Method for quickly authorizing access at weak client

A technology of authorized access and client, which is applied in the direction of instruments, electronic digital data processing, digital data protection, etc., can solve the problems of poor client user experience and increased cost, and achieve the goal of improving experience, reducing load, and reducing authorization time Effect

Pending Publication Date: 2022-02-01
浙江连湖科技有限责任公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This new method improves upon existing methods used on clouds without any problems such as those associated with authentication tokens (a type of identifier) like passwords). It reduces the workload required when moving resources between clients and servers while still ensuring secure communication over long distances through localized authorizations at both ends. Additionally, this approach allows users access from remote locations where they are located far away but have no direct connection to their own device instead relying solely on an internet protocol addressing session. Overall, these improvements improve efficiency and reliability across different types of networks.

Problems solved by technology

This patented technical solution described involves managing requesting connections over networks with servers running different types of processes like web browsing (Web) authorizations). These systems require users accessing their URLs manually when they want them up online instead of being able to directly connect back into another computerized session without permission. Additionally, these solutions have issues where multiple devices are connected simultaneously due to delays caused by increased traffic volume at both ends.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for quickly authorizing access at weak client
  • Method for quickly authorizing access at weak client
  • Method for quickly authorizing access at weak client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention is further described below in conjunction with specific examples. It should be understood that these examples are only used to illustrate the present invention and are not intended to limit the scope of the present invention. In addition, it should be understood that after reading the teachings of the present invention, those skilled in the art can make various changes or modifications to the present invention, and these equivalent forms also fall within the scope defined by the appended claims of the present application.

[0024] Such as figure 2 As shown, the method proposed by the present invention adds localized processing on the client side, and reduces the pressure on the server side by increasing the local encryption rule base. After adding the local encryption rule base, according to different security levels:

[0025] In the case of low security level (loose mode), the access request can be processed locally on the client, and the part tha

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for quickly authorizing access at a weak client, which is characterized by comprising the following steps of: setting a local encryption rule base distributed to each client; under the condition that the security level is relatively low, the client side firstly uses a local encryption rule base to perform authorization verification on the access request, only the forbidden access request is sent to the server side, and the server side uses a far-end rule base to perform authorization verification on the access request uploaded by the client side; under the condition that the security level is relatively high, the client side firstly uses the local encryption rule base to carry out primary authorization verification on the access request, only the allowed access request is sent to the server side, and the server side uses the far-end rule base to carry out secondary authorization verification on the access request uploaded by the client side. According to the invention, after the computing resources are moved to the client, the load of the cloud or the server can be greatly reduced, so that the operation cost of the cloud can be reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 浙江连湖科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products