Host access control system and method
An access control and host technology, applied in the field of network security, can solve the problem of being unable to effectively prevent illegal hosts from accessing the intranet, and achieve strong controllability and scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
In order to effectively block the illegal (unauthorized) access of the host to the secure intranet, the present invention provides a host access control system and method, which are described in detail below.
The system topology in the embodiment of the present invention, as shown in FIG. 3, can adopt a C / S architecture, which includes several proxy hosts including proxy clients, and the control center further manages each proxy host. The control center is responsible for the monitoring and management of the proxy host and the management of the host strategy. The proxy host communicates with the control center through the proxy client (which can be realized by the proxy host software, which will not be repeated below), and receives the dynamic encryption key from the control center. Host whitelist strategy, firewall strategy.
More specifically, the sender proxy client is used to determine whether the target host is in the firewall whitelist policy. If it is, the data packet is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap