CN107257344B - Server access method and system - Google Patents

Server access method and system Download PDF

Info

Publication number
CN107257344B
CN107257344B CN201710540123.8A CN201710540123A CN107257344B CN 107257344 B CN107257344 B CN 107257344B CN 201710540123 A CN201710540123 A CN 201710540123A CN 107257344 B CN107257344 B CN 107257344B
Authority
CN
China
Prior art keywords
server
protected
client
access
proxy server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710540123.8A
Other languages
Chinese (zh)
Other versions
CN107257344A (en
Inventor
刘德建
高毅龙
陈庆东
钟良德
郭玉湖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Netdragon Websoft Co Ltd
Original Assignee
Fujian Netdragon Websoft Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Netdragon Websoft Co Ltd filed Critical Fujian Netdragon Websoft Co Ltd
Priority to CN201710540123.8A priority Critical patent/CN107257344B/en
Publication of CN107257344A publication Critical patent/CN107257344A/en
Application granted granted Critical
Publication of CN107257344B publication Critical patent/CN107257344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Abstract

The invention discloses a method and a system for accessing a server, wherein the method comprises the following steps: the client logs in the authorization server through the login information; after the authorization server verifies that the login information passes, sending preset authority information of the user corresponding to the login information to the client, wherein the authority information comprises a protected server accessible by the user and a proxy server accessible to the protected server; when the client accesses a protected server, judging whether the client can access the protected server or not according to the authority information; and if so, the client accesses the protected server through the proxy server in the authority information. The invention can realize the identity authentication of the access terminal and the safety protection of the internal network server without purchasing a specific firewall, does not need to change the original network architecture of an enterprise, and has the characteristics of low cost, simple and convenient deployment, good compatibility and the like.

Description

Server access method and system
Technical Field
The invention relates to the technical field of computers, in particular to a server access method and a server access system.
Background
In the enterprise informatization construction process, a server is an indispensable component. Whether ERP system or OA system, the support of server is needed. Although the information system of the server version provides a good platform for staff to work and cooperation between the staff and the staff, the working efficiency is greatly improved, and certain potential safety hazards are brought. The security of the intranet server is also more and more important for all large, medium and small enterprises. However, most of the existing intranet server security systems need to purchase professional hardware firewalls and systems matched with the hardware firewalls, are expensive, are quite complex to deploy, have high implementation and maintenance costs, and are not suitable for medium-sized and small enterprises.
In addition, many enterprises need to authenticate the identity of the access terminal before accessing the server, and to confirm whether the visitor has the right to access the server.
For example, a secret-related unit, as an important component authority of a country, often issues some secret-related notices on its intranet OA, which cannot be externally issued in a short period of time, and also needs to be accessible to an identity authentication party inside, and does not want to change a new OA system and change an original use habit. At this time, a double-agent technology can be adopted to perform agent on the intranet OA, so that identity authentication can be performed on the end accessing the OA on the premise of not changing the original use mode and the network architecture.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the server access method and the system thereof can ensure the security of data in the intranet server under the condition of not changing the original network architecture.
In order to solve the technical problems, the invention adopts the technical scheme that: an access method of a server, comprising:
the client logs in the authorization server through the login information;
after the authorization server verifies that the login information passes, sending preset authority information of the user corresponding to the login information to the client, wherein the authority information comprises a protected server accessible by the user and a proxy server accessible to the protected server;
when the client accesses a protected server, judging whether the client can access the protected server or not according to the authority information;
and if so, the client accesses the protected server through the proxy server in the authority information.
The invention also relates to an access system for a server, comprising:
the login module is used for the client to login the authorization server through login information;
the first sending module is used for sending preset authority information of the user corresponding to the login information to the client after the authorization server verifies that the login information passes, wherein the authority information comprises a protected server accessible by the user and a proxy server accessible to the protected server;
the judging module is used for judging whether the client can access the protected server or not according to the authority information when the client accesses the protected server;
and the access module is used for accessing the protected server by the client through the proxy server in the authority information if the client is in the authority information.
The invention has the beneficial effects that: the login information of the client is verified through the authorization server, so that the identity authentication of the access terminal is realized, and the safety of the intranet server is protected; by setting authority information of the user, the accessible server information can be divided according to the job level of the employee, and the client can only access the protected server in the authority information, so that double confidentiality of part of information in the intranet server can be realized; meanwhile, the client cannot directly access the protected server, but needs to access the protected server through the proxy server, so that the safety of the protected server is further ensured. The invention can realize the identity authentication of the access terminal and the safety protection of the internal network server without purchasing a specific firewall, has low cost and simple and convenient deployment, and does not need to change the original network architecture of an enterprise; meanwhile, the compatibility is good, and all network structures can be compatible.
Drawings
FIG. 1 is a flow chart of a method for accessing a server according to the present invention;
FIG. 2 is a flowchart of a method according to a first embodiment of the present invention;
FIG. 3 is a flowchart of a method of step S8 according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a server access system according to the present invention;
fig. 5 is a schematic structural diagram of a system according to a third embodiment of the present invention.
Description of reference numerals:
1. a login module; 2. a first sending module; 3. a judgment module; 4. an access module; 5. a deployment module; 6. setting a module; 7. a correlation module;
41. a first encryption unit; 42. a first decryption unit; 43. a generating unit; 44. a second encryption unit; 45. a second decryption unit.
Detailed Description
In order to explain technical contents, objects and effects of the present invention in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
The most key concept of the invention is as follows: and the deployment authorization server performs identity authentication and authority information issuing, and deploys a proxy server to proxy the protected server.
Referring to fig. 1, an access method of a server includes:
the client logs in the authorization server through the login information;
after the authorization server verifies that the login information passes, sending preset authority information of the user corresponding to the login information to the client, wherein the authority information comprises a protected server accessible by the user and a proxy server accessible to the protected server;
when the client accesses a protected server, judging whether the client can access the protected server or not according to the authority information;
and if so, the client accesses the protected server through the proxy server in the authority information.
From the above description, the beneficial effects of the present invention are: identity authentication of an access terminal and safety protection of an internal network server can be realized without purchasing a specific firewall, the cost is low, the deployment is simple and convenient, and the original network architecture of an enterprise does not need to be changed; meanwhile, the compatibility is good, and all network structures can be compatible.
Further, before the "client logs in the authorization server through the login information", the method further includes:
deploying an authorization server and a proxy server in an intranet;
and setting a configuration for opening access rights only for the proxy server on the protected server.
As can be seen from the above description, the client cannot directly access the protected server, but needs to access the protected server through the proxy server, thereby ensuring the security of the protected server.
Further, still include:
if more than two protected servers have access permission to the same proxy server, the same proxy server opens more than two ports, and the more than two ports are respectively in one-to-one correspondence with the more than two protected servers.
Further, the proxy server which can access the protected server in the authority information comprises an IP address of the proxy server which can access the protected server and port information corresponding to the protected server;
the "the client accesses the protected server through the proxy server in the permission information" specifically includes:
and the client accesses the protected server through the proxy server according to the IP address of the proxy server in the authority information and the port information corresponding to the protected server.
It can be known from the above description that one port in the proxy server acts for one protected server, and under the conditions of cost saving and simple deployment, it is ensured that access to the protected server is not disordered, thereby effectively ensuring the security of the protected server.
Further, the "the client accesses the protected server through the proxy server in the authority information" specifically includes:
the client encrypts request data for accessing the protected server according to the authority information and then sends the encrypted request data to a proxy server in the authority information;
the proxy server decrypts the data sent by the client to obtain request data, and sends the request data to the protected server;
the protected server generates response data according to the request data and sends the response data to the proxy server;
the proxy server encrypts the response data and sends the response data to the client;
and the client decrypts the data sent by the proxy server to obtain response data.
As can be seen from the above description, by performing encrypted transmission on data between the client and the proxy server, network monitoring is prevented, and access security is further ensured.
Further, the client is a browser client.
As can be seen from the above description, the protection of the enterprise server is realized by the dual-proxy mode of the browser client and the proxy server.
Referring to fig. 4, the present invention further provides an access system for a server, including:
the login module is used for the client to login the authorization server through login information;
the first sending module is used for sending preset authority information of the user corresponding to the login information to the client after the authorization server verifies that the login information passes, wherein the authority information comprises a protected server accessible by the user and a proxy server accessible to the protected server;
the judging module is used for judging whether the client can access the protected server or not according to the authority information when the client accesses the protected server;
and the access module is used for accessing the protected server by the client through the proxy server in the authority information if the client is in the authority information.
Further, still include:
the deployment module is used for deploying the authorization server and the proxy server in the intranet;
and the setting module is used for setting the configuration of opening the access authority only for the proxy server on the protected server.
Further, still include:
and the association module is used for opening more than two ports by the same proxy server and correspondingly associating the more than two ports with the more than two protected servers one by one if more than two protected servers have access rights to the same proxy server.
Further, the proxy server which can access the protected server in the authority information comprises an IP address of the proxy server which can access the protected server and port information corresponding to the protected server;
the access module is specifically configured to access, by the client, the protected server through the proxy server according to the IP address of the proxy server in the permission information and the port information of the protected server corresponding to the IP address.
Further, the access module includes:
the first encryption unit is used for encrypting the request data for accessing the protected server and sending the encrypted request data to the proxy server in the authority information by the client according to the authority information;
the first decryption unit is used for decrypting the data sent by the client by the proxy server to obtain request data and sending the request data to the protected server;
the generating unit is used for generating response data by the protected server according to the request data and sending the response data to the proxy server;
the second encryption unit is used for encrypting the response data by the proxy server and then sending the encrypted response data to the client;
and the second decryption unit is used for decrypting the data sent by the proxy server by the client to obtain response data.
Further, the client is a browser client.
Example one
Referring to fig. 2, a first embodiment of the present invention is: an access method of a server, which can be applied to the access of an intranet server, comprises the following steps:
s1: deploying an authorization server and a proxy server in an intranet; furthermore, deployment on the same network segment as the protected server is more efficient than deployment on a different network segment. In this embodiment, one authorization server and one proxy server are deployed, and optionally, the two servers may be deployed on the same computer.
S2: and setting a configuration for opening access rights only for the proxy server on the protected server. The protected server is an internal server website system needing protection inside an enterprise, such as ERP, OA and the like. Specifically, such a rule can be configured on a software firewall carried by the protected server, only the IP of the computer in which the proxy server is deployed can access the IP address and the port of the protected server, and other IPs cannot access the IP address and the port of the protected server. After deployment is complete, only the proxy server is able to access the protected internal server system, and other computers that wish to access the protected internal server system are able to pass through the proxy server.
For example, an authorization server and a proxy server are newly deployed under the same switch as the ERP server, and the ERP server is configured with an IP address and a port that only allow the IP address of the proxy server to access the protected server. Assuming that the IP address and port of the ERP server is 192.168.1.2:80 and the IP address of the proxy server is 192.168.1.3, then such a rule is configured: only 192.168.1.3 can access 192.168.1.2: 80.
S3: presetting authority information of a user and storing the authority information into an authorization server, wherein the authority information comprises a protected server which can be accessed by the user and a proxy server which can be accessed to the protected server; further, the protected server accessible by the user in the authority information includes an IP address and port information of the protected server accessible by the user. Further, the authority information may further include login information, or be associated with the login information of the user in a one-to-one correspondence manner.
S4: the client logs in the authorization server through the login information; preferably, the client is a browser client; the home page of the browser client can be set as a login page of an authorization server website, and a user can input login information on the login page, wherein the login information can be a user name and a password.
S5: the authorization server verifies the login information, determines whether the verification is passed, and if so, executes step S6.
S6: and the authorization server sends the authority information of the user corresponding to the login information to the client.
S7: when the client accesses the protected server, whether the client can access the protected server is judged according to the authority information, and if yes, the step S8 is executed. When a logged-in user accesses a server through a client, whether the accessed server is a protected server is judged according to an IP address and port information of the access server, namely whether an agent channel needs to be taken or not is judged, if not, the access is directly carried out, and if yes, whether the user has the authority to access the protected server is judged according to the authority information of the user.
S8: and the client accesses the protected server through the proxy server in the authority information.
Further, if there are more than two protected servers opening access rights to the same proxy server, the same proxy server opens more than two ports, and associates the more than two ports with the more than two protected servers in a one-to-one correspondence manner. At this time, the proxy server in the authority information, which can access the protected server, includes an IP address of the proxy server which can access the protected server and port information corresponding to the protected server.
For example, there are multiple protected servers in an enterprise website system architecture, but only one proxy server is deployed, at this time, the proxy server opens ports corresponding to the number of protected servers, that is, opens ports corresponding to the number of protected servers, and associates the ports with the multiple protected servers one by one, so that each protected server has a port of the proxy server to proxy.
At this time, for step S8, the client accesses the protected server through the proxy server according to the IP address of the proxy server in the authority information and the port information corresponding to the protected server.
For example, the IP address and port of the ERP server are 192.168.1.2:80, the IP address and port of the proxy server acting on the ERP server are 192.168.1.3:20174, and when the browser client judges that the accessed website information is 192.168.1.2:80, the data is proxied to the proxy server 192.168.1.3:20174 (first proxy forwarding) and then forwarded to 192.168.1.2:80 by the proxy server 192.168.1.3 (second proxy forwarding). Further, when the proxy 192.168.1.3 receives the response data of the ERP server 192.168.1.2:80, the response data is returned to the browser client through the data channel of the original proxy, i.e., through the 20174 port.
In the embodiment, the enterprise server is protected in a double-proxy mode of the browser client and the proxy server. Identity authentication of an access terminal and safety protection of an internal network server can be realized without purchasing a specific firewall, the cost is low, the deployment is simple and convenient, and the original network architecture of an enterprise does not need to be changed; meanwhile, the compatibility is good, and all network structures can be compatible.
Example two
Referring to fig. 3, in the present embodiment, a further development of step S8 in the first embodiment is provided, and the step S8 includes the following steps:
s81: the client encrypts request data for accessing the protected server according to the authority information and then sends the encrypted request data to a proxy server in the authority information;
s82: the proxy server decrypts the data sent by the client to obtain request data, and sends the request data to the protected server;
s83: the protected server generates response data according to the request data and sends the response data to the proxy server;
s84: the proxy server encrypts the response data and sends the response data to the client;
s85: and the client decrypts the data sent by the proxy server to obtain response data.
For example, after the login is successful, a user opens a new tab page through a browser client, inputs an ERP website address, and the browser client checks that the input ERP address is the address of the protected server and the user has access right, encrypts http/https request data for accessing the ERP according to the right information of the user and forwards the encrypted http/https request data to the proxy server; after receiving the data sent by the browser client, the proxy server decrypts the data and forwards the data to the ERP server; after receiving the http/https request data, the ERP server makes a corresponding response and transmits the response data to the proxy server; the proxy server encrypts response data transmitted by the ERP server and returns the encrypted data to the browser client through a data channel of the original proxy; and the browser client receives the data transmitted by the proxy server and decrypts the data to obtain the data of the ERP responding to the http/https request.
By carrying out encryption transmission on data between the client and the proxy server, network monitoring is prevented, and access security is further ensured.
EXAMPLE III
Referring to fig. 5, the present embodiment is a system for accessing a server corresponding to the foregoing embodiment, including:
the login module 1 is used for logging in the authorization server by the client through login information;
the first sending module 2 is configured to send, to the client, preset authority information of the user corresponding to the login information after the authorization server verifies that the login information passes, where the authority information includes a protected server accessible by the user and a proxy server accessible to the protected server;
the judging module 3 is used for judging whether the client can access the protected server or not according to the authority information when the client accesses the protected server;
and the access module 4 is used for accessing the protected server by the client through the proxy server in the authority information if the client is in the authorized state.
Further, still include:
a deployment module 5, configured to deploy an authorization server and a proxy server in an intranet;
and the setting module 6 is used for setting the configuration of opening the access right only to the proxy server on the protected server.
Further, still include:
and the association module 7 is configured to, if there are more than two protected servers that open access permissions to the same proxy server, open more than two ports by the same proxy server, and associate the more than two ports with the more than two protected servers in a one-to-one correspondence manner.
Further, the proxy server which can access the protected server in the authority information comprises an IP address of the proxy server which can access the protected server and port information corresponding to the protected server;
the access module 4 is specifically configured to access, by the client, the protected server through the proxy server according to the IP address of the proxy server in the permission information and the port information of the protected server corresponding to the IP address.
Further, the access module 4 includes:
a first encryption unit 41, configured to encrypt, by the client according to the authority information, request data for accessing the protected server and send the encrypted request data to a proxy server in the authority information;
a first decryption unit 42, configured to decrypt, by the proxy server, the data sent by the client to obtain request data, and send the request data to the protected server;
a generating unit 43, configured to generate response data according to the request data by the protected server, and send the response data to the proxy server;
a second encryption unit 44, configured to encrypt the response data and send the encrypted response data to the client by the proxy server;
and a second decryption unit 45, configured to decrypt, by the client, the data sent by the proxy server to obtain response data.
Further, the client is a browser client.
In summary, according to the server access method and the system thereof provided by the present invention, the authorization server verifies the login information of the client, so as to implement the identity authentication of the access terminal and protect the security of the intranet server; by setting authority information of the user, the accessible server information can be divided according to the job level of the employee, and the client can only access the protected server in the authority information, so that double confidentiality of part of information in the intranet server can be realized; meanwhile, the client cannot directly access the protected server, but needs to access the protected server through the proxy server, so that the safety of the protected server is further ensured; by carrying out encryption transmission on data between the client and the proxy server, network monitoring is prevented, and access security is further ensured. The invention can realize the identity authentication of the access terminal and the safety protection of the internal network server without purchasing a specific firewall, has low cost and simple and convenient deployment, and does not need to change the original network architecture of an enterprise; meanwhile, the compatibility is good, and all network structures can be compatible.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (6)

1. An access method for a server, comprising:
deploying an authorization server and a proxy server in an intranet;
setting the configuration of opening access authority only for the proxy server on the protected server;
the client logs in the authorization server through the login information;
after the authorization server verifies that the login information passes, sending preset authority information of the user corresponding to the login information to the client, wherein the authority information comprises a protected server accessible by the user and a proxy server accessible to the protected server;
when the client accesses a protected server, judging whether the client can access the protected server or not according to the authority information;
if so, the client accesses the protected server through the proxy server in the authority information;
further comprising:
if more than two protected servers have access permission to the same proxy server, the same proxy server opens more than two ports, and the more than two ports are respectively in one-to-one correspondence with the more than two protected servers.
2. The server access method according to claim 1, wherein the proxy server having access to the protected server in the authority information includes an IP address of the proxy server having access to the protected server and port information corresponding to the protected server;
the "the client accesses the protected server through the proxy server in the permission information" specifically includes:
and the client accesses the protected server through the proxy server according to the IP address of the proxy server in the authority information and the port information corresponding to the protected server.
3. The server access method according to claim 1, wherein the "the client accesses the protected server through the proxy server in the authority information" specifically includes:
the client encrypts request data for accessing the protected server according to the authority information and then sends the encrypted request data to a proxy server in the authority information;
the proxy server decrypts the data sent by the client to obtain request data, and sends the request data to the protected server;
the protected server generates response data according to the request data and sends the response data to the proxy server;
the proxy server encrypts the response data and sends the response data to the client;
and the client decrypts the data sent by the proxy server to obtain response data.
4. An access method for a server according to any of claims 1-3, wherein the client is a browser client.
5. An access system for a server, comprising:
the deployment module is used for deploying the authorization server and the proxy server in the intranet;
the setting module is used for setting the configuration of opening the access authority only for the proxy server on the protected server;
the login module is used for the client to login the authorization server through login information;
the first sending module is used for sending preset authority information of the user corresponding to the login information to the client after the authorization server verifies that the login information passes, wherein the authority information comprises a protected server accessible by the user and a proxy server accessible to the protected server;
the judging module is used for judging whether the client can access the protected server or not according to the authority information when the client accesses the protected server;
the access module is used for accessing the protected server by the client through the proxy server in the authority information if the client is in the authority information;
further comprising:
and the association module is used for opening more than two ports by the same proxy server and correspondingly associating the more than two ports with the more than two protected servers one by one if more than two protected servers have access rights to the same proxy server.
6. The server access system according to claim 5, wherein the proxy server having access to the protected server in the authority information includes an IP address of the proxy server having access to the protected server and port information corresponding to the protected server;
the access module is specifically configured to access, by the client, the protected server through the proxy server according to the IP address of the proxy server in the permission information and the port information of the protected server corresponding to the IP address.
CN201710540123.8A 2017-07-05 2017-07-05 Server access method and system Active CN107257344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710540123.8A CN107257344B (en) 2017-07-05 2017-07-05 Server access method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710540123.8A CN107257344B (en) 2017-07-05 2017-07-05 Server access method and system

Publications (2)

Publication Number Publication Date
CN107257344A CN107257344A (en) 2017-10-17
CN107257344B true CN107257344B (en) 2020-07-28

Family

ID=60024952

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710540123.8A Active CN107257344B (en) 2017-07-05 2017-07-05 Server access method and system

Country Status (1)

Country Link
CN (1) CN107257344B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632253B (en) * 2018-04-04 2021-09-10 平安科技(深圳)有限公司 Client data security access method and device based on mobile terminal
CN109309684A (en) * 2018-10-30 2019-02-05 红芯时代(北京)科技有限公司 A kind of business access method, apparatus, terminal, server and storage medium
CN109347855B (en) * 2018-11-09 2020-06-05 南京医渡云医学技术有限公司 Data access method, device, system, electronic design and computer readable medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036883A (en) * 2012-12-14 2013-04-10 公安部第一研究所 Secure communication method and system of secure server
CN105516061A (en) * 2014-09-25 2016-04-20 中兴通讯股份有限公司 Remote server access method and web server

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101207485B (en) * 2007-08-15 2010-12-01 深圳市同洲电子股份有限公司 System and method of unification identification safety authentication for users
KR101141428B1 (en) * 2008-12-16 2012-05-04 한국전자통신연구원 Method for preventing illegal watching using peculiar information of secure micro
CN106161467A (en) * 2016-08-31 2016-11-23 成都九鼎瑞信科技股份有限公司 Water utilities data access method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036883A (en) * 2012-12-14 2013-04-10 公安部第一研究所 Secure communication method and system of secure server
CN105516061A (en) * 2014-09-25 2016-04-20 中兴通讯股份有限公司 Remote server access method and web server

Also Published As

Publication number Publication date
CN107257344A (en) 2017-10-17

Similar Documents

Publication Publication Date Title
JP6431037B2 (en) System and method for identifying secure applications when connected to a network
US8312064B1 (en) Method and apparatus for securing documents using a position dependent file system
US8813247B1 (en) Providing cryptographic security for objective-oriented programming files
US9330245B2 (en) Cloud-based data backup and sync with secure local storage of access keys
CN103095847B (en) Cloud storage safety-ensuring method and system thereof
CN103248479A (en) Cloud storage safety system, data protection method and data sharing method
US10992656B2 (en) Distributed profile and key management
EP2251810B1 (en) Authentication information generation system, authentication information generation method, and authentication information generation program utilizing a client device and said method
US6990582B2 (en) Authentication method in an agent system
JP2004509398A (en) System for establishing an audit trail for the protection of objects distributed over a network
CN109714171B (en) Safety protection method, device, equipment and medium
JP2003526836A (en) Method, system, server, and apparatus for securing a communication network
CN103166977A (en) Method, terminal, server and system for accessing website
CN107257344B (en) Server access method and system
CN110996319A (en) System and method for performing activation authorization management on software service
Rountree Security for Microsoft Windows system administrators: introduction to key information security concepts
KR100948873B1 (en) Security and management device for database security and control method thereof
CN106992978A (en) Network safety managing method and server
US11443023B2 (en) Distributed profile and key management
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
US9419800B2 (en) Secure network systems and methods
CN113672973B (en) Database system of embedded device based on RISC-V architecture of trusted execution environment
KR20110128371A (en) Mobile authentication system and central control system, and the method of operating them for mobile clients
KR20160012546A (en) Remote control system of mobile
CN103793658A (en) VPN-based (virtual private network) offline file protecting system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant