digital assistant, PDA) and the like. The security gateway 120 may be used to perform security verification on the data sent by the client terminal 110 .
[0103] Exemplarily, the security gateway 120 may be composed of a router and a processor. Security gateway 120 may provide protocol, link and application level protection.
[0104...
Embodiment 2
[0118] see image 3 , is a flow chart of the resource access method provided by the embodiment of the present application. The following will be image 3 The specific process shown will be described in detail.
[0119] Step 302, calculate the data body in the to-be-sent data packet that needs to be signed, so as to obtain the data digest.
[0120] Optionally, the hash algorithm is used to calculate the data body in the to-be-sent data packet that needs to be signed, so as to obtain the data digest. Exemplarily, the hash algorithm may be a message digest algorithm (MD5Message-Digest Algorithm).
[0121] Optionally, a 128-bit (16-byte) hash value (hashvalue) can be generated through a message digest algorithm.
[0122] Exemplarily, the above-mentioned data body may represent other data parts of the to-be-sent data packet except the IP header and the option part.
[0123] In an implementation manner, before step 302, the resource access method may further include: filtering ...
Embodiment 3
[0162] Based on the same application idea, the embodiment of the present application also provides a resource access device corresponding to the resource access method. Since the problem-solving principle of the device in the embodiment of the present application is similar to the resource access method embodiment provided in the second embodiment above, Therefore, the implementation of the device in this embodiment can refer to the description in the embodiment of the above-mentioned method, and repeated descriptions will not be repeated.
[0163] see Figure 5 , is a schematic diagram of functional modules of the resource access device provided in the embodiment of the present application. Each module in the resource access device in this embodiment is used to execute each step in the above method embodiment. The resource access device includes: a calculation module 401, an encryption module 402, and a first sending module 403; wherein,
[0164] Calculation module 401, use...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com