CN111865998A - Network security zone login method and device - Google Patents
Network security zone login method and device Download PDFInfo
- Publication number
- CN111865998A CN111865998A CN202010725157.6A CN202010725157A CN111865998A CN 111865998 A CN111865998 A CN 111865998A CN 202010725157 A CN202010725157 A CN 202010725157A CN 111865998 A CN111865998 A CN 111865998A
- Authority
- CN
- China
- Prior art keywords
- module
- network security
- security zone
- access channel
- conversion module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明公开了一种网络安全区登录方法,包括以下步骤:S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S3、若身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。本发明通过转换模块的设置,使得用户可以安全快速的接入网络安全区。
The invention discloses a method for logging in to a network security zone, comprising the following steps: S1, storing an access channel construction program for building an access channel for accessing the network security zone in a conversion module; S2, a user entering an identity verification through a client module After the information is encrypted by the encryption module, it is sent to the conversion module for decryption, and the authentication module is used for authentication; S3. If the authentication is incorrect, the access is denied; if the authentication is correct, the access channel construction program is called according to the user's authority. The construction of the corresponding access channel, establishes a connection with the network security zone, and realizes the login access of the network security zone; S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and transmitted to the conversion module for decryption. It is transmitted to the network security zone through the access channel for execution. Through the setting of the conversion module, the present invention enables the user to access the network security zone safely and quickly.
Description
技术领域technical field
本发明涉及网络安全技术领域,具体涉及一种网络安全区登录方法及装置。The invention relates to the technical field of network security, in particular to a method and device for logging in to a network security zone.
背景技术Background technique
在网络安全技术领域中,一种常用的做法是将一组用户的终端设置在同一网段,同一网段指的是互联网协议(InternetProtocol,IP)地址和子网掩码相与得到相同的网络地址。还可以将一个或多个网段设置在一个网络安全区中,该网络安全区中的网段与其它网段是完全隔离的。同一网络安全区的用户通常分配有相同的工作内容,比如开发同一项目,当该项目实施完毕,该网络安全区中的用户可能安排不同的任务,这些用户就需要登录其它的网络安全区。那么,如何简便快速又安全的将用户登录到其它的网络安全区非常重要。In the field of network security technology, a common practice is to set the terminals of a group of users in the same network segment. The same network segment refers to the same network address obtained by comparing the Internet Protocol (IP) address and subnet mask. . One or more network segments can also be set in a network security zone, and the network segments in the network security zone are completely isolated from other network segments. Users in the same network security area are usually assigned the same work content, such as developing the same project. When the project is completed, users in the network security area may be assigned different tasks, and these users need to log in to other network security areas. So, how to easily, quickly and safely log users into other network security areas is very important.
发明内容SUMMARY OF THE INVENTION
为解决上述问题,本发明提供了一种网络安全区登录方法及装置,可以实现用户的安全快速登录。In order to solve the above problems, the present invention provides a method and device for logging in to a network security zone, which can realize the user's safe and fast login.
为实现上述目的,本发明采取的技术方案为:To achieve the above object, the technical scheme adopted in the present invention is:
网络安全区登录方法,包括以下步骤:The network security zone login method includes the following steps:
S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S1. Store an access channel construction program for building an access channel for accessing the network security zone in the conversion module;
S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S2, the user inputs the identity verification information through the client module, after being encrypted by the encryption module, it is sent to the conversion module for decryption, and the identity verification is carried out through the identity verification module;
S3、若步骤S2中身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S3. If the identity verification in step S2 is incorrect, the access is denied; if the identity verification is correct, the access channel construction program is called to construct the corresponding access channel according to the user authority, and a connection is established with the network security zone to realize the login of the network security zone. access;
S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and then transmitted to the network security area through the access channel for execution.
进一步地,所述身份验证信息采用生物特征信息。Further, the identity verification information adopts biometric information.
进一步地,不同的用户权限对应不同的访问通道构建程序。Further, different user rights correspond to different access channel construction programs.
进一步地,还包括:通过身份验证的用户通过客户端模块发送断开请求,断开请求通过加密模块加密后传输至转换模块解密,通过访问通道断开模块实现访问通道的断开的步骤。Further, it also includes: the user who has passed the authentication sends a disconnection request through the client module, the disconnection request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and the disconnection of the access channel is realized by the access channel disconnection module.
进一步地,所述步骤S4中,通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后首先传输至转换模块解密,然后进行安全审核,将完成安全审核后的任务请求通过经访问通道传输至网络安全区进行执行。Further, in the described step S4, the user who has passed the identity verification sends a task request through the client module, and the task request is firstly transmitted to the conversion module for decryption after being encrypted by the encryption module, and then carries out security audit, and the task request after completing the security audit is passed. It is transmitted to the network security zone through the access channel for execution.
进一步地,客户端模块与转换模块之间采用双通道连接模块进行通讯,在任意一个通道进行通讯时,另一个备用通道进行密钥更新。Further, a dual-channel connection module is used for communication between the client module and the conversion module, and when any one of the channels communicates, the other standby channel performs key update.
本发明还提供了一种网络安全区登录装置,包括客户端模块,客户端模块连接有转换模块,转换模块内载访问通道构建模块,用于构建访问网络安全区的访问通道,客户端模块和转换模块内各设置有一个加密模块,转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间设置有相互独立的双通道连接模块。The invention also provides a network security zone login device, comprising a client module, the client module is connected with a conversion module, and the conversion module contains an access channel building module for constructing an access channel for accessing the network security zone, the client module and Each of the conversion modules is provided with an encryption module, the conversion module is also provided with an identity verification module, and an independent dual-channel connection module is provided between the client module and the conversion module.
进一步地,所述转换模块内设一安全审核模块,用于基于最邻近分类器实现访问任务安全的审核,审核时,通过最邻近分类器与预存的危险任务请求进行相似度对比,所得的相似度落入预设的门限时,则认为危险。Further, the conversion module is provided with a security auditing module, which is used to realize the auditing of access task safety based on the nearest neighbor classifier. During the audit, the similarity comparison is performed by the nearest neighbor classifier and the pre-stored dangerous task request, and the obtained results are similar. When the temperature falls within the preset threshold, it is considered dangerous.
本发明通过转换模块的设置,使得用户可以安全快速的接入网络安全区。Through the setting of the conversion module, the present invention enables the user to access the network security zone safely and quickly.
附图说明Description of drawings
图1为本发明实施例1网络安全区登录方法的流程图。FIG. 1 is a flowchart of a method for logging in to a network security zone according to Embodiment 1 of the present invention.
图2为本发明实施例2网络安全区登录方法的流程图。FIG. 2 is a flowchart of a method for logging in to a network security zone according to
图3为本发明实施例3网络安全区登录装置的结构框图。FIG. 3 is a structural block diagram of an apparatus for logging in to a network security zone according to Embodiment 3 of the present invention.
具体实施方式Detailed ways
下面结合具体实施例对本发明进行详细说明。以下实施例将有助于本领域的技术人员进一步理解本发明,但不以任何形式限制本发明。应当指出的是,对本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进。这些都属于本发明的保护范围。The present invention will be described in detail below with reference to specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that, for those skilled in the art, several modifications and improvements can be made without departing from the concept of the present invention. These all belong to the protection scope of the present invention.
实施例1Example 1
如图1所示,网络安全区登录方法,包括以下步骤:As shown in Figure 1, the network security zone login method includes the following steps:
S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S1. Store an access channel construction program for building an access channel for accessing the network security zone in the conversion module;
S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S2, the user inputs the identity verification information through the client module, after being encrypted by the encryption module, it is sent to the conversion module for decryption, and the identity verification is carried out through the identity verification module;
S3、若步骤S2中身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S3. If the identity verification in step S2 is incorrect, the access is denied; if the identity verification is correct, the access channel construction program is called to construct the corresponding access channel according to the user authority, and a connection is established with the network security zone to realize the login of the network security zone. access;
S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。具体的,通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后首先传输至转换模块解密,然后进行安全审核,若审核结果不安全,则驳回该任务请求,同时将驳回结果反馈至客户端,若审核结果安全,则将完成安全审核后的任务请求通过经访问通道传输至网络安全区进行执行。S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and then transmitted to the network security area through the access channel for execution. Specifically, a user who has passed the authentication sends a task request through the client module. After the task request is encrypted by the encryption module, it is first transmitted to the conversion module for decryption, and then a security audit is performed. If the audit result is not safe, the task request will be rejected, and the rejection will be rejected at the same time. The result is fed back to the client. If the audit result is safe, the task request after completing the security audit will be transmitted to the network security zone through the access channel for execution.
本实施例中,所述身份验证信息采用生物特征信息,不同的用户权限对应不同的访问通道构建程序。客户端模块与转换模块之间采用双通道连接模块进行通讯,在任意一个通道进行通讯时,另一个备用通道进行密钥更新。In this embodiment, the identity verification information adopts biometric information, and different user rights correspond to different access channel construction programs. A dual-channel connection module is used for communication between the client module and the conversion module. When any one of the channels communicates, the other standby channel performs key update.
实施例2Example 2
如图2所示,网络安全区登录方法,包括以下步骤:As shown in Figure 2, the network security zone login method includes the following steps:
S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S1. Store an access channel construction program for building an access channel for accessing the network security zone in the conversion module;
S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S2, the user inputs the identity verification information through the client module, after being encrypted by the encryption module, it is sent to the conversion module for decryption, and the identity verification is carried out through the identity verification module;
S3、若步骤S2中身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S3. If the identity verification in step S2 is incorrect, the access is denied; if the identity verification is correct, the access channel construction program is called to construct the corresponding access channel according to the user authority, and a connection is established with the network security zone to realize the login of the network security zone. access;
S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。具体的,通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后首先传输至转换模块解密,然后进行安全审核,若审核结果不安全,则驳回该任务请求,同时将驳回结果反馈至客户端,若审核结果安全,则将完成安全审核后的任务请求通过经访问通道传输至网络安全区进行执行。S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and then transmitted to the network security area through the access channel for execution. Specifically, a user who has passed the authentication sends a task request through the client module. After the task request is encrypted by the encryption module, it is first transmitted to the conversion module for decryption, and then a security audit is performed. If the audit result is not safe, the task request will be rejected, and the rejection will be rejected at the same time. The result is fed back to the client. If the audit result is safe, the task request after completing the security audit will be transmitted to the network security zone through the access channel for execution.
S5、通过身份验证的用户通过客户端模块发送断开请求,断开请求通过加密模块加密后传输至转换模块解密,通过访问通道断开模块实现访问通道的断开。S5. The user who has passed the authentication sends a disconnection request through the client module, the disconnection request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and the access channel disconnection is realized through the access channel disconnection module.
本实施例中,所述身份验证信息采用生物特征信息,不同的用户权限对应不同的访问通道构建程序。客户端模块与转换模块之间采用双通道连接模块进行通讯,在任意一个通道进行通讯时,另一个备用通道进行密钥更新。In this embodiment, the identity verification information adopts biometric information, and different user rights correspond to different access channel construction programs. A dual-channel connection module is used for communication between the client module and the conversion module. When any one of the channels communicates, the other standby channel performs key update.
实施例3Example 3
如图3所示,本发明实施例的一种网络安全区登录装置,包括客户端模块,客户端模块连接有转换模块,转换模块内载访问通道构建模块,用于构建访问网络安全区的访问通道,客户端模块和转换模块内各设置有一个加密模块,转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间设置有相互独立的双通道连接模块。所述转换模块内设一安全审核模块,用于基于最邻近分类器实现访问任务安全的审核,审核时,通过最邻近分类器与预存的危险任务请求进行相似度对比,所得的相似度落入预设的门限时,则认为危险。As shown in FIG. 3, a network security zone login device according to an embodiment of the present invention includes a client module, the client module is connected with a conversion module, and the conversion module contains an access channel building module for constructing access to the network security zone In the channel, the client module and the conversion module are each provided with an encryption module, the conversion module is also provided with an identity verification module, and an independent dual-channel connection module is provided between the client module and the conversion module. The conversion module is equipped with a security audit module, which is used to realize the audit of access task security based on the nearest neighbor classifier. During the audit, the similarity between the nearest neighbor classifier and the pre-stored dangerous task request is compared, and the obtained similarity falls within When the preset threshold is reached, it is considered dangerous.
以上对本发明的具体实施例进行了描述。需要理解的是,本发明并不局限于上述特定实施方式,本领域技术人员可以在权利要求的范围内做出各种变化或修改,这并不影响本发明的实质内容。在不冲突的情况下,本申请的实施例和实施例中的特征可以任意相互组合。The specific embodiments of the present invention have been described above. It should be understood that the present invention is not limited to the above-mentioned specific embodiments, and those skilled in the art can make various changes or modifications within the scope of the claims, which do not affect the essential content of the present invention. The embodiments of the present application and features in the embodiments may be arbitrarily combined with each other without conflict.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010725157.6A CN111865998A (en) | 2020-07-24 | 2020-07-24 | Network security zone login method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010725157.6A CN111865998A (en) | 2020-07-24 | 2020-07-24 | Network security zone login method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111865998A true CN111865998A (en) | 2020-10-30 |
Family
ID=72950587
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010725157.6A Pending CN111865998A (en) | 2020-07-24 | 2020-07-24 | Network security zone login method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111865998A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112491908A (en) * | 2020-12-01 | 2021-03-12 | 阿拉拇 | Security certification management system based on block chain big data |
WO2023240425A1 (en) * | 2022-06-14 | 2023-12-21 | 广州工商学院 | Security authentication management system based on blockchain big data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1811421A1 (en) * | 2005-12-29 | 2007-07-25 | AXSionics AG | Security token and method for authentication of a user with the security token |
CN101471852A (en) * | 2007-12-29 | 2009-07-01 | 中国银联股份有限公司 | Method, system and client device for accessing high safety resource |
CN104573554A (en) * | 2014-12-30 | 2015-04-29 | 北京奇虎科技有限公司 | Method for loading safety key storage hardware and browser client device |
CN104660551A (en) * | 2013-11-20 | 2015-05-27 | 上海海典软件有限公司 | Webservice-based database access device and method |
CN107665164A (en) * | 2016-07-29 | 2018-02-06 | 百度在线网络技术(北京)有限公司 | Secure data detection method and device |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
CN108881327A (en) * | 2018-09-29 | 2018-11-23 | 德州职业技术学院(德州市技师学院) | A kind of computer internet information safety control system based on cloud computing |
CN109743309A (en) * | 2018-12-28 | 2019-05-10 | 微梦创科网络科技(中国)有限公司 | A kind of illegal request identification method, device and electronic equipment |
US20200202429A1 (en) * | 2018-05-06 | 2020-06-25 | Strong Force TX Portfolio 2018, LLC | System and method of an automated agent to automatically implement loan activities based on loan status |
-
2020
- 2020-07-24 CN CN202010725157.6A patent/CN111865998A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1811421A1 (en) * | 2005-12-29 | 2007-07-25 | AXSionics AG | Security token and method for authentication of a user with the security token |
CN101471852A (en) * | 2007-12-29 | 2009-07-01 | 中国银联股份有限公司 | Method, system and client device for accessing high safety resource |
CN104660551A (en) * | 2013-11-20 | 2015-05-27 | 上海海典软件有限公司 | Webservice-based database access device and method |
CN104573554A (en) * | 2014-12-30 | 2015-04-29 | 北京奇虎科技有限公司 | Method for loading safety key storage hardware and browser client device |
CN107665164A (en) * | 2016-07-29 | 2018-02-06 | 百度在线网络技术(北京)有限公司 | Secure data detection method and device |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
US20200202429A1 (en) * | 2018-05-06 | 2020-06-25 | Strong Force TX Portfolio 2018, LLC | System and method of an automated agent to automatically implement loan activities based on loan status |
CN108881327A (en) * | 2018-09-29 | 2018-11-23 | 德州职业技术学院(德州市技师学院) | A kind of computer internet information safety control system based on cloud computing |
CN109743309A (en) * | 2018-12-28 | 2019-05-10 | 微梦创科网络科技(中国)有限公司 | A kind of illegal request identification method, device and electronic equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112491908A (en) * | 2020-12-01 | 2021-03-12 | 阿拉拇 | Security certification management system based on block chain big data |
WO2023240425A1 (en) * | 2022-06-14 | 2023-12-21 | 广州工商学院 | Security authentication management system based on blockchain big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7079798B2 (en) | Systems and methods for dynamic and flexible authentication in cloud services | |
US10110585B2 (en) | Multi-party authentication in a zero-trust distributed system | |
US20190281046A1 (en) | System and method for transferring device identifying information | |
US9202031B2 (en) | Authentication system and method | |
CN106921663B (en) | Identity continuous authentication system and method based on intelligent terminal software/intelligent terminal | |
CN101136746A (en) | Identification method and system | |
US20180139205A1 (en) | System and method for transparent multi-factor authentication and security posture checking | |
WO2016115807A1 (en) | Wireless router access processing method and device, and wireless router access method and device | |
US8627423B2 (en) | Authorizing remote access points | |
US20190311100A1 (en) | System and methods for securing security processes with biometric data | |
KR102278808B1 (en) | System for single packet authentication using tcp packet and method thereof | |
CN111865998A (en) | Network security zone login method and device | |
CN104469736B (en) | A kind of data processing method, server and terminal | |
CN101867588A (en) | An Access Control System Based on 802.1x | |
US20240250946A1 (en) | Token-based device tracking | |
US20210288804A1 (en) | Protection of Authentication Tokens | |
CN101707604A (en) | Method, system and device for preventing malicious attack | |
KR20210049421A (en) | Method for processing request based on user authentication using blockchain key and system applying same | |
CN110717177A (en) | Method for safely unlocking computer in real time by using mobile terminal | |
CN105592076B (en) | A kind of register method and device of GD VPN | |
WO2016045394A1 (en) | Internal address allocation method, apparatus, server, and system | |
US12244695B2 (en) | Associating pre-shared keys with client devices based on message integrity check values | |
WO2012116519A1 (en) | Method and system for differentiation authorization of network device | |
KR102661894B1 (en) | Management Account Creation Method of the Solution Management Target System | |
EP3439260B1 (en) | Client device ticket |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201030 |