Fine-granularity network access control method based on user connection information

A technology for network access control and connection information, which is applied in the field of computer networks, can solve the problems of high cost, no filtering and processing of user identity, etc., and achieve the effect of improving flexibility, high control precision and flexibility, and meeting control requirements

Inactive Publication Date: 2009-12-30
WUHAN UNIV OF TECH
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that the design of 802.1x does not have mature functions of filtering and processing user identities, and requires specific equipment, which is expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fine-granularity network access control method based on user connection information
  • Fine-granularity network access control method based on user connection information
  • Fine-granularity network access control method based on user connection information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0029] Concrete steps of the present invention are:

[0030] Step 1: Client collects new connection information ( image 3 ):

[0031] Step 1: The client obtains user information, sends the user and password to the authentication server, and obtains relevant user information of the user, such as user ID.

[0032] Step 2: Determine whether the user initiates a new external network access connection, if so, go to step 3, otherwise continue with this step.

[0033] Step 3: The client background obtains information about the new connection and client host information.

[0034] Step 4: The client sends the connection-related information mentioned in the previous step, user information, and client host information to the authentication server, so that the authentication server can perform authority audit on the connection. Go to the second step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a fine-granularity network access control method based on user connection information, with the core thought of realizing the network access control method which audits the connection initiated by the user based on user identity and authority through the architectures of a gateway, an authentication server and a client. The method realizes a proposal that each connection initiated by the client and network application programs which initiate the connection can be audited and controlled at the authentication server terminal by binding each connection initiated by the client and the user identity. The method controls the network access of multiple users in the local area network, has relatively high control accuracy and flexibility and can satisfy the control requirement of multi-level of network access and flexible user logging method.

Description

technical field [0001] The invention belongs to the field of computer networks, in particular to a fine-grained network access control method based on user connection information. Background technique [0002] Network access control, also known as network access control or network access control, aims to prevent emerging hacker technologies such as viruses and worms from harming enterprise security. With the help of network access control, customers can only allow legal and trustworthy endpoint devices (such as PCs, servers, PDAs) to access the network, and not allow other devices to access. [0003] Currently, network access control methods mainly include: MAC address filtering, IP address-based access control list, 802.1X identity authentication, and so on. [0004] MAC address filtering is based on the unique ID of network equipment. Through MAC address filtering, users who use network resources can be fundamentally restricted. The disadvantage of this method is that it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L12/66H04L29/06H04L47/765
Inventor 熊盛武张立民刘毅管坤秦佳
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products