Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing identity leakage caused by server intrusion in zero-trust architecture

A server and identity technology, applied in user identity/authority verification, secure communication devices, digital transmission systems, etc., to ensure data security

Pending Publication Date: 2022-02-08
北京八分量信息科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method for preventing identity leakage caused by server intrusion in a zero-trust architecture. The server can guide the access path into a virtual node for monitoring to ensure the data security of the master node, and the master node can perform identity information review and dynamic digital authentication to ensure information The advantages of safety, solve the problems raised by the above-mentioned background technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing identity leakage caused by server intrusion in zero-trust architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] see figure 1 , a method for preventing identity disclosure caused by server intrusion in a zero-trust architecture, comprising the following steps:

[0028] Step 1: Set up a node, which includes two parts, namely:

[0029] 1. Set up a master node inside the server.

[0030] 2. Set up a virtual node inside the server, and if the access path is illegal, it will enter the virtual node.

[0031] The establishment of the virtual node, when the access path...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of server anti-intrusion response schemes, and discloses a method for preventing identity leakage caused by server intrusion in a zero-trust architecture, which comprises the following steps of: 1, setting a main node in the server, 2 setting a virtual node in the server, and if the access path is illegal, the access path can enter the virtual node. According to the method for preventing identity leakage caused by server intrusion in the zero-trust architecture, through setting of the virtual node, when an access path enters the server, the access path is guided by the server to enter the virtual node, so that the information security of the main node is ensured, and in the virtual node, the action of the access path can be monitored through monitoring, so that the access path can move in the monitoring process, some high-risk operations of the access path are avoided, and the data security of the virtual node is ensured.

Description

technical field [0001] The invention relates to the technical field of server intrusion prevention solutions, in particular to a method for preventing identity leakage caused by server intrusion in a zero-trust architecture. Background technique [0002] Server intrusion includes cross-site attack, database stealing, denial of service attack and network attack. Cross-site intrusion, that is, Cross-Site-Script-Execution (usually abbreviated as XSS) refers to the attacker using the website to The program does not filter enough user input. Inputting HTML code that can be displayed on the page and affect other users is an attack method that steals user information, uses user identity to perform certain actions, or infects visitors with viruses. [0003] Once the existing server is stolen, the certificate and identity information on the server will be set up on a fake node, making it easy for the data inside the server to be stolen by lawbreakers. Once important data is stolen, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/1441H04L63/0807H04L63/083H04L63/0861H04L63/0823H04L9/3228
Inventor 魏明果霖阮安邦陈旭明翟东雪
Owner 北京八分量信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products