Gateway protection method and device, computer equipment and storage medium

A gateway and message data technology, which is applied in the field of information security, can solve problems such as security risks and violent attacks, and achieve the effect of ensuring non-tampering and information security

Inactive Publication Date: 2020-04-10
SWIFTPASS TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of this application is to propose a gateway protection method, which aims to solve the pro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gateway protection method and device, computer equipment and storage medium
  • Gateway protection method and device, computer equipment and storage medium
  • Gateway protection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0041] Embodiment one

[0042] figure 1 A flow chart of the implementation of the gateway protection method provided by Embodiment 1 of the present invention is shown, and for convenience of description, only parts related to the present invention are shown.

[0043] In step S101, an access request carrying message data sent by a requesting terminal is received.

[0044] In the embodiment of the present invention, the requesting terminal may be, for example, a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a navigation device, etc. It should be understood that the example of the requesting terminal here is only for convenience of understanding, and is not used to limit the present invention.

[0045] In the embodiment of the present invention, message data refers to an information carrier that is used to exchange information when requesting and re...

Example Embodiment

[0110] Embodiment two

[0111] further reference Figure 7 as to the above figure 1 The realization of the method shown, the application provides a gateway protection device, the device embodiment and figure 1 Corresponding to the illustrated method embodiments, the apparatus can be specifically applied to various electronic devices.

[0112] such as with Figure 7 As shown, the gateway protection device 100 provided by Embodiment 2 of the present invention includes: a request receiving module 101 , an interface matching module 102 , a matching failure module 103 , a signature verification module 104 , a verification success module 105 and a verification failure module 106 . in:

[0113] The request receiving module 101 is configured to receive an access request carrying message data sent by the requesting terminal;

[0114] The interface matching module 102 is used to respond to the access request and determine whether the message data meets the interface matching condit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention belongs to the field of information security, and relates to a gateway protection method and device, computer equipment and a storage medium, and the method comprises the steps: receiving an access request which is sent by a request terminal and carries message data; responding to the access request, and judging whether the message data meets an interface matching condition or not; if the message data does not meet the interface matching condition, outputting a matching failure signal to the request terminal; if the message data meets the interface matching condition, judging whether the message data meets a verification condition or not; if the verification data meets the verification condition, sending the access request to a service system according to apreset routing rule; and if the verification data does not meet the verification condition, outputting a verification failure signal to the request terminal. According to the method and the device, partial interface mismatching requests can be shielded, and the security is still kept when the network equipment is exposed; and meanwhile, the information security of data transmission is ensured.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a gateway protection method, device, computer equipment and storage medium. Background technique [0002] With the development of the Internet today, the connection between devices is getting closer and closer, and the security issues in the process of data transmission between devices have attracted more and more attention. When a high-risk virus breaks out in the network environment where the network device is located and the early warning system cannot remove the high-risk virus or perform system repair in time, it is difficult for users to take effective measures to deal with it because it is difficult to detect it in time, and it cannot effectively protect the security of the network device. [0003] There is an existing gateway protection method, which records and intercepts the number of events that pose a security threat to network equipment in real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/12H04L67/60
Inventor 王彤鲜丹叶成春玉其滴
Owner SWIFTPASS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products