Access method, system and device based on multiple security protocols and medium

A security protocol and access method technology, applied in the field of computer software, can solve the problems of data leakage, protocol incompatibility, inconvenient network transmission and storage, etc., and achieve the effect of low cost, low consumption, avoiding garbled characters and parsing errors

Pending Publication Date: 2021-01-15
广州酷车信息科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the incompatibility of the protocols, it is difficult for the data of each platform to communicate with each other, and it can only be collected simply and mechanically, so that it will face the risk of data leakage; due to the inconsistency of the communication protocol, the data structure and form are inconsistent, which is not convenient for network transmission and Operations such as storage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method, system and device based on multiple security protocols and medium
  • Access method, system and device based on multiple security protocols and medium
  • Access method, system and device based on multiple security protocols and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention are described in detail below, and examples of the embodiments are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. For the step numbers in the following embodiments, it is only set for the convenience of illustration and description, and the order between the steps is not limited in any way. The execution order of each step in the embodiments can be adapted according to the understanding of those skilled in the art sexual adjustment.

[0036] The core ideas of the technical solutions provided by the embodiments of the present invention, such as figure 1 As shown, based on the optimized base64 encoding and decoding algorithm, single sign-on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access method, system and device based on multiple security protocols and a medium, and the method comprises the steps: obtaining an access request of a target resource, andobtaining a response message according to the access request; decoding a character string of the response message to obtain a first character string; dividing the first character string to obtain a header file, a load and a signature; verifying the signature through the header file, and outputting the data stream of the load when the verification result is correct. According to the method, the acquired response message is decrypted and transcoded, so accidents such as messy codes and analysis errors in a data transmission process can be avoided; the signature of the character string obtained by decoding is verified after the character string is divided, so the information in the response message can be ensured not to be tampered, the verification and trust are performed through the signature, and the reliability is higher; meanwhile, the process from request to response acquisition is light enough and convenient, the cost is low, and the consumption is low. The method can be widely applied to the technical field of computer software.

Description

technical field [0001] The invention belongs to the technical field of computer software, in particular to an access method, system, device and medium based on various security protocols. Background technique [0002] As the business coverage area of ​​the enterprise becomes wider and wider, and the organizational structure continues to expand, the corresponding enterprise also needs to develop multiple independent business systems or continuously expand the functions of the enterprise business system to maintain the normal operation of the enterprise , such as operation and maintenance release deployment platform, timing scheduling management, and daemon process scheduling management. For the development of various subsystems and the realization of extended functions, the development process can use a variety of computer languages ​​java, python, go and php, or complete data interaction with a variety of protocols. However, due to the incompatibility of the protocols, it i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/10H04L63/20
Inventor 李小红
Owner 广州酷车信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products