System access method, gateway device, server, electronic device and storage medium

A technology of gateway equipment and access method, which is applied in the direction of transmission system, electrical components, etc., can solve the problem of low security of the access target system, and achieve the effect of improving security

Pending Publication Date: 2021-10-01
中移互联网有限公司 +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of an embodiment of the present invention is to provide a method for accessing a target system, a gateway device, a server, an electronic device, and a storage medium, so as to solve the problem of low security when accessing a target system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System access method, gateway device, server, electronic device and storage medium
  • System access method, gateway device, server, electronic device and storage medium
  • System access method, gateway device, server, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the technical solutions in one or more embodiments of the present invention, the following will describe the technical solutions in one or more embodiments of the present invention in conjunction with the drawings in one or more embodiments of the present invention The technical solution is clearly and completely described, and obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on one or more embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this document.

[0022] The embodiment of the present invention provides a method for accessing a target system, a gateway device, a server, an electronic device and a storage medium. The method for accessing the target system can be applied to electronic de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a target system access method, which comprises the following steps: receiving a target system access request of a to-be-authenticated user sent by a user terminal, and generating and sending a user authentication request to a user authentication server according to the request, so that the user authentication server sends user authentication data to communication equipment corresponding to the to-be-authenticated user; receiving authentication result information which is returned by the user authentication server and is generated according to authentication response data returned by the communication equipment based on the user authentication data; and if the authentication is passed, generating and sending a security feature code for accessing the target system to the user terminal for the to-be-authenticated user. In the embodiment of the invention, when the to-be-authenticated user accesses the target system, primary authentication can be performed on the to-be-authenticated user through the user authentication server, and the security feature code is sent to the to-be-authenticated user, so that the user terminal accesses the target system based on the security feature code, and the effect of secondary authentication on the user terminal is achieved; and through multiple authentication operations, the security of accessing the target system can be improved.

Description

technical field [0001] This document relates to the fields of information security, business support and access security, and in particular relates to a system access method, gateway equipment, server, electronic equipment and storage media. Background technique [0002] Usually, after the user terminal sends an access request to the target system, the target system needs to authenticate the user using the user terminal, and judge whether to allow the user terminal to access the target system according to the authentication result. [0003] In the prior art, the target system usually receives the user access information sent by the user terminal, and judges whether the user access information is correct, and if correct, allows the user to access, and allows the user to access the target system. However, in this method, the target system only relies on the user's access information to verify the user, which is less secure. In the case that the user's access information is sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0853H04L63/083H04L63/18H04L63/10H04L67/02
Inventor 郑磊余树仪周华方嘉宇董航
Owner 中移互联网有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products