Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identification method, identification device and terminal for access rights requested by a browser

A technology for access rights and identification devices, which is applied in the direction of safety communication devices, digital transmission systems, electrical components, etc., to achieve the effect of improving security

Active Publication Date: 2022-02-15
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides an identification method, an identification device, and a terminal for the access authority requested by the browser, to solve the problem that the authentication of the server to the terminal cannot achieve accurate access authority in the current solution, and to improve the security of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identification method, identification device and terminal for access rights requested by a browser
  • An identification method, identification device and terminal for access rights requested by a browser
  • An identification method, identification device and terminal for access rights requested by a browser

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0073] The shapes and sizes of the components in the drawings do not reflect the real scale, but are only intended to schematically illustrate the content of the present invention.

[0074] In the following, some terms used in the embodiments of the present invention are explained to facilitate the understanding of those skilled in the art.

[0075] (1) In the embodiment of the present invention, the system information of the terminal i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identification method, an identification device and a terminal for access rights requested by a browser. The method includes: the identification device calculates a first AID for identifying system information according to the system information of the terminal; The verification value of the session information, the system information and the session information are identified by authority, and the authority identification information identifying the access authority requested by the browser is obtained; the browser is identified according to the Header and authority identification information of the HTTP / HTTPS protocol requested by the browser Requested access rights; Header includes check value, first AID and session information. In this way, the identification device can evaluate the compliance of the terminal's operator, system application and other attributes without resorting to any equipment, so that the terminal can be authenticated to accurately authorize access rights and improve the efficiency of the terminal. network security.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an identification method, an identification device and a terminal of an access authority requested by a browser. Background technique [0002] In the intricate network environment and terminal environment, how to identify a large number of browser requests is of great significance to network security. [0003] Currently, when a user sends a browser request to the server (server) through a terminal (client), the server only identifies the access rights requested by the browser by judging the legitimacy of the web account password, and the server only Part of the information of the terminal (such as IP address) is identified, but other attributes of the current terminal (such as operating system account, etc.) cannot be known. These attributes are restricted by the operating system of the terminal, and the server cannot obtain it from the front-end code of the web, so tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L69/22
CPCH04L63/10H04L63/08H04L63/20H04L69/22
Inventor 黄龙谭建伟刘业欣
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products