Access control method of configurable mobile terminal
A mobile terminal and access control technology, applied in the field of communication security, can solve the problem of ineffective defense against malicious access, and achieve the effect of eliminating the possibility of illegal access to forged information, ensuring the security of information systems, and accurately identifying and controlling
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] In the configurable mobile terminal access control method of the present embodiment, in a wireless network composed of a mobile terminal and a background access control system, the specific process (access control) of the background access control system registering mobile terminal information and setting inspection rules is as follows:
[0024] A. Register mobile terminal information in the background access control system to form mobile terminal registration information.
[0025] The background access control system provides a management interface to register mobile terminal information. The registration information includes user information and information about the mobile terminal corresponding to the user. For example, the registered user name is Zhang San, and the corresponding mobile terminal information includes the mobile phone number 137XXX45678, the mobile phone operating system is SYMBIAN, the electronic serial number is 12345678, and the international mobile...
Embodiment 2
[0039] The mobile terminal access control process of this embodiment is as follows image 3 As shown, the background access control system can further dynamically set inspection rules for interaction between the terminal and the background access control system. Compared with Embodiment 1, there are the following main changes:
[0040] After the background access control system completes the terminal information registration and sets the inspection rules for the first time, when entering step C, the background access control system will synchronously send the inspection rules to the corresponding mobile terminal for storage, and also send the dynamic setting request information at the same time. It will be synchronized to the mobile terminal together with the set inspection rules.
[0041] In the above step D, when the mobile terminal sends an access request to the background access control system, it also randomly generates new inspection rules according to the dynamically set ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 