A secure remote access system, method, computer equipment and storage medium
A remote access and security technology, applied in the field of secure remote access systems, can solve problems such as malware theft and potential safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0074] figure 2 A flow chart of a secure remote access method is shown. In an embodiment of the present invention, a secure remote access method includes step S200-step S1000:
[0075] Step S200: receiving a user access request, obtaining the user's location and access purpose, and determining a verification question according to the access purpose;
[0076] The purpose of step S200 is to determine the verification problem. The purpose of the verification problem is to judge whether it is a manual operation, so as to prevent the machine from trying the password. It is a picture, and then there is a verification code on the picture. According to the verification code, it is judged whether it is a manual operation. However, with the improvement of the image recognition algorithm, the existing computer equipment can gradually recognize the verification code, and then pass the verification. Therefore, in order To make the verification code link play a role, it can only increase ...
Embodiment 2
[0118] Figure 6 It shows a structural block diagram of a secure remote access system. In an embodiment of the present invention, a secure remote access system is provided. The system is applied to a central terminal, and the system 10 includes:
[0119] Verification module 11, is used for receiving user's visit request, obtains user location and visit purpose, determines verification problem according to described visit purpose;
[0120] The verification module 11 is used to complete step 200;
[0121] The first recording module 12 is used to obtain the user's answer to the verification question. When the user's answer is wrong, the number of errors is recorded. When the number of errors is greater than the preset first number threshold, the access process is closed and The number of malicious visits in the area corresponding to the user location is increased by one;
[0122] The first recording module 12 is used to complete step 400;
[0123] A reading module 13, configur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


