CN117155718A - Gateway dynamic access control method, device and storage medium - Google Patents
Gateway dynamic access control method, device and storage medium Download PDFInfo
- Publication number
- CN117155718A CN117155718A CN202311436276.XA CN202311436276A CN117155718A CN 117155718 A CN117155718 A CN 117155718A CN 202311436276 A CN202311436276 A CN 202311436276A CN 117155718 A CN117155718 A CN 117155718A
- Authority
- CN
- China
- Prior art keywords
- user
- gateway
- terminal
- code
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000004891 communication Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 6
- 238000012790 confirmation Methods 0.000 claims description 3
- 230000007774 longterm Effects 0.000 abstract description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000004931 aggregating effect Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the application provides a gateway dynamic access control method and a gateway dynamic access control device, which need to authenticate a user accessed each time and terminal equipment used by the user access application at the same time, so that a system determines whether the user can access the application according to an authentication result, and the system can determine the behavior of the user for accessing the application in real time according to the long-term access behavior of the user and the change of the terminal environment, thereby realizing the dynamic control of the user access application.
Description
Technical Field
The embodiments of the present application belong to the technical field of network security, and in particular, relate to a gateway dynamic access control method, device and storage medium.
Background
Conventional network access control methods often lack sensitivity identification at the application level for different devices, especially at the application level of a seven-layer protocol, which causes an important problem: even users with legal identity authentication may be at different risks posed by access to different devices. Therefore, a method for real-time dynamic access control in combination with user identity and device information becomes particularly important.
Disclosure of Invention
In order to solve or alleviate the problems in the prior art, the embodiment of the application provides a method and a device for synchronizing and aggregating data of multiple programmable data sources.
In a first aspect, an embodiment of the present application provides a gateway dynamic access control method, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
the method comprises the steps of confirming whether a user is an authentication user or not through a gateway by receiving a request for accessing an application sent by the user;
if the user is a non-authenticated user, acquiring an authentication request sent by the gateway to authenticate the user;
sending a request to a terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and sending the user identity authentication request and the encrypted random code to a gateway, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the device code corresponding to the decrypted random code with the user identity information so as to facilitate the user to access the specific application.
As a preferred embodiment of the present application, before the receiving the request sent by the user to access the application, the method includes:
and installing a terminal application on the terminal equipment, and starting a local monitoring port to monitor communication between the terminal equipment and the gateway after the terminal application is installed on the terminal equipment, and generating a device code of the terminal equipment according to the information of the terminal equipment by the terminal application and storing the device code in the terminal application.
As a preferred embodiment of the present application, if the user is confirmed to be a non-authenticated user by the gateway, the method further comprises:
and acquiring a device code from the terminal application to authenticate the terminal device.
As a preferred embodiment of the present application, the authenticating the terminal setting includes:
and acquiring a device code from the terminal application, and sending the device code to a gateway to authenticate the device.
As a preferred embodiment of the present application, the method further comprises:
if the authentication of the terminal equipment is passed, generating a random code through the gateway, encrypting the random code and setting the effective time of the encrypted random code;
and acquiring the encrypted random code and sending the encrypted random code to a terminal application for storage.
As a preferred embodiment of the present application, after the gateway passes the authentication of the user, and before associating the device code corresponding to the decrypted random code with the identity information of the user so that the user accesses a specific application, the method includes:
determining whether the encrypted random code is within a valid time;
and if the encrypted random code is in the effective time, decrypting the encrypted random code.
As a preferred embodiment of the present application, after associating the device code corresponding to the decrypted random code with the identity information of the user, the method includes:
and acquiring and storing the association information between the equipment code and the identity information of the user.
Compared with the prior art, the gateway dynamic access control method provided by the embodiment of the application needs to authenticate the user accessed each time and the terminal equipment used by the user access application at the same time, so that the system determines whether the user can access the application according to the authentication result, and the system can determine the behavior access of the user to the application in real time according to the long-term access behavior of the user and the change of the terminal environment, thereby realizing the dynamic control of the user access application.
In a second aspect, an embodiment of the present application further provides a gateway dynamic access control device, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
the confirmation module is used for confirming whether the user is an authentication user or not through the gateway by receiving a request for accessing the application sent by the user;
the acquisition module is used for acquiring an authentication request sent by the gateway to authenticate the user if the user is a non-authentication user;
the first sending module is used for sending a request to the terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and the second sending module is used for sending the identity authentication request of the user and the encrypted random code to a gateway together, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the equipment code corresponding to the decrypted random code with the identity information of the user so as to facilitate the user to access the specific application.
As a preferred embodiment of the present application, the terminal device is provided with a terminal application, and after the terminal application is installed on the terminal device, a local monitoring port is started to monitor the communication between the terminal device and the gateway, and meanwhile, the terminal application generates a device code of the terminal device according to the information of the terminal device and stores the device code in the terminal application.
In a third aspect, an embodiment of the present application further provides a storage medium, configured to store a code program for executing a gateway dynamic access control method according to any one of the first aspect.
Compared with the prior art, the technical solutions provided by the second aspect and the third aspect have the same beneficial effects as those provided by the first aspect, and are not described herein.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. Some specific embodiments of the application will be described in detail hereinafter by way of example and not by way of limitation with reference to the accompanying drawings. The same reference numbers in the drawings denote the same or similar parts or portions, and it will be understood by those skilled in the art that the drawings are not necessarily drawn to scale, in which:
fig. 1 is a schematic flow chart of a gateway dynamic access control method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an interaction process of a gateway dynamic access control method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a gateway dynamic access control device according to an embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions according to the embodiments of the present application with reference to the accompanying drawings. It will be apparent that the described embodiments are merely some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
In a first aspect, as shown in fig. 1 and fig. 2, an embodiment of the present application provides a gateway dynamic access control method, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
step S01, a gateway confirms whether a user is an authenticated user or not by receiving a request for accessing an application sent by the user;
when a user accesses a specific application, it is necessary to first determine whether the user is an authenticated user for the security of the accessed application, specifically, the user logs in by using a unique user name and a unique password, and the system verifies the validity of the identity. In addition, the system can also support multi-factor authentication, such as mobile phone authentication codes, biological recognition and the like, so that the authentication security is improved.
If the user is a legal user and the terminal equipment used by the user for accessing the application has an association relationship with the user, the system allows the user to continue to access the application.
Prior to step S01, it comprises:
and installing a terminal application on the terminal equipment, and starting a local monitoring port to monitor communication between the terminal equipment and the gateway after the terminal application is installed on the terminal equipment, and generating a device code of the terminal equipment according to the information of the terminal equipment by the terminal application and storing the device code in the terminal application.
In the embodiment of the application, the terminal device is provided with the terminal application, the terminal application generates the device code of the terminal device according to the information of the terminal device, and is also used for monitoring the communication between the terminal device and the gateway, namely, the communication during authentication with the browser user, when the user initiates an authentication request in the browser, the terminal device and the gateway communicate, and the device code of the terminal device is sent to the back end for authentication.
Step S02, if the user is a non-authentication user, acquiring an authentication request sent by the gateway to authenticate the user;
it should be noted that, if the user is a non-authenticated user, the user cannot continue to access the application, so the gateway sends an authentication request to the terminal setting.
Step S03, a request is sent to a terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
after receiving the authentication request sent by the gateway, the terminal device in step S02 sends a request to the terminal application to obtain the encrypted random code stored in the terminal application, and if the encrypted random code is stored in the terminal application, the terminal device is authenticated, and if the encrypted random code is not stored, the terminal device is not authenticated.
Specifically, the encrypted random code is generated by:
first, a device code needs to be acquired from the terminal application to authenticate the terminal device.
The specific terminal equipment authentication is authenticated by the following modes:
acquiring a device code from the terminal application, and sending the device code to a gateway to authenticate the device;
if the authentication of the terminal equipment is passed, generating a random code through the gateway, encrypting the random code to obtain an encrypted random code, and setting the effective time of the encrypted random code;
and acquiring the encrypted random code and sending the encrypted random code to a terminal application for storage.
Step S04, the user identity authentication request and the encrypted random code are sent to a gateway, and after the user authentication is passed by the gateway, the encrypted random code is decrypted by the gateway, and the device code corresponding to the decrypted random code is associated with the user identity information so that the user can access the specific application.
Specifically, an encrypted random code is generated and returned to the terminal equipment, when the user performs identity authentication by the browser, the identity authentication page sends a request to a local port of the terminal application to obtain the encrypted random code, the encrypted random code is sent to the rear end together with the user identity authentication, the legality of the user is verified, and after the identity authentication is passed, the equipment code corresponding to the decrypted random code is associated with the identity information of the user so that the user can access the specific application.
Prior to step S04, it includes:
determining whether the encrypted random code is within a valid time;
and if the encrypted random code is in the effective time, decrypting the encrypted random code.
By the step, the terminal equipment can be ensured to be authenticated in real time, so that the safety of the user for accessing the application can be confirmed.
For example, if the gateway sets the validity time for encrypting the random code to 3 minutes, the gateway needs to regenerate the random code and encrypt it if more than 3 minutes.
As a preferred embodiment of the present application, after step S04, it includes:
and acquiring and storing the association information between the equipment code and the identity information of the user.
Specifically, the association information between the device code and the identity information of the user is stored in a cookie of the terminal device. When a user accesses the application, whether the user has access right or not needs to be determined according to the stored association information between the equipment code and the identity information of the user, and if the user does not have the access right, the access is prevented.
When the access flow passes through the gateway, the system performs deep analysis on the access behavior in the browser and the real-time change of the environment of the terminal equipment, and specific treatment is performed according to the analysis result.
In a second aspect, as shown in fig. 3, an embodiment of the present application further provides a gateway dynamic access control apparatus, which is applied to a terminal device, where a terminal application is installed on the terminal device, including:
a confirmation module 21, configured to confirm whether the user is an authenticated user through the gateway by receiving a request for accessing an application sent by the user;
an obtaining module 22, configured to obtain an authentication request sent by the gateway to authenticate the user if the user is a non-authenticated user;
a first sending module 23, configured to send a request to a terminal application to obtain an encrypted random code stored on the terminal application, where the encrypted random code is generated after the gateway authenticates the device, and the encrypted random code is set in one-to-one correspondence with a device code of the device;
and the second sending module 24 is configured to send the user's identity authentication request and the encrypted random code to a gateway, decrypt the encrypted random code through the gateway after the gateway passes the user authentication, and associate a device code corresponding to the decrypted random code with the user's identity information so that the user accesses a specific application.
As a preferred embodiment of the present application, the terminal device is provided with a terminal application, and after the terminal application is installed on the terminal device, a local monitoring port is started to monitor the communication between the terminal device and the gateway, and meanwhile, the terminal application generates a device code of the terminal device according to the information of the terminal device and stores the device code in the terminal application.
In a third aspect, an embodiment of the present application further provides a storage medium, configured to store a code program for executing a gateway dynamic access control method according to any one of the first aspect.
Compared with the prior art, the technical solutions provided by the second aspect and the third aspect have the same beneficial effects as those provided by the first aspect, and are not described herein.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.
Claims (10)
1. The gateway dynamic access control method is characterized by being applied to terminal equipment, wherein the terminal equipment is provided with a terminal application, and the method comprises the following steps:
the method comprises the steps of confirming whether a user is an authentication user or not through a gateway by receiving a request for accessing an application sent by the user;
if the user is a non-authenticated user, acquiring an authentication request sent by the gateway to authenticate the user;
sending a request to a terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and sending the user identity authentication request and the encrypted random code to a gateway, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the device code corresponding to the decrypted random code with the user identity information so as to facilitate the user to access the specific application.
2. The method for dynamically controlling access to a gateway according to claim 1, wherein before receiving the request for accessing the application sent by the user, the method comprises:
and installing a terminal application on the terminal equipment, and starting a local monitoring port to monitor communication between the terminal equipment and the gateway after the terminal application is installed on the terminal equipment, and generating a device code of the terminal equipment according to the information of the terminal equipment by the terminal application and storing the device code in the terminal application.
3. The gateway dynamic access control method of claim 1, wherein if the user is confirmed to be a non-authenticated user by the gateway, the method further comprises:
and acquiring a device code from the terminal application to authenticate the terminal device.
4. A gateway dynamic access control method according to claim 3, wherein said authenticating said terminal setting comprises:
and acquiring a device code from the terminal application, and sending the device code to a gateway to authenticate the device.
5. The gateway dynamic access control method of claim 4, wherein the method further comprises:
if the authentication of the terminal equipment is passed, generating a random code through the gateway, encrypting the random code and setting the effective time of the encrypted random code;
and acquiring the encrypted random code and sending the encrypted random code to a terminal application for storage.
6. The method for dynamically controlling access to a gateway according to claim 5, wherein after the gateway passes the authentication of the user, and before associating the device code corresponding to the decrypted random code with the identity information of the user so that the user accesses a specific application, the method comprises:
determining whether the encrypted random code is within a valid time;
and if the encrypted random code is in the effective time, decrypting the encrypted random code.
7. The method for dynamically controlling access to a gateway according to claim 1, wherein after associating the device code corresponding to the decrypted random code with the identity information of the user, the method comprises:
and acquiring and storing the association information between the equipment code and the identity information of the user.
8. A gateway dynamic access control device, which is applied to a terminal device, wherein a terminal application is installed on the terminal device, and the gateway dynamic access control device comprises:
the confirmation module is used for confirming whether the user is an authentication user or not through the gateway by receiving a request for accessing the application sent by the user;
the acquisition module is used for acquiring an authentication request sent by the gateway to authenticate the user if the user is a non-authentication user;
the first sending module is used for sending a request to the terminal application to acquire an encrypted random code stored on the terminal application, wherein the encrypted random code is generated after the gateway authenticates the equipment, and the encrypted random code is arranged in one-to-one correspondence with the equipment code of the equipment;
and the second sending module is used for sending the identity authentication request of the user and the encrypted random code to a gateway together, decrypting the encrypted random code through the gateway after the user authentication is passed by the gateway, and associating the equipment code corresponding to the decrypted random code with the identity information of the user so as to facilitate the user to access the specific application.
9. The gateway dynamic access control apparatus according to claim 8, wherein a terminal application is installed on the terminal device, and a local listening port is started to listen to communication between the terminal device and the gateway after the terminal application is installed on the terminal device, and the terminal application generates a device code of the terminal device according to the information of the terminal device and stores the device code on the terminal application.
10. A storage medium storing a code program for performing a gateway dynamic access control method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311436276.XA CN117155718B (en) | 2023-11-01 | 2023-11-01 | Gateway dynamic access control method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311436276.XA CN117155718B (en) | 2023-11-01 | 2023-11-01 | Gateway dynamic access control method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117155718A true CN117155718A (en) | 2023-12-01 |
CN117155718B CN117155718B (en) | 2024-02-20 |
Family
ID=88901243
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311436276.XA Active CN117155718B (en) | 2023-11-01 | 2023-11-01 | Gateway dynamic access control method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117155718B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650212A (en) * | 2018-03-14 | 2018-10-12 | 北京云信万致科技有限公司 | A kind of Internet of Things certification and access control method and Internet of Things security gateway system |
US10108791B1 (en) * | 2015-03-19 | 2018-10-23 | Amazon Technologies, Inc. | Authentication and fraud detection based on user behavior |
CN113472716A (en) * | 2020-03-30 | 2021-10-01 | 中移互联网有限公司 | System access method, gateway device, server, electronic device, and storage medium |
CN116032546A (en) * | 2022-12-07 | 2023-04-28 | 北京天融信网络安全技术有限公司 | Resource access method and device and electronic equipment |
CN116248405A (en) * | 2023-03-15 | 2023-06-09 | 广西北投信创科技投资集团有限公司 | Network security access control method based on zero trust and gateway system and storage medium adopting same |
CN116886343A (en) * | 2023-06-27 | 2023-10-13 | 济南超级计算技术研究院 | User access control method and system based on continuous authentication |
-
2023
- 2023-11-01 CN CN202311436276.XA patent/CN117155718B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10108791B1 (en) * | 2015-03-19 | 2018-10-23 | Amazon Technologies, Inc. | Authentication and fraud detection based on user behavior |
CN108650212A (en) * | 2018-03-14 | 2018-10-12 | 北京云信万致科技有限公司 | A kind of Internet of Things certification and access control method and Internet of Things security gateway system |
CN113472716A (en) * | 2020-03-30 | 2021-10-01 | 中移互联网有限公司 | System access method, gateway device, server, electronic device, and storage medium |
CN116032546A (en) * | 2022-12-07 | 2023-04-28 | 北京天融信网络安全技术有限公司 | Resource access method and device and electronic equipment |
CN116248405A (en) * | 2023-03-15 | 2023-06-09 | 广西北投信创科技投资集团有限公司 | Network security access control method based on zero trust and gateway system and storage medium adopting same |
CN116886343A (en) * | 2023-06-27 | 2023-10-13 | 济南超级计算技术研究院 | User access control method and system based on continuous authentication |
Also Published As
Publication number | Publication date |
---|---|
CN117155718B (en) | 2024-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109005155B (en) | Identity authentication method and device | |
EP3723399A1 (en) | Identity verification method and apparatus | |
US8646063B2 (en) | Methods, apparatus, and computer program products for subscriber authentication and temporary code generation | |
US7640430B2 (en) | System and method for achieving machine authentication without maintaining additional credentials | |
CN108471610B (en) | Bluetooth connection control system | |
WO2014183526A1 (en) | Identity recognition method, device and system | |
EP2879421B1 (en) | Terminal identity verification and service authentication method, system, and terminal | |
JP5571854B2 (en) | User account recovery | |
EP3195523B1 (en) | Methods, devices and management terminals for establishing a secure session with a service | |
CN110611569B (en) | Authentication method and related equipment | |
DK2414983T3 (en) | Secure computer system | |
US11811739B2 (en) | Web encryption for web messages and application programming interfaces | |
US20210203657A1 (en) | Method, chip, device and system for authenticating a set of at least two users | |
CN109451504B (en) | Internet of things module authentication method and system | |
CN108667800B (en) | Access authority authentication method and device | |
CN110807210B (en) | Information processing method, platform, system and computer storage medium | |
US20180314813A1 (en) | Communication device, communication method and computer program | |
CN109460647B (en) | Multi-device secure login method | |
RU2698424C1 (en) | Authorization control method | |
CN117155718B (en) | Gateway dynamic access control method, device and storage medium | |
CN105871788B (en) | Password generation method and device for login server | |
CN113079506A (en) | Network security authentication method, device and equipment | |
US11849326B2 (en) | Authentication of a user of a software application | |
CN114301639B (en) | Connection establishment method and device | |
CN110225011B (en) | Authentication method and device for user node and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |