Method and device for checking patch
A technology to be patched and checked, applied in the communication field, can solve problems such as accidents, reduce the quality of business network services, affect user authentication, etc., and achieve the effect of solving security problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] Aiming at the defects existing in the prior art, an improved scheme is proposed, such as image 3 As shown, the improvement plan includes:
[0068] In step 301, the client performs identity authentication, and performs security authentication after the identity authentication is passed. Among them, when performing security authentication, patch inspection may not be performed, and security authentication is performed on other security policies (such as policies such as virus databases). When other security policies pass the authentication, the client goes online successfully and can access the network. The client is allowed to access the network before the client performs a patch check. During the authentication process, the client needs to perform relevant authentication operations through the access device. At this time, the IP address of the access device will be uploaded to the security policy server through the radius message, and recorded in the database online t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 