Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safe remote access system and method

A remote access and security technology, applied in the field of secure remote access systems, can solve problems such as malware theft, single pass, information leakage, etc., and achieve the effect of improving security

Inactive Publication Date: 2021-04-02
南京敏宇数行信息技术有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In our daily life, remote access through a browser is the most common way. Every time we surf the Internet, it is actually a remote access application. In this process, there are actually security risks. With the development of Internet technology, there are more and more types of software. There are many good software that can bring great help to our life and work, but there are also many malicious software that can steal our information. Therefore, remote Access security issues must be considered
[0004] At present, most of the mainstream security methods adopt the method of passport plus verification code. This method has a good protection effect. By implanting plug-ins in the browser, accessing the browser through various software, the site that has an agreement with the software will not perform information verification because of the internal software access, which will bypass the original security measures and cause information leakage. In addition, most of the traditional passports are single passports, that is, a person has his own set of passports. For some important information, the security level of a passport is far from enough. How to improve the security level of the browser on the original basis? The security level of remote access is a problem that needs to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe remote access system and method
  • Safe remote access system and method
  • Safe remote access system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] figure 2 A structural block diagram of the secure remote access system 10 is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown:

[0074] In an embodiment of the present invention, the system 10 includes:

[0075] The security confirmation unit 11 is configured to receive the access request, determine the authority of the sender of the access request, and establish a connection channel based on the authority of the request sender;

[0076] The function of the security confirmation unit is to determine the source of the access. The sender of the access request here is the software, not the user. The purpose is to detect the method through which the user conducts remote access, because the purpose of the final access is the same. By restricting the source of access It is very effective and easy to improve security by means of a browser. At present, the stability of the browser is very high, and vari...

Embodiment 2

[0138] Figure 9 A block flow diagram of a secure remote access method is shown, and for ease of description, only parts related to this embodiment are shown:

[0139] In an embodiment of the present invention, the method includes:

[0140] Step S1: receiving the access request, determining the authority of the sender of the access request, and establishing a connection channel based on the authority of the sender of the request;

[0141] The step S1 is realized by the security confirmation unit 11;

[0142] Step S2: Acquiring the purpose of access, and judging the level of the purpose of access;

[0143] The step S2 is implemented by the access rating unit 12;

[0144] Step S3: Obtain verification information based on the level of the access purpose, and send access content based on the verification information;

[0145] The step S3 is realized by the identity verification unit 13;

[0146] further, Figure 10 A sub-flow block diagram showing a secure remote access meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of browser remote access, and particularly discloses a safe remote access system, which comprises a safety confirmation unit used for receiving an access request, judging the authority of an access request sender and establishing a connection channel based on the authority of the request sender; an access rating unit which is used for acquiring an access purpose and judging the level of the access purpose; an identity verification unit which is used for obtaining verification information based on the level of the access purpose and sending access content based on the verification information. According to the method, a remote access way is limited in a browser by detecting an access source, malicious programs are prevented from bypassing security means through common software, and a multi-account login way is set for important information, so that a user seeks friends to log in, and subsequent responsibility investigation is facilitated while the security is improved.

Description

technical field [0001] The invention relates to the technical field of browser remote access, in particular to a secure remote access system and method. Background technique [0002] The so-called remote access means that the client uses WAN technology to log in to the local network through some remote connection method (such as Modem + telephone line). As for "remote", it may not be thousands of miles away, it may be next door. Obviously, Remote Access Service (RAS) is to allow computers to access local network resources through some kind of remote connection, and provide access services for users who do not have the conditions to directly connect to the local network. [0003] In our daily life, remote access through a browser is the most common way. Every time we surf the Internet, it is actually a remote access application. In this process, there are actually security risks. With the development of Internet technology, there are more and more types of software. There ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/0876H04L63/105H04L67/02H04L67/141
Inventor 何宇丁立波
Owner 南京敏宇数行信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products