Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Resource access method, device and system and electronic device

A resource access and gateway device technology, applied in the network field, can solve problems such as insufficient authentication, and achieve the effect of achieving integrity and improving security

Active Publication Date: 2020-02-21
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing authentication for access to external resources is still insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method, device and system and electronic device
  • Resource access method, device and system and electronic device
  • Resource access method, device and system and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] In order to facilitate the understanding of this embodiment, an operating environment for executing a resource access method disclosed in the embodiment of the present application is first introduced in detail.

[0102] Such as figure 1 As shown in , it is a schematic diagram of the environment of the resource access system provided by the embodiment of the present application. The security gateway 120 communicates with one or more client terminals 110 for data communication or interaction. The client terminal 110 may be a personal computer (personal computer, PC), a tablet computer, a smart phone, a personal digital assistant (personal digital assistant, PDA) and the like. The security gateway 120 may be used to perform security verification on the data sent by the client terminal 110 .

[0103] Exemplarily, the security gateway 120 may be composed of a router and a processor. Security gateway 120 may provide protocol, link and application level protection.

[0104...

Embodiment 2

[0118] see image 3 , is a flow chart of the resource access method provided by the embodiment of the present application. The following will be image 3 The specific process shown will be described in detail.

[0119] Step 302, calculate the data body in the to-be-sent data packet that needs to be signed, so as to obtain the data digest.

[0120] Optionally, the hash algorithm is used to calculate the data body in the to-be-sent data packet that needs to be signed, so as to obtain the data digest. Exemplarily, the hash algorithm may be a message digest algorithm (MD5Message-Digest Algorithm).

[0121] Optionally, a 128-bit (16-byte) hash value (hashvalue) can be generated through a message digest algorithm.

[0122] Exemplarily, the above-mentioned data body may represent other data parts of the to-be-sent data packet except the IP header and the option part.

[0123] In an implementation manner, before step 302, the resource access method may further include: filtering ...

Embodiment 3

[0162] Based on the same application idea, the embodiment of the present application also provides a resource access device corresponding to the resource access method. Since the problem-solving principle of the device in the embodiment of the present application is similar to the resource access method embodiment provided in the second embodiment above, Therefore, the implementation of the device in this embodiment can refer to the description in the embodiment of the above-mentioned method, and repeated descriptions will not be repeated.

[0163] see Figure 5 , is a schematic diagram of functional modules of the resource access device provided in the embodiment of the present application. Each module in the resource access device in this embodiment is used to execute each step in the above method embodiment. The resource access device includes: a calculation module 401, an encryption module 402, and a first sending module 403; wherein,

[0164] Calculation module 401, use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a resource access method, device and system and an electronic device, wherein the method comprises the steps of calculating a data body in a to-be-transmitted data package whichneeds to be signed so as to obtain a data abstract; encrypting the data abstract by using a set encryption key to obtain a data signature of the to-be-sent data; and sending the target data packet with the data signature to a gateway device, wherein the data signature is used for the gateway device to verify the target data packet.

Description

technical field [0001] The present application relates to the field of network technology, in particular, to a resource access method, device, electronic equipment and system. Background technique [0002] The distribution of data resources is divided into local area resources and external area resources. The area to which the terminal belongs is called the local area, and the area other than the local area to which the relative terminal belongs is called the external area. Terminals do not need to pass through the firewall when accessing resources in the local area, and can communicate freely between devices below the firewall. When a terminal accesses external area resources, it needs to pass through the firewall. At this time, it is necessary to install a digital certificate and an authentication client on the terminal accessing external area resources, and the terminal needs to pass the health check and authentication before passing through the security gateway device. F...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/10H04L63/0823H04L63/20H04L9/3247H04L9/3263
Inventor 曹良景何炳岳
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products