Supercharge Your Innovation With Domain-Expert AI Agents!

A registration method and agent server

A proxy server and endpoint technology, applied in the field of registration methods and proxy servers, can solve problems such as hindering access to network resources, heavy server load, and inability to take into account network security and high-quality service requirements, and achieve the effect of ensuring network security

Active Publication Date: 2008-06-04
HUAWEI TECH CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the active registration method is adopted, the server may be overloaded, and in the face of frequent registration by malicious clients, it will lead to a serious decline in the quality of network service; if the passive registration method is adopted, the endpoints without proxy clients will be unable to complete the registration, preventing it from accessing network resources
It can be seen that no matter active or passive registration methods, neither network security nor high-quality service requirements can be taken into account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A registration method and agent server
  • A registration method and agent server
  • A registration method and agent server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] image 3 It is a specific flow chart of the registration method in Embodiment 1 of the present invention. In this embodiment, the NEA evaluation system is taken as an example to describe the specific implementation manner. Such as image 3 As shown, the method includes:

[0036] Step 301, pre-configure the registration policy in the proxy server.

[0037] In this step, the proxy server configures the registration policy mainly from the perspective of security and network processing capability, and balances the relationship between system security and network user service quality. The main method adopted is: obtain the network environment information, and set the corresponding registration method for the endpoint according to the network environment information. The network environment information may include one or any combination of the following: the security status of the area where the endpoint is located, the security requirements of the network area that the e...

Embodiment 2

[0064] Figure 4 It is a specific structural diagram of the proxy server in Embodiment 2 of the present invention, and the proxy server can be used to implement the above registration method. In this embodiment, the specific implementation manner of the proxy server is described by taking the NEA evaluation system as an example. Such as Figure 4 As shown, the proxy server 400 includes: a registration policy configuration module 410 , a main control module 420 , a registration module 430 , and an acquisition module 440 .

[0065] In the proxy server 400, a registration policy configuration module 410 is configured to configure a registration policy. The obtaining module 440 is used to obtain network environment information, wherein the network environment information includes one or any combination of the following: the security status of the area where the endpoint is located, the security requirements of the network area to be accessed by the endpoint, the system load of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a logon method which includes the following steps: according to pre-configured logon strategy, an agent server determines logon modes of an endpoint which tries to visit network resources (the logon modes comprise an active logon mode and a passive logon mode); according to the determined logon mode, logon for the endpoint is carried out; With the method, the agent server can, according to the logon strategy, adopt different logon modes flexibly for different endpoints controlled by the agent server. As to the endpoint with great danger, only passive logon is permitted to guarantee network security; as to the endpoint with high security requirements, the active logon is permitted to provide high-quality service to the endpoint. The embodiment of the invention also discloses an agent server which comprises a logon strategy configuring module, a main control module and a logon module.

Description

technical field [0001] The invention relates to the registration technology of the endpoint in the network, in particular to a registration method and a proxy server. Background technique [0002] With the rapid development of the Internet in the world, security threats at the application layer, such as viruses and hacker attacks, emerge in an endless stream. This is mainly due to the open architecture of IP technology and the lack of its own security protection. The purpose of Network Endpoint Assessment (NEA) is to protect the network from threats that originate from unsecured endpoints. These unsafe endpoints include endpoints that have been infected by viruses or have certain security vulnerabilities. In the NEA system, the network administrator collects the system status information of the endpoint through the agent software installed on the endpoint trying to access the network, and conducts an evaluation to examine its compliance with the network security policy. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/28
Inventor 尹瀚位继伟姬长锋贾科
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More