Method, system and equipment for controlling user upper wire
A device and user technology, applied in the field of network security, can solve the problems of low security, inability to access external networks, and illegal users cannot pass authentication, and achieve the effect of improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0099] The specific system architecture in this embodiment is as follows Figure 7A As shown, it includes a gateway device connected to the network, a switch device connected to the gateway device, a client terminal connected to the switch device, and an authentication management device located anywhere on the network. The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. The specific process for the client to access the network is as follows:
[0100] Step 701: After the user configures the IP address on the client and inputs the authentication password information, the client sends an authentication request including the IP address, the MAC address of the client and the authentication password information to the switch device;
[0101] Step 702: The switch device receives the authentication request, and sends the authentication request to the authenticatio...
Embodiment 2
[0105] The specific system architecture in this embodiment is as follows Figure 7B As shown, it includes a gateway device connected to the network, a switch device connected to the gateway device, a client terminal connected to the switch device, other HUB or non-network managed switches connected to the switch device, and authentication management devices located anywhere on the network. The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. Clients are also connected to other HUBs or non-network-managed switches. This method may cause IP conflicts caused by illegal users' misappropriation of IP addresses. In order to avoid such IP conflicts, the client has the function of filtering ARP packets. The specific process for the client to access the network is as follows:
[0106] Step 711: After the illegal user configures the stolen IP address A on the client ...
Embodiment 3
[0113] The specific system architecture in this embodiment is as follows Figure 7C As shown, including the gateway device that accesses the network, the switch device that accesses the gateway device, the client that accesses the switch device, the other HUB that accesses the gateway device or the switch of the present invention, and the authentication management device located anywhere on the network . The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. Clients are also connected to other HUBs or switches that are not in accordance with the present invention. This method may cause IP conflicts caused by illegal users’ IP addresses to surf the Internet and cause adverse effects on legitimate users (such as intermittent messages). In order to avoid this Adversely, the authentication management device has the function of setting the static ARP information of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com