CN107426213A - The method and system that a kind of limitation SSR management platforms log in - Google Patents

The method and system that a kind of limitation SSR management platforms log in Download PDF

Info

Publication number
CN107426213A
CN107426213A CN201710615407.9A CN201710615407A CN107426213A CN 107426213 A CN107426213 A CN 107426213A CN 201710615407 A CN201710615407 A CN 201710615407A CN 107426213 A CN107426213 A CN 107426213A
Authority
CN
China
Prior art keywords
ssr
management platforms
terminal
log
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710615407.9A
Other languages
Chinese (zh)
Inventor
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710615407.9A priority Critical patent/CN107426213A/en
Publication of CN107426213A publication Critical patent/CN107426213A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

A kind of method that limitation SSR management platforms log in, specifically includes following steps:Configuration access terminal IP lists;Judge the logon name of login user and log in IP address;Decided whether that SSR management platforms can be logged according to judged result.The system that a kind of limitation SSR management platforms log in, including SSR management platforms, SSR management platform databases, it is stored with and accesses terminal IP lists, the IP address accessed in terminal IP lists can accesses SSR management platforms;With judge module, for judging the logon name of login user and logging in IP address;With login module, for logging in SSR management platforms according to the judged result of judge module.A kind of technical scheme in technical solution of the present invention realizes the white list for accessing SSR management platforms, and the only terminal of IP present in list can just log in SSR management platforms.This method serves the effect for protecting SSR management platforms not by illegal invasion, improves the security of SSR products.

Description

The method and system that a kind of limitation SSR management platforms log in
Technical field
The present invention relates to platform to log in administrative skill field, the side that specifically a kind of limitation SSR management platforms log in Method and system.
Background technology
Nowadays, host computer system is an important topic safely.Host Security strengthening system (abbreviation SSR) is based on to master The kernel level security enhancing protection of machine, when unwarranted internal, external network user breaches the networks such as fire wall by various means Safety product is entered inside main frame, and Host Security strengthening system is just by as one last and most firm of defence line.SSR is real The function of network management is showed, strategy point can have been carried out to the SSR clients on master host by SSR management platforms The functions such as hair, modification, inquiry, deletion.And daily record caused by operation can be recorded.For violation daily record, can carry out The audit activitieses such as condition query, backup.So how to ensure that SSR management platforms by illegal invasion, do not need to solve instantly Problem.
The content of the invention
It is an object of the invention to provide the method and system that a kind of limitation SSR management platforms log in, for solving to prevent Illegal the problem of logging in SSR management platforms.
The technical scheme adopted by the invention to solve the technical problem is that:A kind of method that limitation SSR management platforms log in, Specifically include following steps:
Configuration access terminal IP lists;
Judge the logon name of login user and log in IP address;
Decided whether that SSR management platforms can be logged according to judged result.
Further, need super keepe to log in SSR management platforms before the configuration access terminal IP lists, enter Enter system security setting, enable and access terminal IP list controls functions;Terminal IP lists will be accessed to preserve to SSR management platform numbers According to storehouse.
Further, the logon name for judging login user and the specific method of login IP address include:
Judge whether login user is super keepe, if it is not, then judging the IP address logged in;
Whether the IP address for judging to log in is that the IP address in terminal IP lists is accessed in SSR management platform databases.
Further, it is described to decide whether that log in SSR management platforms specifically includes according to judged result:
Family is employed if super keepe, then is not limited by terminal IP lists are accessed, can be in any IP terminal landings Management platform;The IP address of login then may have access to SSR management platforms if accessing the IP address in terminal IP lists, if It is not that can not then access SSR management platforms.
The system that a kind of limitation SSR management platforms log in, using described method, including SSR management platforms, in addition to
SSR management platform databases, it is stored with and accesses terminal IP lists, the IP address accessed in terminal IP lists can visits Ask SSR management platforms;With,
Judge module, for judging the logon name of login user and logging in IP address;With,
Login module, for logging in SSR management platforms according to the judged result of judge module.
Further, the criterion of the judge module includes login name standard and IP standards;Described login identifier Standard is whether logon name is super keepe;The IP standards include:Whether the IP address of registration terminal is to access terminal IP IP address in list.
Further, the login module logs in SSR management platforms according to the judged result of judge module and specifically included:When Judged result is logon name when being super keepe, carries out logging in SSR management platforms by login module;When judged result is The IP address of registration terminal is when accessing the IP address in terminal IP lists, and SSR management platforms are logged in by login module.
Further, in addition to setup module, terminal IP list controls functions are accessed for enabling.
The effect provided in the content of the invention is only the effect of embodiment, rather than whole effects that invention is all, above-mentioned A technical scheme in technical scheme has the following advantages that or beneficial effect:
By using the method for accessing terminal IP lists limitation, the white list for accessing SSR management platforms is realized, is only arranged The terminal of IP present in table can just log in SSR management platforms.This method, which serves, protects SSR management platforms not by illegal invasion Effect, improve the securities of SSR products.
Brief description of the drawings
Fig. 1 is the method flow schematic diagram of the embodiment of the present invention;
Fig. 2 is the system module connection diagram of the embodiment of the present invention.
Embodiment
In order to the technical characterstic of clear explanation this programme, below by embodiment, and its accompanying drawing is combined, to this Invention is described in detail.Following disclosure provides many different embodiments or example is used for realizing the different knots of the present invention Structure.In order to simplify disclosure of the invention, hereinafter the part and setting of specific examples are described.In addition, the present invention can be with Repeat reference numerals and/or letter in different examples.This repetition is that for purposes of simplicity and clarity, itself is not indicated Relation between various embodiments are discussed and/or set.It should be noted that part illustrated in the accompanying drawings is not necessarily to scale Draw.Present invention omits the description to known assemblies and treatment technology and process to avoid being unnecessarily limiting the present invention.
The present invention is using the method for accessing terminal IP lists limitation, and using the mode for accessing white list, realizing only makes It could normally be logged in the terminal access SSR management platforms of the IP address in white list, access the terminal outside terminal IP lists SSR management platforms can not be logged in.
As shown in figure 1, a kind of method that limitation SSR management platforms log in, specifically includes following steps:
Configuration access terminal IP lists;Judge the logon name of login user and log in IP address;Determined according to judged result It is fixed whether to log in SSR management platforms.
Need super keepe to log in SSR management platforms before configuration access terminal IP lists, set safely into system Put, enable and access terminal IP list controls functions;Terminal IP lists will be accessed to preserve to SSR management platform databases.
The logon name for judging login user and the specific method for logging in IP address include:
Judge whether login user is super keepe, if it is not, then judging the IP address logged in;
Whether the IP address for judging to log in is that the IP address in terminal IP lists is accessed in SSR management platform databases.
Decide whether that can log in SSR management platforms specifically includes according to judged result:
Login user is not limited by terminal IP lists are accessed then, can stepped in any IP terminals if super keepe Land management platform;The IP address of login then may have access to SSR management platforms, such as if accessing the IP address in terminal IP lists Fruit is not that can not then access SSR management platforms.
As shown in Fig. 2 the system that a kind of limitation SSR management platforms log in, including SSR management platforms, in addition to
SSR management platform databases, it is stored with and accesses terminal IP lists, the IP address accessed in terminal IP lists can visits Ask SSR management platforms;With judge module, for judging the logon name of login user and logging in IP address;With, login module, For logging in SSR management platforms according to the judged result of judge module.
The criterion of judge module includes login name standard and IP standards;Described login name standard is for logon name No is super keepe;The IP standards include:Whether the IP address of registration terminal is to access the IP address in terminal IP lists.
Login module logs in SSR management platforms according to the judged result of judge module and specifically included:When judged result is to step on When record title is super keepe, carry out logging in SSR management platforms by login module;As the IP that judged result is registration terminal Address is when accessing the IP address in terminal IP lists, and SSR management platforms are logged in by login module.
System also includes setup module, and terminal IP list controls functions are accessed for enabling.Terminal IP is accessed by enabling List, only allow the terminal access management platform of the IP in access list, do not allow the terminal access of the IP outside access list Management platform.Both the SSR management platforms malice caused by user name password is revealed had been reduced to log in, it is flat to decrease SSR management Platform is by the risk of explosion.Improve the SSR products securities of itself.
Simply the preferred embodiment of the present invention described above, for those skilled in the art, Without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications are also regarded as this hair Bright protection domain.

Claims (8)

1. a kind of method that limitation SSR management platforms log in, it is characterized in that, specifically include following steps:
Configuration access terminal IP lists;
Judge the logon name of login user and log in IP address;
Decided whether that SSR management platforms can be logged according to judged result.
2. the method that a kind of limitation SSR management platforms according to claim 1 log in, it is characterized in that, visited in the configuration Ask needs super keepe to log in SSR management platforms before terminal IP lists, into system security setting, enables and accesses terminal IP List controls function;Terminal IP lists will be accessed to preserve to SSR management platform databases.
3. the method that a kind of limitation SSR management platforms according to claim 1 log in, it is characterized in that, it is described to judge to log in The logon name of user and the specific method of login IP address include:
Judge whether login user is super keepe, if it is not, then judging the IP address logged in;
Whether the IP address for judging to log in is that the IP address in terminal IP lists is accessed in SSR management platform databases.
4. the method that a kind of limitation SSR management platforms according to claim 3 log in, it is characterized in that, it is described according to judgement As a result SSR management platforms can be logged in by, which deciding whether, specifically includes:
Login user is not limited then if super keepe by terminal IP lists are accessed, can be in any IP terminal landings pipe Platform;The IP address of login then may have access to SSR management platforms, if not if accessing the IP address in terminal IP lists It is that can not then access SSR management platforms.
5. the system that a kind of limitation SSR management platforms log in, utilizes the method described in claim 1-4 any one, including SSR Management platform, it is characterized in that, in addition to
SSR management platform databases, it is stored with and accesses terminal IP lists, the IP address accessed in terminal IP lists can accesses SSR management platforms;With,
Judge module, for judging the logon name of login user and logging in IP address;With,
Login module, for logging in SSR management platforms according to the judged result of judge module.
6. the system that a kind of limitation SSR management platforms according to claim 5 log in, it is characterized in that, the judge module Criterion include login name standard and IP standards;Described login name standard is whether logon name is super keepe; The IP standards include:Whether the IP address of registration terminal is to access the IP address in terminal IP lists.
7. the system that a kind of limitation SSR management platforms according to claim 6 log in, it is characterized in that, the login module SSR management platforms are logged according to the judged result of judge module to specifically include:When judged result is that logon name is super management During member, carry out logging in SSR management platforms by login module;When the IP address that judged result is registration terminal is to access terminal IP During IP address in list, pass through login module and log in SSR management platforms.
8. the system that a kind of limitation SSR management platforms according to claim 5 log in, it is characterized in that, in addition to mould is set Block, terminal IP list controls functions are accessed for enabling.
CN201710615407.9A 2017-07-26 2017-07-26 The method and system that a kind of limitation SSR management platforms log in Pending CN107426213A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710615407.9A CN107426213A (en) 2017-07-26 2017-07-26 The method and system that a kind of limitation SSR management platforms log in

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710615407.9A CN107426213A (en) 2017-07-26 2017-07-26 The method and system that a kind of limitation SSR management platforms log in

Publications (1)

Publication Number Publication Date
CN107426213A true CN107426213A (en) 2017-12-01

Family

ID=60430279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710615407.9A Pending CN107426213A (en) 2017-07-26 2017-07-26 The method and system that a kind of limitation SSR management platforms log in

Country Status (1)

Country Link
CN (1) CN107426213A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088875A (en) * 2018-08-24 2018-12-25 郑州云海信息技术有限公司 A kind of access authority method of calibration and device
CN110290138A (en) * 2019-06-27 2019-09-27 苏宁消费金融有限公司 Limitation login method and system suitable for test database

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917423A (en) * 2010-08-05 2010-12-15 上海酷族信息技术有限公司 Operating method for safety protection of database
US8046578B1 (en) * 2004-04-14 2011-10-25 Hewlett-Packard Development Comopany, L.P. System and method for providing HTML authentication using an access controller
CN105634745A (en) * 2016-02-26 2016-06-01 深圳市金百锐通信科技有限公司 Security authentication method and device for application installation
CN107070905A (en) * 2017-03-31 2017-08-18 山东超越数控电子有限公司 A kind of security gateway system for parsing multi-protocols and its application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8046578B1 (en) * 2004-04-14 2011-10-25 Hewlett-Packard Development Comopany, L.P. System and method for providing HTML authentication using an access controller
CN101917423A (en) * 2010-08-05 2010-12-15 上海酷族信息技术有限公司 Operating method for safety protection of database
CN105634745A (en) * 2016-02-26 2016-06-01 深圳市金百锐通信科技有限公司 Security authentication method and device for application installation
CN107070905A (en) * 2017-03-31 2017-08-18 山东超越数控电子有限公司 A kind of security gateway system for parsing multi-protocols and its application

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088875A (en) * 2018-08-24 2018-12-25 郑州云海信息技术有限公司 A kind of access authority method of calibration and device
CN110290138A (en) * 2019-06-27 2019-09-27 苏宁消费金融有限公司 Limitation login method and system suitable for test database
CN110290138B (en) * 2019-06-27 2021-12-21 苏宁消费金融有限公司 Restricted login method and system suitable for test database

Similar Documents

Publication Publication Date Title
CN107295116B (en) Domain name resolution method, device and system
KR100745044B1 (en) Apparatus and method for protecting access of phishing site
CN103634786A (en) Method and system for security detection and repair of wireless network
CN101888329B (en) Address resolution protocol (ARP) message processing method, device and access equipment
CN104219200A (en) Device and method for protection from DNS cache attack
CN105939326A (en) Message processing method and device
CN104378255B (en) The detection method and device of web malicious users
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN110545269A (en) Access control method, device and storage medium
CN108259473A (en) Web server scan protection method
US9635017B2 (en) Computer network security management system and method
CN108156270A (en) Domain name request treating method and apparatus
CN110881186B (en) Illegal device identification method and device, electronic device and readable storage medium
CN105100048A (en) WiFi network security identification method, server, client device and system
CN106878335A (en) A kind of method and system for login authentication
CN107426213A (en) The method and system that a kind of limitation SSR management platforms log in
CN106453425A (en) Multiuser right management method and multiuser right management system for using host plugin
CN103685318B (en) Data processing method and device for network safety prevention
US20220116359A1 (en) Method, device, and computer-readable storage medium for processing an access request
CN113221180A (en) Database security access system and method
CN112231679A (en) Terminal equipment verification method and device and storage medium
CN111131273A (en) Internet access control system for network engineering
CN106888197A (en) The processing method and equipment of a kind of network risks
CN115168830A (en) Login method and login device for detecting user login environment
CN111586009A (en) CDN-based cloud security protection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171201

RJ01 Rejection of invention patent application after publication