Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and apparatus

A technology of access control and access strategy, which is applied in communication and network security related fields to achieve the effects of saving usage, improving utilization rate and saving memory

Inactive Publication Date: 2009-04-15
RUIJIE NETWORKS CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The purpose of the present invention is to provide an access control method, which is used to solve the deficiency in the prior art that different types of messages require different access policy entries, and realizes a method for implementing multiple protocols with the help of self-defined fields. Types of methods using the same access policy entry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and apparatus
  • Access control method and apparatus
  • Access control method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0048] An embodiment of the present invention provides one. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0049] Such as Figure 5 Shown is the flow chart of the first embodiment of the access control method of the present invention.

[0050] Including step 501, modifying the rules, templates and masks on the access control device in the network, adding specific fields related to access control in the custom fields of the template; when the rules correspond to the custom fields of the template field to add the specific value you want...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the communication security field. Aiming at the deficiencies of the prior art that the price of a memory which is used for an access strategy table is high and memories are wasted due to different strategy table items which are adopted according to different types of messages, the invention provides an access control method and a device thereof. In the method, a specific field which is relative with the access control is written into a customer field of a template, and a specific value is written into the customer field according to the rule of the access strategy table; the information of different types of messages is extracted according to the template and forms key word of the message. The value of the specific field of the message is written into the customer field of the key word. And the key word is matched with the rule. The action operation defined in advance is executed according to the matching result. The access control method and the device thereof have the beneficial effects that the memory can be effectively saved and the cost of the access control can be lowered.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to the field related to network security, specifically an access control method and device. Background technique [0002] An access policy entry refers to an entry that uses a specified behavior to process a specified type of packet. A policy entry consists of three parts: rule, mask, and action. Such as figure 1 Shown is a schematic diagram of policy entry rules and masks in the prior art. [0003] A rule refers to a pre-defined comparison object or comparison range. Each object to be compared is compared with the defined comparison object to see whether it is equal to or included in the comparison object. A rule is composed of a limited number of specific features, such as a Media Access Control address (MAC: Media Access Control), a Transmission Control Protocol address (IP: Transport Control Protocol), and the like. Each characteristic is called a field, and ea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/08
Inventor 肖文清
Owner RUIJIE NETWORKS CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More