Unlock instant, AI-driven research and patent intelligence for your innovation.

Resource sharing method and device, resource access method and device and computer readable storage medium

A technology of resource sharing and resource access, applied in the field of access methods, devices and computer-readable storage media, and resource sharing, can solve the problems of replaying attack data information, security risks, tampering attacks, etc., to ensure information security, avoid data Effects of security concerns

Pending Publication Date: 2021-03-26
SHENZHEN COMTOP INFORMATION TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When users access resources on the server side through the client, they will access them through a unified interface, but this method of accessing the server side through the interface often has security risks, such as masquerading attacks, tampering attacks, replay attacks, and data information. risk of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource sharing method and device, resource access method and device and computer readable storage medium
  • Resource sharing method and device, resource access method and device and computer readable storage medium
  • Resource sharing method and device, resource access method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The embodiments of the present application are described in detail below, and examples of the embodiments are illustrated in the drawings, wherein the same or similar reference numerals are indicated by the same or similar elements or elements having the same or similar functions. The following is exemplary, and is intended to explain the present application by referring to the embodiments described with reference to the accompanying drawings.

[0042] It should be noted that the logical order is shown in the flowchart, but in some cases, the steps shown or described may be performed in the order in different flowcharts. If there is a description to the first, the second is only for distinguishing the technical features, and cannot be understood as an indication or implies the reproduction of the technical features indicated by the indicated technical features or implicitly indicated the technical features indicated. relationship.

[0043]It should be noted that "one", "one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a resource sharing method and device, a resource access method and device and a computer readable storage medium, and relates to the technical field of computers. The resourcesharing method comprises the following steps: acquiring an access request of a client, extracting an identity identifier of the client carried in the access request, decrypting the identity identifierto obtain first user information of the client, comparing the first user information with second user information sent by the client, and if the first user information is consistent with the second user information, carrying out resource sharing with the client according to the access request, so identity authentication can be carried out on the client when the client carries out resource accesson the interface of the server side, so that the information security of the server side is ensured, and the data security problem is avoided.

Description

Technical field [0001] The present application relates to computer technology, and more particularly to a resource sharing, access method, device, and computer readable storage medium. Background technique [0002] With the appearance of online information tampering, network information validity has become focus on focus. When the user performs resource access via the client, it is accessed by a unified interface, but this way to access the server through the interface often exist security hazards, for example face camouflage attacks, tamper attacks, playback attacks, and data information. Leakage risks. Inventive content [0003] The present application is intended to address at least one of the technical problems present in the prior art. To this end, this application proposes a resource sharing method that can authenticate the client when the client interfaces are resource access, ensuring the information security of the server side to ensure data security issues. [0004] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6218G06F21/604G06F2221/2141
Inventor 赵铭林圳杰彭浩
Owner SHENZHEN COMTOP INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More