Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure remote access system, method, computer equipment and storage medium

A remote access and security technology, applied in the field of secure remote access systems, can solve problems such as malware theft and potential safety hazards

Active Publication Date: 2021-09-10
南京敏宇数行信息技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In our daily life, remote access through a browser is the most common way. Every time we surf the Internet, it is actually a remote access application. In this process, there are actually security risks. With the development of Internet technology, there are more and more types of software. There are many good software that can bring great help to our life and work, but there are also many malicious software that can steal our information. Therefore, remote Access security issues must be considered
[0004] Most of the existing remote access systems have their own security measures, but as long as the system has personal information, it will be subject to more or less network attacks. For these attacks, most systems use verification codes + passwords for security, but many In this case, for the same attack source, the system needs to deal with every malicious access, which is obviously unnecessary. If some invalid security protection can be eliminated, the computing resource utilization of the system can be greatly improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure remote access system, method, computer equipment and storage medium
  • A secure remote access system, method, computer equipment and storage medium
  • A secure remote access system, method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] figure 2 A flow chart of a secure remote access method is shown. In an embodiment of the present invention, a secure remote access method includes step S200-step S1000:

[0075] Step S200: receiving a user access request, obtaining the user's location and access purpose, and determining a verification question according to the access purpose;

[0076] The purpose of step S200 is to determine the verification problem. The purpose of the verification problem is to judge whether it is a manual operation, so as to prevent the machine from trying the password. It is a picture, and then there is a verification code on the picture. According to the verification code, it is judged whether it is a manual operation. However, with the improvement of the image recognition algorithm, the existing computer equipment can gradually recognize the verification code, and then pass the verification. Therefore, in order To make the verification code link play a role, it can only increase ...

Embodiment 2

[0118] Figure 6 It shows a structural block diagram of a secure remote access system. In an embodiment of the present invention, a secure remote access system is provided. The system is applied to a central terminal, and the system 10 includes:

[0119] Verification module 11, is used for receiving user's visit request, obtains user location and visit purpose, determines verification problem according to described visit purpose;

[0120] The verification module 11 is used to complete step 200;

[0121] The first recording module 12 is used to obtain the user's answer to the verification question. When the user's answer is wrong, the number of errors is recorded. When the number of errors is greater than the preset first number threshold, the access process is closed and The number of malicious visits in the area corresponding to the user location is increased by one;

[0122] The first recording module 12 is used to complete step 400;

[0123] A reading module 13, configur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of data security, and specifically discloses a secure remote access system, method, computer equipment, and storage medium. The system includes a verification module, a first recording module, a reading module, a comparison module, and a second recording module , the reading module is used to read the number of malicious visits in the corresponding area according to the user's location when the user's answer is correct; the comparison module is used to read the number of malicious visits when the number of malicious visits is less than a preset threshold , acquire user account information, and compare the user account information with the registration information. The present invention marks each malicious access and establishes a relationship with the area where it is located. When receiving an access request, it first obtains the number of malicious accesses in the area, and blocks some invalid accesses according to the number of malicious accesses, which greatly reduces the risk of invalid security. The quantity improves the utilization rate of computing resources, the effect is excellent, and it is easy to promote.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a secure remote access system, method, computer equipment and storage medium. Background technique [0002] The so-called remote access means that the client uses WAN technology to log in to the local network through some remote connection method (such as Modem + telephone line). As for "remote", it may not be thousands of miles away, it may be next door. Obviously, Remote Access Service (RAS) is to allow computers to access local network resources through some kind of remote connection, and provide access services for users who do not have the conditions to directly connect to the local network. [0003] In our daily life, remote access through a browser is the most common way. Every time we surf the Internet, it is actually a remote access application. In this process, there are actually security risks. With the development of Internet technology, there are more and more...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F9/54
CPCG06F9/547H04L63/02H04L63/08H04L63/083
Inventor 何宇
Owner 南京敏宇数行信息技术有限公司