[go: up one dir, main page]

CN111865998A - Network security zone login method and device - Google Patents

Network security zone login method and device Download PDF

Info

Publication number
CN111865998A
CN111865998A CN202010725157.6A CN202010725157A CN111865998A CN 111865998 A CN111865998 A CN 111865998A CN 202010725157 A CN202010725157 A CN 202010725157A CN 111865998 A CN111865998 A CN 111865998A
Authority
CN
China
Prior art keywords
module
network security
security zone
access channel
conversion module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010725157.6A
Other languages
Chinese (zh)
Inventor
王欢
彭勇
阳树洪
李厚君
杨凡
刘景贤
黄剑华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi University of Science and Technology
Original Assignee
Guangxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi University of Science and Technology filed Critical Guangxi University of Science and Technology
Priority to CN202010725157.6A priority Critical patent/CN111865998A/en
Publication of CN111865998A publication Critical patent/CN111865998A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种网络安全区登录方法,包括以下步骤:S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S3、若身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。本发明通过转换模块的设置,使得用户可以安全快速的接入网络安全区。

Figure 202010725157

The invention discloses a method for logging in to a network security zone, comprising the following steps: S1, storing an access channel construction program for building an access channel for accessing the network security zone in a conversion module; S2, a user entering an identity verification through a client module After the information is encrypted by the encryption module, it is sent to the conversion module for decryption, and the authentication module is used for authentication; S3. If the authentication is incorrect, the access is denied; if the authentication is correct, the access channel construction program is called according to the user's authority. The construction of the corresponding access channel, establishes a connection with the network security zone, and realizes the login access of the network security zone; S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and transmitted to the conversion module for decryption. It is transmitted to the network security zone through the access channel for execution. Through the setting of the conversion module, the present invention enables the user to access the network security zone safely and quickly.

Figure 202010725157

Description

网络安全区登录方法及装置Network security zone login method and device

技术领域technical field

本发明涉及网络安全技术领域,具体涉及一种网络安全区登录方法及装置。The invention relates to the technical field of network security, in particular to a method and device for logging in to a network security zone.

背景技术Background technique

在网络安全技术领域中,一种常用的做法是将一组用户的终端设置在同一网段,同一网段指的是互联网协议(InternetProtocol,IP)地址和子网掩码相与得到相同的网络地址。还可以将一个或多个网段设置在一个网络安全区中,该网络安全区中的网段与其它网段是完全隔离的。同一网络安全区的用户通常分配有相同的工作内容,比如开发同一项目,当该项目实施完毕,该网络安全区中的用户可能安排不同的任务,这些用户就需要登录其它的网络安全区。那么,如何简便快速又安全的将用户登录到其它的网络安全区非常重要。In the field of network security technology, a common practice is to set the terminals of a group of users in the same network segment. The same network segment refers to the same network address obtained by comparing the Internet Protocol (IP) address and subnet mask. . One or more network segments can also be set in a network security zone, and the network segments in the network security zone are completely isolated from other network segments. Users in the same network security area are usually assigned the same work content, such as developing the same project. When the project is completed, users in the network security area may be assigned different tasks, and these users need to log in to other network security areas. So, how to easily, quickly and safely log users into other network security areas is very important.

发明内容SUMMARY OF THE INVENTION

为解决上述问题,本发明提供了一种网络安全区登录方法及装置,可以实现用户的安全快速登录。In order to solve the above problems, the present invention provides a method and device for logging in to a network security zone, which can realize the user's safe and fast login.

为实现上述目的,本发明采取的技术方案为:To achieve the above object, the technical scheme adopted in the present invention is:

网络安全区登录方法,包括以下步骤:The network security zone login method includes the following steps:

S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S1. Store an access channel construction program for building an access channel for accessing the network security zone in the conversion module;

S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S2, the user inputs the identity verification information through the client module, after being encrypted by the encryption module, it is sent to the conversion module for decryption, and the identity verification is carried out through the identity verification module;

S3、若步骤S2中身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S3. If the identity verification in step S2 is incorrect, the access is denied; if the identity verification is correct, the access channel construction program is called to construct the corresponding access channel according to the user authority, and a connection is established with the network security zone to realize the login of the network security zone. access;

S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and then transmitted to the network security area through the access channel for execution.

进一步地,所述身份验证信息采用生物特征信息。Further, the identity verification information adopts biometric information.

进一步地,不同的用户权限对应不同的访问通道构建程序。Further, different user rights correspond to different access channel construction programs.

进一步地,还包括:通过身份验证的用户通过客户端模块发送断开请求,断开请求通过加密模块加密后传输至转换模块解密,通过访问通道断开模块实现访问通道的断开的步骤。Further, it also includes: the user who has passed the authentication sends a disconnection request through the client module, the disconnection request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and the disconnection of the access channel is realized by the access channel disconnection module.

进一步地,所述步骤S4中,通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后首先传输至转换模块解密,然后进行安全审核,将完成安全审核后的任务请求通过经访问通道传输至网络安全区进行执行。Further, in the described step S4, the user who has passed the identity verification sends a task request through the client module, and the task request is firstly transmitted to the conversion module for decryption after being encrypted by the encryption module, and then carries out security audit, and the task request after completing the security audit is passed. It is transmitted to the network security zone through the access channel for execution.

进一步地,客户端模块与转换模块之间采用双通道连接模块进行通讯,在任意一个通道进行通讯时,另一个备用通道进行密钥更新。Further, a dual-channel connection module is used for communication between the client module and the conversion module, and when any one of the channels communicates, the other standby channel performs key update.

本发明还提供了一种网络安全区登录装置,包括客户端模块,客户端模块连接有转换模块,转换模块内载访问通道构建模块,用于构建访问网络安全区的访问通道,客户端模块和转换模块内各设置有一个加密模块,转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间设置有相互独立的双通道连接模块。The invention also provides a network security zone login device, comprising a client module, the client module is connected with a conversion module, and the conversion module contains an access channel building module for constructing an access channel for accessing the network security zone, the client module and Each of the conversion modules is provided with an encryption module, the conversion module is also provided with an identity verification module, and an independent dual-channel connection module is provided between the client module and the conversion module.

进一步地,所述转换模块内设一安全审核模块,用于基于最邻近分类器实现访问任务安全的审核,审核时,通过最邻近分类器与预存的危险任务请求进行相似度对比,所得的相似度落入预设的门限时,则认为危险。Further, the conversion module is provided with a security auditing module, which is used to realize the auditing of access task safety based on the nearest neighbor classifier. During the audit, the similarity comparison is performed by the nearest neighbor classifier and the pre-stored dangerous task request, and the obtained results are similar. When the temperature falls within the preset threshold, it is considered dangerous.

本发明通过转换模块的设置,使得用户可以安全快速的接入网络安全区。Through the setting of the conversion module, the present invention enables the user to access the network security zone safely and quickly.

附图说明Description of drawings

图1为本发明实施例1网络安全区登录方法的流程图。FIG. 1 is a flowchart of a method for logging in to a network security zone according to Embodiment 1 of the present invention.

图2为本发明实施例2网络安全区登录方法的流程图。FIG. 2 is a flowchart of a method for logging in to a network security zone according to Embodiment 2 of the present invention.

图3为本发明实施例3网络安全区登录装置的结构框图。FIG. 3 is a structural block diagram of an apparatus for logging in to a network security zone according to Embodiment 3 of the present invention.

具体实施方式Detailed ways

下面结合具体实施例对本发明进行详细说明。以下实施例将有助于本领域的技术人员进一步理解本发明,但不以任何形式限制本发明。应当指出的是,对本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进。这些都属于本发明的保护范围。The present invention will be described in detail below with reference to specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that, for those skilled in the art, several modifications and improvements can be made without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

实施例1Example 1

如图1所示,网络安全区登录方法,包括以下步骤:As shown in Figure 1, the network security zone login method includes the following steps:

S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S1. Store an access channel construction program for building an access channel for accessing the network security zone in the conversion module;

S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S2, the user inputs the identity verification information through the client module, after being encrypted by the encryption module, it is sent to the conversion module for decryption, and the identity verification is carried out through the identity verification module;

S3、若步骤S2中身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S3. If the identity verification in step S2 is incorrect, the access is denied; if the identity verification is correct, the access channel construction program is called to construct the corresponding access channel according to the user authority, and a connection is established with the network security zone to realize the login of the network security zone. access;

S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。具体的,通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后首先传输至转换模块解密,然后进行安全审核,若审核结果不安全,则驳回该任务请求,同时将驳回结果反馈至客户端,若审核结果安全,则将完成安全审核后的任务请求通过经访问通道传输至网络安全区进行执行。S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and then transmitted to the network security area through the access channel for execution. Specifically, a user who has passed the authentication sends a task request through the client module. After the task request is encrypted by the encryption module, it is first transmitted to the conversion module for decryption, and then a security audit is performed. If the audit result is not safe, the task request will be rejected, and the rejection will be rejected at the same time. The result is fed back to the client. If the audit result is safe, the task request after completing the security audit will be transmitted to the network security zone through the access channel for execution.

本实施例中,所述身份验证信息采用生物特征信息,不同的用户权限对应不同的访问通道构建程序。客户端模块与转换模块之间采用双通道连接模块进行通讯,在任意一个通道进行通讯时,另一个备用通道进行密钥更新。In this embodiment, the identity verification information adopts biometric information, and different user rights correspond to different access channel construction programs. A dual-channel connection module is used for communication between the client module and the conversion module. When any one of the channels communicates, the other standby channel performs key update.

实施例2Example 2

如图2所示,网络安全区登录方法,包括以下步骤:As shown in Figure 2, the network security zone login method includes the following steps:

S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S1. Store an access channel construction program for building an access channel for accessing the network security zone in the conversion module;

S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S2, the user inputs the identity verification information through the client module, after being encrypted by the encryption module, it is sent to the conversion module for decryption, and the identity verification is carried out through the identity verification module;

S3、若步骤S2中身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S3. If the identity verification in step S2 is incorrect, the access is denied; if the identity verification is correct, the access channel construction program is called to construct the corresponding access channel according to the user authority, and a connection is established with the network security zone to realize the login of the network security zone. access;

S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。具体的,通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后首先传输至转换模块解密,然后进行安全审核,若审核结果不安全,则驳回该任务请求,同时将驳回结果反馈至客户端,若审核结果安全,则将完成安全审核后的任务请求通过经访问通道传输至网络安全区进行执行。S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and then transmitted to the network security area through the access channel for execution. Specifically, a user who has passed the authentication sends a task request through the client module. After the task request is encrypted by the encryption module, it is first transmitted to the conversion module for decryption, and then a security audit is performed. If the audit result is not safe, the task request will be rejected, and the rejection will be rejected at the same time. The result is fed back to the client. If the audit result is safe, the task request after completing the security audit will be transmitted to the network security zone through the access channel for execution.

S5、通过身份验证的用户通过客户端模块发送断开请求,断开请求通过加密模块加密后传输至转换模块解密,通过访问通道断开模块实现访问通道的断开。S5. The user who has passed the authentication sends a disconnection request through the client module, the disconnection request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and the access channel disconnection is realized through the access channel disconnection module.

本实施例中,所述身份验证信息采用生物特征信息,不同的用户权限对应不同的访问通道构建程序。客户端模块与转换模块之间采用双通道连接模块进行通讯,在任意一个通道进行通讯时,另一个备用通道进行密钥更新。In this embodiment, the identity verification information adopts biometric information, and different user rights correspond to different access channel construction programs. A dual-channel connection module is used for communication between the client module and the conversion module. When any one of the channels communicates, the other standby channel performs key update.

实施例3Example 3

如图3所示,本发明实施例的一种网络安全区登录装置,包括客户端模块,客户端模块连接有转换模块,转换模块内载访问通道构建模块,用于构建访问网络安全区的访问通道,客户端模块和转换模块内各设置有一个加密模块,转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间设置有相互独立的双通道连接模块。所述转换模块内设一安全审核模块,用于基于最邻近分类器实现访问任务安全的审核,审核时,通过最邻近分类器与预存的危险任务请求进行相似度对比,所得的相似度落入预设的门限时,则认为危险。As shown in FIG. 3, a network security zone login device according to an embodiment of the present invention includes a client module, the client module is connected with a conversion module, and the conversion module contains an access channel building module for constructing access to the network security zone In the channel, the client module and the conversion module are each provided with an encryption module, the conversion module is also provided with an identity verification module, and an independent dual-channel connection module is provided between the client module and the conversion module. The conversion module is equipped with a security audit module, which is used to realize the audit of access task security based on the nearest neighbor classifier. During the audit, the similarity between the nearest neighbor classifier and the pre-stored dangerous task request is compared, and the obtained similarity falls within When the preset threshold is reached, it is considered dangerous.

以上对本发明的具体实施例进行了描述。需要理解的是,本发明并不局限于上述特定实施方式,本领域技术人员可以在权利要求的范围内做出各种变化或修改,这并不影响本发明的实质内容。在不冲突的情况下,本申请的实施例和实施例中的特征可以任意相互组合。The specific embodiments of the present invention have been described above. It should be understood that the present invention is not limited to the above-mentioned specific embodiments, and those skilled in the art can make various changes or modifications within the scope of the claims, which do not affect the essential content of the present invention. The embodiments of the present application and features in the embodiments may be arbitrarily combined with each other without conflict.

Claims (8)

1.网络安全区登录方法,其特征在于:包括以下步骤:1. a network security zone login method, characterized in that: comprising the following steps: S1、在转换模块中存储用于搭建访问网络安全区的访问通道的访问通道构建程序;S1. Store an access channel construction program for building an access channel for accessing the network security zone in the conversion module; S2、使用者通过客户端模块输入身份验证信息,经过加密模块加密后,传送到转换模块中解密,通过身份验证模块进行身份验证;S2, the user inputs the identity verification information through the client module, after being encrypted by the encryption module, it is sent to the conversion module for decryption, and the identity verification is carried out through the identity verification module; S3、若步骤S2中身份验证错误,则拒绝访问;若身份验证正确,则根据用户权限,调用访问通道构建程序进行对应的访问通道的构建,与网络安全区建立连接,实现网络安全区的登录访问;S3. If the identity verification in step S2 is incorrect, the access is denied; if the identity verification is correct, the access channel construction program is called to construct the corresponding access channel according to the user authority, and a connection is established with the network security zone to realize the login of the network security zone. access; S4、通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后传输至转换模块解密,经访问通道传输至网络安全区进行执行。S4. The user who has passed the authentication sends a task request through the client module, and the task request is encrypted by the encryption module and then transmitted to the conversion module for decryption, and then transmitted to the network security area through the access channel for execution. 2.如权利要求1所述的网络安全区登录方法,其特征在于:所述身份验证信息采用生物特征信息。2 . The method for logging in to a network security zone according to claim 1 , wherein the identity verification information adopts biometric information. 3 . 3.如权利要求1所述的网络安全区登录方法,其特征在于:不同的用户权限对应不同的访问通道构建程序。3. The method for logging in to a network security zone according to claim 1, wherein different user rights correspond to different access channel construction programs. 4.如权利要求1所述的网络安全区登录方法,其特征在于:还包括:通过身份验证的用户通过客户端模块发送断开请求,断开请求通过加密模块加密后传输至转换模块解密,通过访问通道断开模块实现访问通道的断开的步骤。4. network security zone login method as claimed in claim 1, is characterized in that: also comprise: the user through identity verification sends disconnection request by client module, disconnection request is transmitted to conversion module decryption after being encrypted by encryption module, The steps of realizing the disconnection of the access channel through the access channel disconnection module. 5.如权利要求1所述的网络安全区登录方法,其特征在于:所述步骤S4中,通过身份验证的用户通过客户端模块发送任务请求,任务请求通过加密模块加密后首先传输至转换模块解密,然后进行安全审核,将完成安全审核后的任务请求通过经访问通道传输至网络安全区进行执行。5. network security zone login method as claimed in claim 1 is characterized in that: in described step S4, the user through identity verification sends task request by client module, and task request is first transmitted to conversion module after encryption by encryption module Decryption, then conduct security audit, and transmit the task request after security audit to the network security zone for execution through the access channel. 6.如权利要求1所述的网络安全区登录方法,其特征在于:客户端模块与转换模块之间采用双通道连接模块进行通讯,在任意一个通道进行通讯时,另一个备用通道进行密钥更新。6. The method for logging in to a network security zone as claimed in claim 1, wherein the two-channel connection module is used to communicate between the client module and the conversion module, and when any one of the channels communicates, another backup channel carries out the key. renew. 7.网络安全区登录装置,其特征在于:包括客户端模块,客户端模块连接有转换模块,转换模块内载访问通道构建模块,用于构建访问网络安全区的访问通道,客户端模块和转换模块内各设置有一个加密模块,转换模块中还设置有一个身份验证模块,客户端模块与转换模块之间设置有相互独立的双通道连接模块。7. The network security zone login device is characterized in that: comprising a client module, the client module is connected with a conversion module, and the conversion module contains an access channel building module for constructing an access channel for accessing the network security zone, the client module and the conversion module Each of the modules is provided with an encryption module, the conversion module is also provided with an identity verification module, and an independent dual-channel connection module is provided between the client module and the conversion module. 8.如权利要求7所述的网络安全区登录装置,其特征在于:所述转换模块内设一安全审核模块,用于基于最邻近分类器实现访问任务安全的审核,审核时,通过最邻近分类器与预存的危险任务请求进行相似度对比,所得的相似度落入预设的门限时,则认为危险。8. The network security zone logging device as claimed in claim 7, wherein: a security audit module is set in the conversion module for realizing the audit of access task security based on the nearest neighbor classifier, and during the audit, by the nearest neighbor The classifier compares the similarity with the pre-stored dangerous task request, and when the obtained similarity falls within the preset threshold, it is considered dangerous.
CN202010725157.6A 2020-07-24 2020-07-24 Network security zone login method and device Pending CN111865998A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010725157.6A CN111865998A (en) 2020-07-24 2020-07-24 Network security zone login method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010725157.6A CN111865998A (en) 2020-07-24 2020-07-24 Network security zone login method and device

Publications (1)

Publication Number Publication Date
CN111865998A true CN111865998A (en) 2020-10-30

Family

ID=72950587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010725157.6A Pending CN111865998A (en) 2020-07-24 2020-07-24 Network security zone login method and device

Country Status (1)

Country Link
CN (1) CN111865998A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491908A (en) * 2020-12-01 2021-03-12 阿拉拇 Security certification management system based on block chain big data
WO2023240425A1 (en) * 2022-06-14 2023-12-21 广州工商学院 Security authentication management system based on blockchain big data

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1811421A1 (en) * 2005-12-29 2007-07-25 AXSionics AG Security token and method for authentication of a user with the security token
CN101471852A (en) * 2007-12-29 2009-07-01 中国银联股份有限公司 Method, system and client device for accessing high safety resource
CN104573554A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Method for loading safety key storage hardware and browser client device
CN104660551A (en) * 2013-11-20 2015-05-27 上海海典软件有限公司 Webservice-based database access device and method
CN107665164A (en) * 2016-07-29 2018-02-06 百度在线网络技术(北京)有限公司 Secure data detection method and device
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
CN108881327A (en) * 2018-09-29 2018-11-23 德州职业技术学院(德州市技师学院) A kind of computer internet information safety control system based on cloud computing
CN109743309A (en) * 2018-12-28 2019-05-10 微梦创科网络科技(中国)有限公司 A kind of illegal request identification method, device and electronic equipment
US20200202429A1 (en) * 2018-05-06 2020-06-25 Strong Force TX Portfolio 2018, LLC System and method of an automated agent to automatically implement loan activities based on loan status

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1811421A1 (en) * 2005-12-29 2007-07-25 AXSionics AG Security token and method for authentication of a user with the security token
CN101471852A (en) * 2007-12-29 2009-07-01 中国银联股份有限公司 Method, system and client device for accessing high safety resource
CN104660551A (en) * 2013-11-20 2015-05-27 上海海典软件有限公司 Webservice-based database access device and method
CN104573554A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 Method for loading safety key storage hardware and browser client device
CN107665164A (en) * 2016-07-29 2018-02-06 百度在线网络技术(北京)有限公司 Secure data detection method and device
CN108256321A (en) * 2018-01-16 2018-07-06 吉林财经大学 A kind of big data safety precaution supervision and aware platform
US20200202429A1 (en) * 2018-05-06 2020-06-25 Strong Force TX Portfolio 2018, LLC System and method of an automated agent to automatically implement loan activities based on loan status
CN108881327A (en) * 2018-09-29 2018-11-23 德州职业技术学院(德州市技师学院) A kind of computer internet information safety control system based on cloud computing
CN109743309A (en) * 2018-12-28 2019-05-10 微梦创科网络科技(中国)有限公司 A kind of illegal request identification method, device and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491908A (en) * 2020-12-01 2021-03-12 阿拉拇 Security certification management system based on block chain big data
WO2023240425A1 (en) * 2022-06-14 2023-12-21 广州工商学院 Security authentication management system based on blockchain big data

Similar Documents

Publication Publication Date Title
JP7079798B2 (en) Systems and methods for dynamic and flexible authentication in cloud services
US10110585B2 (en) Multi-party authentication in a zero-trust distributed system
US20190281046A1 (en) System and method for transferring device identifying information
US9202031B2 (en) Authentication system and method
CN106921663B (en) Identity continuous authentication system and method based on intelligent terminal software/intelligent terminal
CN101136746A (en) Identification method and system
US20180139205A1 (en) System and method for transparent multi-factor authentication and security posture checking
WO2016115807A1 (en) Wireless router access processing method and device, and wireless router access method and device
US8627423B2 (en) Authorizing remote access points
US20190311100A1 (en) System and methods for securing security processes with biometric data
KR102278808B1 (en) System for single packet authentication using tcp packet and method thereof
CN111865998A (en) Network security zone login method and device
CN104469736B (en) A kind of data processing method, server and terminal
CN101867588A (en) An Access Control System Based on 802.1x
US20240250946A1 (en) Token-based device tracking
US20210288804A1 (en) Protection of Authentication Tokens
CN101707604A (en) Method, system and device for preventing malicious attack
KR20210049421A (en) Method for processing request based on user authentication using blockchain key and system applying same
CN110717177A (en) Method for safely unlocking computer in real time by using mobile terminal
CN105592076B (en) A kind of register method and device of GD VPN
WO2016045394A1 (en) Internal address allocation method, apparatus, server, and system
US12244695B2 (en) Associating pre-shared keys with client devices based on message integrity check values
WO2012116519A1 (en) Method and system for differentiation authorization of network device
KR102661894B1 (en) Management Account Creation Method of the Solution Management Target System
EP3439260B1 (en) Client device ticket

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030