Access authentication method and device based on two-dimensional graph, equipment and storage medium

A technology of two-dimensional graphics and authentication methods, which is applied in the field of communication, can solve the problems of being easily cracked by monitoring and simulation, increasing the risk of leaking, and the wrong order of client access, so as to improve network protection capabilities, good compatibility and robustness, The effect of improving the recognition accuracy

Active Publication Date: 2022-04-01
北京信创数安科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two major problems with this traditional authentication method: First, common identity authentication and access control need to open a fixed authentication service port in the network, which provides a clear target for the attacker, and enough attack means and time , will eventually succeed in attacking
Second, commonly used identity authentication needs to transmit verification information such as user name and password to the authentication server for verification, which increases the risk of leakage
[0007] 1 The timing requirements are high, limited by the communication quality of the network, there may be data packets sent by the client first to the server, that is, although the client accesses each port according to the order in which the ports are opened, the server determines the order in which the client accesses Incorrect, resulting in authentication failure;
[0008] 2 Even if multiple ports are accessed sequentially, there are still timing rules, and it is easy to be broken by attackers who use sufficient attack methods and time. The security is not high, and it is easy to be cracked by monitoring and simulation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method and device based on two-dimensional graph, equipment and storage medium
  • Access authentication method and device based on two-dimensional graph, equipment and storage medium
  • Access authentication method and device based on two-dimensional graph, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0044] The terms "first", "second", "third" and the like in the description and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or devices.

[0045] The access authentication scheme based on two-dimensional graphics provided by this application changes the existi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access authentication method and device based on a two-dimensional graph, equipment and a storage medium, and the method comprises the steps: forming a random first two-dimensional graph according to a preset authentication rule, and enabling each mark point in the first two-dimensional graph to correspond to a plurality of authentication ports in a server; opening an authentication port mapped by each mark point in the first two-dimensional graph; acquiring a port access request of a client, converting an authentication port requested to access by the client into a second two-dimensional graph according to the authentication rule, comparing the second two-dimensional graph with the first two-dimensional graph, and if the graphs are consistent, passing authentication; according to the method, the one-dimensional server port is subjected to two-dimensional patterning, the client sending the access request is authenticated and filtered through graph comparison, the access authentication mode has sequence independence, and the safety and the stability of server operation can be improved.

Description

technical field [0001] The present application relates to the technical field of communications, and more specifically, to a two-dimensional graph-based access authentication method, device, device, and storage medium. Background technique [0002] At present, common network security products mainly control the access of network resource devices for network physical boundaries. The typical boundary protection model divides the network into different areas, and different areas are granted a certain degree of trust. High-risk resources such as application servers that can be accessed remotely are deployed in trusted or privileged areas, and network traffic entering application servers is strictly monitored through security devices such as firewalls, IPS, and VPN gateways deployed in border isolation areas. It is to build a perimeter defense based on the network boundary, so as to ensure the security of the private network within the isolated area to a certain extent. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/34G06F21/44G06F21/45
Inventor 周超廖巍
Owner 北京信创数安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products