Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method of configurable mobile terminal

A mobile terminal and access control technology, applied in the field of communication security, can solve the problem of ineffective defense against malicious access, and achieve the effect of eliminating the possibility of illegal access to forged information, ensuring the security of information systems, and accurately identifying and controlling

Inactive Publication Date: 2012-09-05
南京烽火星空通信发展有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this invention cannot effectively prevent malicious access, such as simulating the terminal type and terminal number on a mobile phone simulator or a PC to forge access requests to achieve illegal access to the target URL

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method of configurable mobile terminal
  • Access control method of configurable mobile terminal
  • Access control method of configurable mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] In the configurable mobile terminal access control method of the present embodiment, in a wireless network composed of a mobile terminal and a background access control system, the specific process (access control) of the background access control system registering mobile terminal information and setting inspection rules is as follows:

[0024] A. Register mobile terminal information in the background access control system to form mobile terminal registration information.

[0025] The background access control system provides a management interface to register mobile terminal information. The registration information includes user information and information about the mobile terminal corresponding to the user. For example, the registered user name is Zhang San, and the corresponding mobile terminal information includes the mobile phone number 137XXX45678, the mobile phone operating system is SYMBIAN, the electronic serial number is 12345678, and the international mobile...

Embodiment 2

[0039] The mobile terminal access control process of this embodiment is as follows image 3 As shown, the background access control system can further dynamically set inspection rules for interaction between the terminal and the background access control system. Compared with Embodiment 1, there are the following main changes:

[0040] After the background access control system completes the terminal information registration and sets the inspection rules for the first time, when entering step C, the background access control system will synchronously send the inspection rules to the corresponding mobile terminal for storage, and also send the dynamic setting request information at the same time. It will be synchronized to the mobile terminal together with the set inspection rules.

[0041] In the above step D, when the mobile terminal sends an access request to the background access control system, it also randomly generates new inspection rules according to the dynamically set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a control method for controlling a mobile terminal to access an information system, belonging to the technical field of communication safety and comprising the following steps: forming mobile terminal registration information by registering mobile terminal information in a backstage access control system in a wireless network consisting of a mobile terminal and the backstage access control system; setting registered mobile terminal information requiring to be examined in the backstage access control system and establishing an examination rule; transmitting the examination rule to a corresponding mobile terminal synchronously; adding corresponding mobile terminal information according to the examination rule before making an access request by the mobile terminal; and extracting the mobile terminal information requiring to be examined from the received access request by the backstage access control system, and comparing with the mobile terminal registration information one by one according to the examination rule, thus determining whether the access is allowed or not. By adopting the invention, precise identification control can be performed on the access request, thus reducing illegal and counterfeited access and ensuring information system safety.

Description

technical field [0001] The invention relates to a control method for controlling mobile terminal access to an information system, in particular to an access control method based on mobile terminal information, which belongs to the technical field of communication security. Background technique [0002] With the development of information technology, office information software, ERP software, CRM software, etc. have been widely used. And with the continuous wide application of information systems and as an important support platform in the work, it has become a new application requirement to be able to access internal information systems anytime and anywhere. The continuous development of mobile communication technology makes it possible to extend the information system in the wired network environment to the wireless network. With the mobility and speed of the mobile communication network, the existing information system can be extended to the wireless network environment. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08H04W60/00H04W88/02
Inventor 刘国俭王娜
Owner 南京烽火星空通信发展有限公司