Gateway protection method and data labeling method

A labeling and data technology, which is applied in the field of gateway protection and data labeling, can solve data security threats and other issues, and achieve the effect of ensuring data security and improving reliability

Active Publication Date: 2021-08-24
GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventor found during the implementation process that once the attacker obtains the correct domain name, he may even bypass the user authentication link to illegally access the internal system of the enterprise, thereby posing a threat to data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gateway protection method and data labeling method
  • Gateway protection method and data labeling method
  • Gateway protection method and data labeling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0048] The gateway protection method and data labeling method provided by this application can be applied to such as figure 1shown in the application environment. Wherein, the user may perform login authentication on the authentication server 103 on the user terminal 102 . The domain name resolution server 106 can perform domain name resolution for the user's access request. The security gateway server 104 performs data communication with the user terminal 102 through the VPN 103, and can verify the validity of the domain name of the access request initiated by the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a gateway protection method and a data labeling method. In the gateway protection method, a legal user passes login verification of an authentication server, and the authentication server marks a specific label on an access request data packet sent by a user terminal and sends the access request data packet to a security gateway server; the domain name resolution server performs domain name resolution on the access request data packet, sends the resolved domain name information to the security gateway server, and sends an interception notification to the security gateway server if the resolution fails. And when the security gateway server works, the received access request data packet sent by any user terminal is verified, and the access with no specific label or illegal user domain name in the access request data packet is intercepted. Through dual authentication of the domain name and the identity tag, only the access request data packet which contains a specific tag and has a legal domain name can pass through the gateway, so that the gateway protection reliability is improved.

Description

technical field [0001] The present application relates to the technical field of network security protection, in particular to a gateway protection method and a data labeling method. Background technique [0002] The promotion of mobile applications meets the needs of accessing internal systems during remote office and on-site operations, and provides great convenience for enterprise employees. However, with the increasing number of users, the security issue of the mobile terminal is also extremely important. The introduction of VPN (Virtual Private Network, virtual private network) provides a solution for the secure access of enterprise resources. A number of key technologies are applied in VPN, among which network data packet interception is the most important technology. By filtering and intercepting data packets, it realizes the encrypted protection of application access and ensures that users can safely access the internal system of the enterprise. [0003] The existin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/46
CPCH04L63/306H04L63/0807H04L63/0876H04L63/10H04L12/4666H04L61/4511
Inventor 黄士超钟国新吴梓宏梁兆楷温诗华王辉鹏
Owner GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products