Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method, client and server

An access control and client-side technology, applied in the field of network security, can solve the problems of complex operation and setting learning costs, users cannot log in normally, etc., and achieve the effects of reducing learning costs, high use efficiency, and high positioning accuracy

Inactive Publication Date: 2020-09-11
XIAMEN 258 GRP
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of restricting access to IP addresses has the problem of client IP changes. Reasons such as router restarts and company power outages may cause network reconnection and cause IP changes, resulting in users being unable to log in normally.
The way of accessing through enterprise VPN has the problems of complex operation settings, certain requirements for the user's computer level and certain learning costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, client and server
  • Access control method, client and server
  • Access control method, client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] see figure 1 , is a schematic diagram of a connection between a client and a server provided in the embodiment of this application.

[0052] The client 101 includes a client terminal A (1011) and a client terminal B (1012). The client A and the client B are connected to the server 102 through a network to realize mutual communication.

[0053] It should be noted that the geographical location of the client A and the client B are the same, so that the actual geographic location information of the user can be obtained through the client A.

[0054] Preferably, client A runs on a mobile device, and can scan the login QR code on client B through the camera.

[0055] Preferably, the client B runs on a personal computer PC. When the user is going to log in to the server, the login preparation is first made on client B. If the client B finds that the user has already logged in, it will prompt that the user has logged in, and no further login operation through the client A i...

Embodiment 2

[0060] like figure 2 , this embodiment also provides an access control method, the method comprising:

[0061] S201. When the client B determines that the user is not logged in, generate a login QR code of the user.

[0062] When the user is about to log in to the server, he operates through the client B, and the client B checks the user's login status, and if it finds that the user is not logged in, it generates the user's login QR code. If client B finds that the user has logged in, the user can normally access the server through client B.

[0063] It should be noted that the client B checks the login status of the user, which may be specifically determined based on the login information of the user recorded locally. Preferably, it is determined that the user has logged in when the time of the user's operation is not more than time N from the last log-in time of the user. If time N is exceeded, client B logs out the user and records that the user is not logged in.

[00...

Embodiment 3

[0080] like image 3 As shown, this embodiment also provides an access control method, which specifically includes:

[0081] S301, client B judges whether the user is logged in, if the user has logged in, execute S302, otherwise execute S303.

[0082] The method for judging whether the user logs in in this step is the same as that in Embodiment 2, and will not be repeated here.

[0083] S302, the client B prompts that the user has logged in.

[0084] When client B judges that the user has logged in, it allows the user to access the server normally and use the corresponding service.

[0085] S303, generating a login QR code of the user.

[0086] Client B generates the user's login QR code, and prompts the user to scan the QR code through client A to log in.

[0087] S304, the client A scans the login QR code.

[0088] The method for scanning the two-dimensional code in this embodiment is the same as that in Embodiment 2, and will not be repeated here.

[0089] S305. Clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access control method, a client and a server. The access control method comprises the steps that a client B generates a login two-dimensional code of a user, a client A scans the login two-dimensional code, and the client A obtains a login token, a user token and geographical location information of the user and sends the login token, the user token and the geographicallocation information to the server. The server receives the login token, the user token and the geographical location information, carries out validity verification respectively, and allows the user to log in normally only when the login token, the user token and the geographical location information pass the verification. The invention also provides an access control client and a server. By adopting the method, the client and the server provided by the invention, the learning cost of the user is reduced, and the security of access control is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an access control method, a client and a server. Background technique [0002] In all kinds of data leakage security incidents, human factors account for a large proportion, and staff take advantage of their positions to leak a large amount of data. To prevent data leakage, existing schemes control by restricting visitor IP addresses and enterprise VPN tunnels respectively. The method of restricting access to IP addresses has the problem of client IP changes. Reasons such as router restarts and company power outages may cause network reconnection and cause IP changes, resulting in users being unable to log in normally. Access through enterprise VPN has the problems of complex operation settings, certain requirements for the user's computer skills, and certain learning costs. Contents of the invention [0003] The embodiment of the present application provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06K19/06
CPCH04L63/0807H04L63/08H04L63/107H04L9/3213G06K19/06037
Inventor 庄良基林溪李梦平
Owner XIAMEN 258 GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products