Unlock instant, AI-driven research and patent intelligence for your innovation.

Remote access protection system and method

A technology for remote access and protection systems, applied in the field of security systems, can solve the problems that remote hosts are vulnerable to hackers, and achieve the effect of enhancing security

Inactive Publication Date: 2010-09-29
HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the user establishes a remote access connection between the client and the remote host through these network devices, the remote host is vulnerable to hackers because the network device is not equipped with a security mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote access protection system and method
  • Remote access protection system and method
  • Remote access protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] see figure 1 , is a schematic diagram of the application environment of the remote access protection system 10 in the embodiment of the present invention. In this embodiment, the client 30 is connected to the network device 10 through the network 20 , and the network device 10 is connected to the remote host 40 at the same time. The client 30 can remotely access the remote host 40 by sending a packet. The network device 10 is a router, switch or modem, the network 20 is the Internet or a Wide Area Network, and the client 30 is a personal computer or a diskless workstation.

[0013] see figure 2 , is a block diagram of the remote access protection system 100 in the embodiment of the present invention. The remote access protection system 100 is set at figure 1 The network device 10 is shown.

[0014] The remote access protection system 100 includes an interception module 110 , a network segment judgment module 120 , a user information check module 130 , a session jud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a remote access protection system including an interception module, a segment judgment module, a user information examining module and a remote access packet judgment module, in which, the interception module is used in detecting packets sent by the customer end at the connection port, the segment judgment module is used in verifying if the customer end is at the legal segment, the user information check module is used in checking if the packet sent by the customer end in the legal segment is a remote access one. This invention also provides remote access protection method, which can verify if the segment, user name and ciphered code are legal before initiating the remote access system then to decide if it allows the customer end to access remotely.

Description

【Technical field】 [0001] The present invention relates to a security system and method, in particular to a remote access protection system and method. 【Background technique】 [0002] Telnet (remote login) is a standard protocol and main way for remote access. Telnet can provide users with the function of accessing remote hosts on the local computer. Users can communicate with many information centers, libraries and other resources around the world through Telnet. There are two ways for users to perform remote access through Telnet. The first is that the user has his own registered user name and password on the remote host; the second is that the remote host provides the user with public Telnet resources, which are open to every Telnet user. In the Unix system, to establish a remote access connection between the client and the remote host, you only need to enter the command: Telnet<remote host name> at the system prompt, and the user can see the welcome message or lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 陈智龙
Owner HONG FU JIN PRECISION IND (SHENZHEN) CO LTD