Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and method for controlling access of host computer

A technology for controlling hosts and hosts, applied in the field of network security, can solve problems such as inability to effectively control host access, and achieve the effect of controlling host access and facilitating access management

Inactive Publication Date: 2011-06-08
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a method, system and device for controlling host access to solve the problem that the prior art cannot effectively control host access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and method for controlling access of host computer
  • Method, system and method for controlling access of host computer
  • Method, system and method for controlling access of host computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The deployment location of the firewall determines that it is the first security barrier for network security, so its own software security requirements are extremely high, and the operating system used is also proprietary or security-reinforced. The USB (Universal Serial BUS) interface is a standard peripheral interface on modern host systems, which is versatile and extensive. The main idea of ​​the invention is to use the firewall to communicate with the host USB system to realize the user's identity authentication mechanism, thereby effectively controlling the host access, so that the unauthorized intranet host cannot access the Internet.

[0019] See figure 2 As shown, an embodiment of the present invention provides a method for controlling host access, which includes the following main steps:

[0020] S1. The firewall receives the connection request initiated by the internal network host.

[0021] After the firewall receives the connection request, it obtains the IP add...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, system and device for controlling access of a host computer, which relate to the field of network security and are used for solving the problem that the access of the host computer cannot be effectively controlled in the prior art. The method comprises the following steps of: receiving a connection request from the host computer and requesting for verification information from an external authentication system of the host computer by a firewall; authenticating the obtained verification information through an access strategy by the firewall; if the authentication passes, allowing access of destination connection; and if the authentication fails, blocking the connection request. The system comprises the host computer, the external authentication system and the firewall, wherein the external authentication system is connected with the host computer; and the firewall is arranged between the host computer and the Internet and comprises a verification managing module, a connection tracking module and a blocking module. In a technology disclosed by the invention, the verification information is acquired according to the external authentication system of the host computer independent of an access request, an Internet protocol (IP) address, a media access control (MAC) address and the like, so that access of the host computer can be effectively controlled.

Description

Technical field [0001] The present invention relates to the field of network security, in particular to a method, system and device for controlling host access. Background technique [0002] The firewall can not only control the Internet's access to the corporate intranet, but also the intranet host's access to the Internet. The outlet bandwidth of the enterprise intranet connected to the Internet is generally controlled by bandwidth, which is a limited resource. In order to manage and reasonably use the limited export bandwidth, a certain access policy needs to be set on the firewall to control the access of the internal network host to the Internet. [0003] See figure 1 As shown, the typical deployment location of the firewall is between the Internet and the internal network. In traditional firewalls, there can be many access control strategies, such as the IP address and MAC address of the network card of the internal network user, and some also implement the authentication m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 柯宗贵柯宗庆
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products