Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Access control method, device and server

An access control and proxy server technology, applied in the field of access control methods and devices and servers, can solve problems affecting data security, server data leakage, etc., and achieve the effect of reducing the risk of data leakage and improving data security.

Active Publication Date: 2017-05-31
ALIBABA (CHINA) CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the encryption algorithm between the client and the server is cracked, the user who cracks the encryption algorithm can use crawlers or other tools to pretend to be the client to maliciously access the server, resulting in data leakage in the server and affecting data safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and server
  • Access control method, device and server
  • Access control method, device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0069] One of the main ideas of this application is to identify the sender of the access request received by the server. If the sender is identified as a proxy server, the access request is rejected, so as to reduce the use of proxy servers to maliciously access the server. Malicious access to the server is reduced, the risk of data leakage in the server is reduced, and data security is improved.

[0070] Firstly, an access control method of this application is introduced.

[0071]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an access control method, a device and a server. The method includes: receiving an access request; determining the IP address of the sending end of sending the access request; based on the IP address, obtaining the information of an open port of the sending end; if it is determined that the sending end is a proxy server based on the port information, denying the access request. The method, device and server can reduce the risk of data leaking of the server and improve the data safety.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to an access control method, device and server. Background technique [0002] With the continuous development of network technology, network access behaviors of users accessing servers through clients are also increasing. In order to ensure the security of data interaction between the client and the server, the client and the server will encrypt the interactive data according to the preset encryption algorithm. [0003] The encryption algorithm is used to encrypt the interactive data between the client and the server, which can improve data security to a certain extent. However, once the encryption algorithm between the client and the server is cracked, the user who cracks the encryption algorithm can use crawlers or other tools to pretend to be the client to maliciously access the server, resulting in data leakage in the server and affecting the data. safe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0236H04L63/0876
Inventor 梁捷杨志伟
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products