Resource access method, device, electronic device and system
A technology for resource access and authentication equipment, applied in the network field, can solve problems such as insufficient authentication, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0101] In order to facilitate the understanding of this embodiment, first, a detailed description of the operating environment for executing the resource access method disclosed in the embodiment of the present application is given.
[0102] like figure 1 As shown, it is a schematic diagram of the environment of the resource access system provided by the embodiment of the present application. The security gateway 120 is in communication connection with one or more client terminals 110 for data communication or interaction. The client terminal 110 may be a personal computer (PC), a tablet computer, a smart phone, a personal digital assistant (PDA), or the like. The security gateway 120 may be used to perform security verification on the data sent by the client terminal 110 .
[0103] Illustratively, the security gateway 120 may be composed of a router and a processor. Security gateway 120 may provide protocol, link and application level protection.
[0104] Optionally, as ...
Embodiment 2
[0118] see image 3 , which is a flowchart of the resource access method provided by the embodiment of the present application. The following will image 3 The specific process shown is described in detail.
[0119] Step 302: Calculate the data body in the data packet to be sent that needs to be signed to obtain a data digest.
[0120] Optionally, the data body in the data packet to be sent that needs to be signed is calculated using a hash algorithm to obtain a data digest. Exemplarily, the hash algorithm may be a message digest algorithm (MD5 Message-Digest Algorithm).
[0121] Optionally, a 128-bit (16-byte) hash value can be generated by the message digest algorithm.
[0122] Exemplarily, the above-mentioned data body may represent other data parts other than the IP header and the option part of the data packet to be sent.
[0123] In one embodiment, before step 302, the resource access method may further include: filtering out the data packets to be sent that need to...
Embodiment 3
[0162] Based on the same application concept, the embodiment of the present application also provides a resource access device corresponding to the resource access method. Since the principle of solving the problem by the device in the embodiment of the present application is similar to the embodiment of the resource access method provided in the foregoing second embodiment, Therefore, for the implementation of the apparatus in this embodiment, reference may be made to the descriptions in the foregoing method embodiments, and repeated descriptions will not be repeated.
[0163] see Figure 5 , is a schematic diagram of functional modules of the resource access device provided by the embodiment of the present application. Each module in the resource access apparatus in this embodiment is configured to execute each step in the foregoing method embodiment. The resource access device includes: a computing module 401, an encryption module 402 and a first sending module 403; wherei...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com