CN112134885A - Method and system for encrypting access of internet terminal - Google Patents

Method and system for encrypting access of internet terminal Download PDF

Info

Publication number
CN112134885A
CN112134885A CN202011007005.9A CN202011007005A CN112134885A CN 112134885 A CN112134885 A CN 112134885A CN 202011007005 A CN202011007005 A CN 202011007005A CN 112134885 A CN112134885 A CN 112134885A
Authority
CN
China
Prior art keywords
unit
algorithm
server
data
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011007005.9A
Other languages
Chinese (zh)
Inventor
廖小云
朱一松
欧阳利剑
陈娅
施爱军
杨君中
汤海涛
孙丽丽
于进
王万勇
王志华
陈海涛
倪格格
韩艺
吴波
徐俊
蔡明�
鞠玲
刘黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taizhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Nanjing Yishu Information Science & Technology Co ltd
State Grid Jiangsu Electric Power Co Ltd
Taizhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yishu Information Science & Technology Co ltd, State Grid Jiangsu Electric Power Co Ltd, Taizhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd filed Critical Nanjing Yishu Information Science & Technology Co ltd
Priority to CN202011007005.9A priority Critical patent/CN112134885A/en
Publication of CN112134885A publication Critical patent/CN112134885A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method and a system for encrypting access of an internet terminal, and particularly relates to the field of internet security. According to the invention, through a dynamic encryption mode, a server can update the algorithm at variable time and send the algorithm to a client, and not only one algorithm is needed, but also one algorithm is abandoned every time a hand is held, and in this state, a computer user or a malicious program cannot crack a verified key and algorithm through exhaustion, interception, inverse operation and other modes; all key values are dynamic, which results in a more secure encryption result.

Description

Method and system for encrypting access of internet terminal
Technical Field
The invention relates to the technical field of internet security, in particular to a method and a system for encrypting internet terminal access.
Background
Network software generally refers to the network operating system, network communication protocol and application level special software of the system for providing network service functions. In a computer network environment, software for supporting data communications and various network activities. Systems connected to a computer network are usually configured with different network application systems according to the characteristics, capabilities and service objects of the systems themselves. The purpose is to share the resources of other systems in the network for the local users or to provide the functions and resources of the local systems to other users in the network for use. To this end, each computer network defines a set of network protocols that are commonly followed throughout the network and requires that each host system in the network be configured with corresponding protocol software to ensure reliable and efficient intercommunication and collaboration between the various systems in the network. The network operating system is system software for managing network soft and hard resources and providing simple network management. Common network operating systems include UNIX, Netware, Windows NT, Linux, and the like. UNIX is a powerful time-sharing operating system that has been used previously on both mainframe and minicomputers, transitioning to PCs. UNIX supports TCP/IP protocol, and has strong safety and reliability, and the defect of complex operation and use.
The communication of the network software is based on a wide area network or a local area network, the safety of the client in the communication with the server 1 or other modules in the system is a very important problem, and without effective encryption measures, false clients and false consoles are connected to the server 1 or a database, and transmission of false data, even viruses, trojans and the like, can harm the overall system safety.
Disclosure of Invention
In order to overcome the above defects in the prior art, embodiments of the present invention provide a method and a system for encrypting access to an internet terminal, and the technical problem to be solved by the present invention is: the existing network software login causes the network security problem.
In order to achieve the purpose, the invention provides the following technical scheme: an internet terminal access encryption system comprises a server, wherein a display unit, an input unit and a computer clock unit are arranged at the connecting end of the server, a data uploading unit and a data transmission unit are further arranged at the connecting end of the server, an algorithm database is arranged at the connecting end of the data uploading unit, a verification output unit is arranged at the connecting end of the algorithm database, and a dynamic calculation unit is arranged at the connecting end of the verification output unit;
the server is set as a user PC end host and is used for processing and normally operating the downloaded content of the PC;
the display unit is set as a PC display screen and is used for displaying the proceeding of operation steps and directly reading the notification information from the server and browsing the conventional access information;
the input unit is set as a mouse and a keyboard matched with a PC display screen and a PC end host and is used for inputting information and determining control information;
the computer clock unit is set as a computer clock after the server is networked and is set as real-time;
the data uploading unit is used for uploading the verification information output by the verification output unit to the server;
the data transmission unit is used for transmitting data, and allows normal access and connection with the server for the client side which is successfully verified;
the algorithm database is used for storing various data validation algorithms;
the verification output unit is used for simultaneously transmitting the data generated by the dynamic calculation unit and the system time of the PC end host to the data uploading unit;
the dynamic calculation unit is used for collecting input signals and generating data information through a real-time algorithm in an algorithm database.
In a preferred embodiment, the time value of the computer clock unit is synchronized with real-time data accessed to the internet without a time difference.
In a preferred embodiment, the number of algorithms in the algorithm database is set to be multiple, a single algorithm is abandoned after being used, and the algorithm in the algorithm database is updated by the server in a non-periodic manner.
In a preferred embodiment, the dynamic calculation unit outputs information for generating data for a random algorithm in the algorithm database, the data information being arranged as a character string.
The invention also comprises a method for encrypting the access of the internet terminal, which comprises the following steps:
s1, creating an access task: the input unit is used for logging in the client by the server, and the client and the server perform a handshake operation before communicating;
s2, generating real-time characters: according to the handshake operation of the step S1, a character string is calculated in real time by the dynamic calculation unit according to the algorithm pre-embedded in the algorithm database with the time point of the computer clock unit as the reference;
s3, character checking, namely uploading the character string and the system time calculated in the step S2 to a checking output unit, and checking the algorithm of the real-time algorithm in the algorithm database by the checking output unit through the received data;
if the obtained algorithm is legal, the data uploading unit uploads the verification result to the server, the server controls the display unit to display a handshake success notification, and then the server controls the data transmission unit to start data transmission;
if an illegal algorithm is obtained, the access is terminated.
The invention has the technical effects and advantages that:
the server updates the algorithm at variable time and sends the algorithm to the client, and in addition, one algorithm is not needed, so that one algorithm is abandoned every time the client holds the algorithm, and a computer user or a malicious program cannot crack a verified key and the algorithm in the states of exhaustion, interception, inverse operation and the like; all key values are dynamic, which results in a more secure encryption result.
Drawings
Fig. 1 is an overall block diagram of the present invention.
FIG. 2 is a schematic overall flow chart of the present invention.
The reference signs are: the system comprises a server 1, a display unit 2, an input unit 3, a computer clock unit 4, a data uploading unit 5, a data transmission unit 6, an algorithm database 7, a verification output unit 8 and a dynamic calculation unit 9.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the invention provides an internet terminal access encryption system, which comprises a server 1, wherein a display unit 2, an input unit 3 and a computer clock unit 4 are arranged at the connecting end of the server 1, a data uploading unit 5 and a data transmission unit 6 are also arranged at the connecting end of the server 1, an algorithm database 7 is arranged at the connecting end of the data uploading unit 5, a verification output unit 8 is arranged at the connecting end of the algorithm database 7, and a dynamic calculation unit 9 is arranged at the connecting end of the verification output unit 8;
the server 1 is set as a user PC end host computer and is used for processing and normally operating the downloaded content of the PC;
the display unit 2 is set as a PC display screen and is used for displaying the proceeding of operation steps and directly reading the notification information from the server 1 and browsing the conventional access information;
the input unit 3 is set as a mouse and a keyboard matched with a PC display screen and a PC end host, and is used for inputting information and determining control information;
the computer clock unit 4 is set as a computer clock after the server 1 is networked and is set as real-time, and the time value of the computer clock unit 4 is synchronous with real-time data accessed to the internet without time difference;
the data uploading unit 5 is used for uploading the verification information output by the verification output unit 8 to the server 1;
the data transmission unit 6 is used for data transmission, and allows normal access and connection with the server 1 for the client side which is successfully verified;
the algorithm database 7 is used for storing various data validation algorithms, the number of the algorithms in the algorithm database 7 is set to be multiple, a single algorithm is abandoned after being used, and the algorithms in the algorithm database 7 are updated by the server 1 at variable time;
the verification output unit 8 is used for simultaneously transmitting the data generated by the dynamic calculation unit 9 and the system time of the PC end host to the data uploading unit 5;
the dynamic calculation unit 9 is used for collecting input signals and generating data information through a real-time algorithm in the algorithm database 7, the dynamic calculation unit 9 outputs information to generate data for a random algorithm in the algorithm database 7, and the data information is set as a character string.
The invention also comprises a method for encrypting the access of the internet terminal, which comprises the following steps:
s1, creating an access task: the input unit 3 is used for logging in the client by the server 1, and the client and the server 1 perform a handshake operation before communicating;
s2, generating real-time characters: according to the handshake operation of step S1, a character string is calculated in real time by the dynamic calculation unit 9 according to the algorithm pre-embedded in the algorithm database 7, with the time point of the computer clock unit 4 as a reference;
s3, character checking, namely uploading the character string and the system time calculated in the step S2 to a check output unit 8 at the same time, and carrying out a check algorithm on the real-time algorithm in the algorithm database 7 by the check output unit 8 through the received data; if a legal algorithm is obtained, the data uploading unit 5 uploads the verification result to the server 1, the server 1 controls the display unit 2 to display a notice of successful handshake, and then the server 1 controls the data transmission unit 6 to start data transmission.
Example 2:
the invention provides an internet terminal access encryption system, which comprises a server 1, wherein a display unit 2, an input unit 3 and a computer clock unit 4 are arranged at the connecting end of the server 1, a data uploading unit 5 and a data transmission unit 6 are also arranged at the connecting end of the server 1, an algorithm database 7 is arranged at the connecting end of the data uploading unit 5, a verification output unit 8 is arranged at the connecting end of the algorithm database 7, and a dynamic calculation unit 9 is arranged at the connecting end of the verification output unit 8;
the server 1 is set as a user PC end host computer and is used for processing and normally operating the downloaded content of the PC;
the display unit 2 is set as a PC display screen and is used for displaying the proceeding of operation steps and directly reading the notification information from the server 1 and browsing the conventional access information;
the input unit 3 is set as a mouse and a keyboard matched with a PC display screen and a PC end host, and is used for inputting information and determining control information;
the computer clock unit 4 is set as a computer clock after the server 1 is networked and is set as real-time, and the time value of the computer clock unit 4 is synchronous with real-time data accessed to the internet without time difference;
the data uploading unit 5 is used for uploading the verification information output by the verification output unit 8 to the server 1;
the data transmission unit 6 is used for data transmission, and allows normal access and connection with the server 1 for the client side which is successfully verified;
the algorithm database 7 is used for storing various data validation algorithms, the number of the algorithms in the algorithm database 7 is set to be multiple, a single algorithm is abandoned after being used, and the algorithms in the algorithm database 7 are updated by the server 1 at variable time;
the verification output unit 8 is used for simultaneously transmitting the data generated by the dynamic calculation unit 9 and the system time of the PC end host to the data uploading unit 5;
the dynamic calculation unit 9 is used for collecting input signals and generating data information through a real-time algorithm in the algorithm database 7, the dynamic calculation unit 9 outputs information to generate data for a random algorithm in the algorithm database 7, and the data information is set as a character string.
The invention also comprises a method for encrypting the access of the internet terminal, which comprises the following steps:
s1, creating an access task: the input unit 3 is used for logging in the client by the server 1, and the client and the server 1 perform a handshake operation before communicating;
s2, generating real-time characters: according to the handshake operation of step S1, a character string is calculated in real time by the dynamic calculation unit 9 according to the algorithm pre-embedded in the algorithm database 7, with the time point of the computer clock unit 4 as a reference;
s3, character checking, namely uploading the character string and the system time calculated in the step S2 to a check output unit 8 at the same time, and carrying out a check algorithm on the real-time algorithm in the algorithm database 7 by the check output unit 8 through the received data; if an illegal algorithm is obtained, the access is terminated.
The working principle of the invention is as follows:
referring to the attached figures 1-2 of the specification, before the client communicates with the server 1, a handshake operation is performed first, a special character string of two parties is used for mutual validation, a handshake success result or a handshake failure result is output, both the handshake validation parties use a dynamic calculation mode, a character string is calculated in real time according to a pre-embedded algorithm in an algorithm database 7 by taking a computer clock of a computer clock unit 4 as a reference, then the character string and system time are uploaded simultaneously by a dynamic calculation unit 9 and a data uploading unit 5, and then the background server 1 notifies that the handshake success is only performed by a legal algorithm through a received data validation algorithm and starts to transmit data.
The points to be finally explained are: first, in the description of the present application, it should be noted that, unless otherwise specified and limited, the terms "mounted," "connected," and "connected" should be understood broadly, and may be a mechanical connection or an electrical connection, or a communication between two elements, and may be a direct connection, and "upper," "lower," "left," and "right" are only used to indicate a relative positional relationship, and when the absolute position of the object to be described is changed, the relative positional relationship may be changed;
secondly, the method comprises the following steps: in the drawings of the disclosed embodiments of the invention, only the structures related to the disclosed embodiments are referred to, other structures can refer to common designs, and the same embodiment and different embodiments of the invention can be combined with each other without conflict;
and finally: the above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit and principle of the present invention are intended to be included in the scope of the present invention.

Claims (5)

1. An internet terminal access encryption system comprising a server (1), characterized in that: the system is characterized in that a display unit (2), an input unit (3) and a computer clock unit (4) are arranged at the connecting end of the server (1), a data uploading unit (5) and a data transmission unit (6) are further arranged at the connecting end of the server (1), an algorithm database (7) is arranged at the connecting end of the data uploading unit (5), a verification output unit (8) is arranged at the connecting end of the algorithm database (7), and a dynamic calculation unit (9) is arranged at the connecting end of the verification output unit (8);
the server (1) is set as a user PC end host and is used for processing and normally operating the downloaded content of the PC;
the display unit (2) is set as a PC display screen and is used for displaying the proceeding of operation steps and directly reading the notification information from the server (1) and browsing the conventional access information;
the input unit (3) is arranged as a mouse and a keyboard matched with a PC display screen and a PC end host and is used for inputting information and determining control information;
the computer clock unit (4) is set as a computer clock after the server (1) is networked and is set as real-time;
the data uploading unit (5) is used for uploading the verification information output by the verification output unit (8) to the server (1);
the data transmission unit (6) is used for transmitting data, and allows normal access and connection with the server (1) for the client side which is successfully verified;
the algorithm database (7) is used for storing various data validation algorithms;
the verification output unit (8) is used for simultaneously transmitting the data generated by the dynamic calculation unit (9) and the system time of the PC end host to the data uploading unit (5);
the dynamic calculation unit (9) is used for collecting input signals and generating data information through a real-time algorithm in the algorithm database (7).
2. An internet terminal access encryption system according to claim 1, characterized in that: the time value of the computer clock unit (4) is synchronous with the real-time data accessed to the internet, and no time difference exists.
3. An internet terminal access encryption system according to claim 1, characterized in that: the number of the algorithms in the algorithm database (7) is set to be multiple, a single algorithm is abandoned after being used, and the algorithms in the algorithm database (7) are updated by the server (1) at variable time.
4. An internet terminal access encryption system according to claim 3, wherein: and the dynamic calculation unit (9) outputs information to generate data for a random algorithm in the algorithm database (7), and the data information is set as a character string.
5. An encryption method for an internet terminal to access an encryption system according to any one of claims 1 to 4, wherein: the specific encryption steps are as follows:
s1, creating an access task: the input unit (3) is used for logging in the client by the server (1), and the client and the server (1) perform a handshake operation before communicating;
s2, generating real-time characters: according to the handshake operation of the step S1, a character string is calculated in real time by the dynamic calculation unit (9) according to the algorithm pre-embedded in the algorithm database (7) with the time point of the computer clock unit (4) as the reference;
s3, character checking, namely uploading the character string and the system time calculated in the step S2 to a check output unit (8), and carrying out validation algorithm on the real-time algorithm in the algorithm database (7) by the check output unit (8) through the received data;
if the obtained algorithm is legal, the data uploading unit (5) uploads the verification result to the server (1), the server (1) controls the display unit (2) to display a notice of successful handshake, and then the server (1) controls the data transmission unit (6) to start data transmission;
if an illegal algorithm is obtained, the access is terminated.
CN202011007005.9A 2020-09-23 2020-09-23 Method and system for encrypting access of internet terminal Pending CN112134885A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011007005.9A CN112134885A (en) 2020-09-23 2020-09-23 Method and system for encrypting access of internet terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011007005.9A CN112134885A (en) 2020-09-23 2020-09-23 Method and system for encrypting access of internet terminal

Publications (1)

Publication Number Publication Date
CN112134885A true CN112134885A (en) 2020-12-25

Family

ID=73842672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011007005.9A Pending CN112134885A (en) 2020-09-23 2020-09-23 Method and system for encrypting access of internet terminal

Country Status (1)

Country Link
CN (1) CN112134885A (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1808975A (en) * 2006-01-26 2006-07-26 黄涛 System and method of preventing network account from stolen
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN101325483A (en) * 2008-07-28 2008-12-17 中国电信股份有限公司 Method and apparatus for updating symmetrical cryptographic key, symmetrical ciphering method and symmetrical deciphering method
US20100257372A1 (en) * 2009-03-26 2010-10-07 Ryan Seifert Integrated file level cryptographical access control
CN104052742A (en) * 2014-06-11 2014-09-17 上海康煦智能科技有限公司 Internet of things communication protocol capable of being encrypted dynamically
CN105450397A (en) * 2015-12-29 2016-03-30 深圳市瑞铭无限科技有限公司 Data encryption method and client based on sending encryption algorithm
CN106789054A (en) * 2016-12-23 2017-05-31 携程旅游网络技术(上海)有限公司 The update method and system of dynamic encryption and decryption algorithm
CN106936573A (en) * 2014-04-21 2017-07-07 岳文伟 Dynamic password formation method based on integrated mode
CN107566112A (en) * 2016-06-30 2018-01-09 中国电信股份有限公司 Dynamic encryption and decryption method and server
CN108306881A (en) * 2018-01-31 2018-07-20 苏州锦佰安信息技术有限公司 A kind of auth method and device
CN108777615A (en) * 2018-09-17 2018-11-09 上海并擎软件科技有限公司 Dynamic password authentication method and device
CN109587180A (en) * 2019-01-28 2019-04-05 杭州涂鸦信息技术有限公司 A kind of method that establishing connection, client and server
CN110351230A (en) * 2018-04-08 2019-10-18 湖南青普科技有限公司 A kind of online controller with identity identifying and authenticating function
CN111327629A (en) * 2020-03-04 2020-06-23 广州柏视医疗科技有限公司 Identity verification method, client and server

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1808975A (en) * 2006-01-26 2006-07-26 黄涛 System and method of preventing network account from stolen
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN101325483A (en) * 2008-07-28 2008-12-17 中国电信股份有限公司 Method and apparatus for updating symmetrical cryptographic key, symmetrical ciphering method and symmetrical deciphering method
US20100257372A1 (en) * 2009-03-26 2010-10-07 Ryan Seifert Integrated file level cryptographical access control
CN106936573A (en) * 2014-04-21 2017-07-07 岳文伟 Dynamic password formation method based on integrated mode
CN104052742A (en) * 2014-06-11 2014-09-17 上海康煦智能科技有限公司 Internet of things communication protocol capable of being encrypted dynamically
CN105450397A (en) * 2015-12-29 2016-03-30 深圳市瑞铭无限科技有限公司 Data encryption method and client based on sending encryption algorithm
CN107566112A (en) * 2016-06-30 2018-01-09 中国电信股份有限公司 Dynamic encryption and decryption method and server
CN106789054A (en) * 2016-12-23 2017-05-31 携程旅游网络技术(上海)有限公司 The update method and system of dynamic encryption and decryption algorithm
CN108306881A (en) * 2018-01-31 2018-07-20 苏州锦佰安信息技术有限公司 A kind of auth method and device
CN110351230A (en) * 2018-04-08 2019-10-18 湖南青普科技有限公司 A kind of online controller with identity identifying and authenticating function
CN108777615A (en) * 2018-09-17 2018-11-09 上海并擎软件科技有限公司 Dynamic password authentication method and device
CN109587180A (en) * 2019-01-28 2019-04-05 杭州涂鸦信息技术有限公司 A kind of method that establishing connection, client and server
CN111327629A (en) * 2020-03-04 2020-06-23 广州柏视医疗科技有限公司 Identity verification method, client and server

Similar Documents

Publication Publication Date Title
AU2009294201B2 (en) Authorization of server operations
JP4315696B2 (en) Host terminal emulation program, relay program, and host terminal emulation method
US20110066841A1 (en) Platform for policy-driven communication and management infrastructure
EP3620943B1 (en) System and method for secure application communication between networked processors
CN110198297B (en) Flow data monitoring method and device, electronic equipment and computer readable medium
CN111651739B (en) Login authentication service system and method, authentication service node and electronic equipment
CN111225002B (en) Network attack tracing method and device, electronic equipment and storage medium
CN111651747B (en) Login bill synchronization system and method and related equipment
CN107040518A (en) A kind of private clound server log method and system
CN114389885B (en) Method for safely opening private cloud database to public cloud
US7962749B2 (en) Method and system for creating a non-repudiable chat log
US20220377064A1 (en) Method and system for managing a web security protocol
CN111726328B (en) Method, system and related device for remotely accessing a first device
CN1980232A (en) Telnet session maitenance method, telnet proxy and computer network system
CN112910903B (en) SSL certificate deployment-free method, device and system
CN112134885A (en) Method and system for encrypting access of internet terminal
CN116962149A (en) Network fault detection method and device, storage medium and electronic equipment
CN113812125A (en) Login behavior verification method, device and system, storage medium and electronic device
CN105407095B (en) Secure communication device and its communication means between heterogeneous networks
CN113051585B (en) Data verification method and device, electronic equipment and storage medium
CN106453238B (en) Login method and system, electronic terminal, public network server and private cloud equipment
CN115695218A (en) Operation and maintenance management method and device based on zero trust mechanism and related equipment
JP6723804B2 (en) System, relay client, control method, and program
CN110943893B (en) Method and device for verifying connectivity between servers
CN115239261A (en) Account login method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Liao Xiaoyun

Inventor after: Tang Haitao

Inventor after: Sun Lili

Inventor after: Yu Jin

Inventor after: Wang Wanyong

Inventor after: Wang Zhihua

Inventor after: Chen Haitao

Inventor after: Ni Gege

Inventor after: Han Yi

Inventor after: Wu Bo

Inventor after: Cai Ming

Inventor after: Yao Jun

Inventor after: Liu Li

Inventor after: Other inventor requests not to publish the name

Inventor after: Zhu Yisong

Inventor after: Weng Beibei

Inventor after: OuYang Lijian

Inventor after: Chen Ya

Inventor after: Shi Aijun

Inventor after: Yang Junzhong

Inventor after: Ju Ling

Inventor before: Liao Xiaoyun

Inventor before: Wang Wanyong

Inventor before: Wang Zhihua

Inventor before: Chen Haitao

Inventor before: Ni Gege

Inventor before: Han Yi

Inventor before: Wu Bo

Inventor before: Xu Jun

Inventor before: Cai Ming

Inventor before: Ju Ling

Inventor before: Liu Li

Inventor before: Zhu Yisong

Inventor before: OuYang Lijian

Inventor before: Chen Ya

Inventor before: Shi Aijun

Inventor before: Yang Junzhong

Inventor before: Tang Haitao

Inventor before: Sun Lili

Inventor before: Yu Jin

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210827

Address after: No.2, Fenghuang West Road, Taizhou City, Jiangsu Province

Applicant after: STATE GRID JIANGSU ELECTRIC POWER Co.,Ltd. TAIZHOU POWER SUPPLY BRANCH

Address before: No.2, Fenghuang West Road, Taizhou City, Jiangsu Province

Applicant before: STATE GRID JIANGSU ELECTRIC POWER Co.,Ltd. TAIZHOU POWER SUPPLY BRANCH

Applicant before: STATE GRID JIANGSU ELECTRIC POWER Co.,Ltd.

Applicant before: NANJING YISHU INFORMATION SCIENCE & TECHNOLOGY CO.,LTD.

RJ01 Rejection of invention patent application after publication

Application publication date: 20201225