Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Resource access method, device, electronic device and system

A technology for resource access and authentication equipment, applied in the network field, can solve problems such as insufficient authentication, and achieve the effect of improving reliability

Active Publication Date: 2022-07-12
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing authentication for access to external resources is still insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method, device, electronic device and system
  • Resource access method, device, electronic device and system
  • Resource access method, device, electronic device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] In order to facilitate the understanding of this embodiment, first, a detailed description of the operating environment for executing the resource access method disclosed in the embodiment of the present application is given.

[0102] like figure 1 As shown, it is a schematic diagram of the environment of the resource access system provided by the embodiment of the present application. The security gateway 120 is in communication connection with one or more client terminals 110 for data communication or interaction. The client terminal 110 may be a personal computer (PC), a tablet computer, a smart phone, a personal digital assistant (PDA), or the like. The security gateway 120 may be used to perform security verification on the data sent by the client terminal 110 .

[0103] Illustratively, the security gateway 120 may be composed of a router and a processor. Security gateway 120 may provide protocol, link and application level protection.

[0104] Optionally, as ...

Embodiment 2

[0118] see image 3 , which is a flowchart of the resource access method provided by the embodiment of the present application. The following will image 3 The specific process shown is described in detail.

[0119] Step 302: Calculate the data body in the data packet to be sent that needs to be signed to obtain a data digest.

[0120] Optionally, the data body in the data packet to be sent that needs to be signed is calculated using a hash algorithm to obtain a data digest. Exemplarily, the hash algorithm may be a message digest algorithm (MD5 Message-Digest Algorithm).

[0121] Optionally, a 128-bit (16-byte) hash value can be generated by the message digest algorithm.

[0122] Exemplarily, the above-mentioned data body may represent other data parts other than the IP header and the option part of the data packet to be sent.

[0123] In one embodiment, before step 302, the resource access method may further include: filtering out the data packets to be sent that need to...

Embodiment 3

[0162] Based on the same application concept, the embodiment of the present application also provides a resource access device corresponding to the resource access method. Since the principle of solving the problem by the device in the embodiment of the present application is similar to the embodiment of the resource access method provided in the foregoing second embodiment, Therefore, for the implementation of the apparatus in this embodiment, reference may be made to the descriptions in the foregoing method embodiments, and repeated descriptions will not be repeated.

[0163] see Figure 5 , is a schematic diagram of functional modules of the resource access device provided by the embodiment of the present application. Each module in the resource access apparatus in this embodiment is configured to execute each step in the foregoing method embodiment. The resource access device includes: a computing module 401, an encryption module 402 and a first sending module 403; wherei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a resource access method, device, electronic device and system, wherein the method includes: calculating a data body in a data packet to be sent that needs to be signed to obtain a data digest; using a set encryption key pair The data digest is encrypted to obtain the data signature of the data to be sent; the target data packet with the data signature is sent to the gateway device, and the data signature is used for the gateway device to verify the target data packet.

Description

technical field [0001] The present application relates to the field of network technologies, and in particular, to a resource access method, apparatus, electronic device, and system. Background technique [0002] The distribution of data resources is divided into local area resources and external area resources. The area to which the terminal belongs is called the local area, and the area outside the local area to which the terminal belongs is called the external area. Terminals do not need to pass through the firewall when accessing resources in the local area, and can communicate freely between devices below the firewall. When a terminal accesses resources in an external area, it needs to pass through the firewall. In this case, a digital certificate and an authentication client need to be installed on the terminal that accesses resources in the external area, and the terminal needs to pass the health check and authentication before it can pass through the security gateway...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/10H04L63/0823H04L63/20H04L9/3247H04L9/3263
Inventor 曹良景何炳岳
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products