Access control method and apparatus

A technology of access control and access strategy, which is applied in communication and network security related fields to achieve the effects of saving usage, improving utilization rate and saving memory

Inactive Publication Date: 2009-04-15
RUIJIE NETWORKS CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The purpose of the present invention is to provide an access control method, which is used to solve the deficiency in the prior art that different types of messages require

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and apparatus
  • Access control method and apparatus
  • Access control method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0047] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments and the drawings. Here, the exemplary embodiments of the present invention and the description thereof are used to explain the present invention, but not as a limitation to the present invention.

[0048] The embodiment of the present invention provides one. The present invention will be described in detail below with reference to the drawings.

[0049] Such as Figure 5 The flow chart of the first embodiment of the access control method of the present invention is shown.

[0050] Including step 501, modifying the rules, templates, and masks on the access control devices in the network, adding specific fields related to access control in the custom fields of the template; in the rules corresponding to the custom fields of the template Add the specific value to be controlled ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication security field. Aiming at the deficiencies of the prior art that the price of a memory which is used for an access strategy table is high and memories are wasted due to different strategy table items which are adopted according to different types of messages, the invention provides an access control method and a device thereof. In the method, a specific field which is relative with the access control is written into a customer field of a template, and a specific value is written into the customer field according to the rule of the access strategy table; the information of different types of messages is extracted according to the template and forms key word of the message. The value of the specific field of the message is written into the customer field of the key word. And the key word is matched with the rule. The action operation defined in advance is executed according to the matching result. The access control method and the device thereof have the beneficial effects that the memory can be effectively saved and the cost of the access control can be lowered.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to the field related to network security, specifically an access control method and device. Background technique [0002] An access policy entry refers to an entry that uses a specified behavior to process a specified type of packet. A policy entry consists of three parts: rule, mask, and action. Such as figure 1 Shown is a schematic diagram of policy entry rules and masks in the prior art. [0003] A rule refers to a pre-defined comparison object or comparison range. Each object to be compared is compared with the defined comparison object to see whether it is equal to or included in the comparison object. A rule is composed of a limited number of specific features, such as a Media Access Control address (MAC: Media Access Control), a Transmission Control Protocol address (IP: Transport Control Protocol), and the like. Each characteristic is called a field, and ea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/08
Inventor 肖文清
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products