Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and system in network communication system

An access control and network communication technology, which is applied in the field of computer systems, can solve problems such as unreasonable password verification and achieve the effect of reducing operating pressure

Inactive Publication Date: 2010-12-15
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The invention provides an access control method and system in a network communication system, which solves the problem of unreasonable password verification in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system in network communication system
  • Access control method and system in network communication system
  • Access control method and system in network communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0041] figure 1 It is a schematic structural diagram of an access control system in a network communication system provided by the present invention. figure 1 The system shown includes a client 11 and a server 12, wherein:

[0042] The client 11 is configured to initiate an access request to the server 12 using its preset identity information when it is detected that the user needs to access the server 12;

[0043] The server 12 is used to search whether there is the identity information of the client 11 from the pre-recorded identity information, and perform access control on the user using the client 11 according to the search result.

[0044] figure 2 for figure 1 A schematic structural diagram of the client 11 in the system embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method and an access control system in a network communication system, which solve the problem of unreasonable password authentication in the prior art. The method comprises the following steps that: when detecting that a user needs to access a server, a client initiates an access request to the server by using the preset identity information thereof; and the server searches whether the identity information of the client exists in the prerecorded identity information or not and performs access control on the user using the client according to a search result. The technical scheme provided by the invention can be applied to the access control of storage resources.

Description

technical field [0001] The invention relates to the field of computer systems, in particular to an access control method and system in a network communication system. Background technique [0002] iSCSI (internet Small Computer System Interface, network small computer interface) has become a popular SAN solution in large enterprises and small and medium enterprises. Large enterprises typically deploy these technologies in Tier 2 and 3 data centers, as well as large remote divisions. In SMB environments, iSCSISANs (Storage Area Networks) are commonly used in primary and secondary data centers as well as in large remote branch offices. [0003] Another major application environment for iSCSI is the application service provider environment. NFS (Network File System, Network File System)-based NAS (Network Attached Storage: Network Attached Storage) running on a high-performance Ethernet structure usually occupies the mainstream in this field, because most of the traffic is ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/56H04L47/76
Inventor 吴庆民张会健
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND