Terminal security management and authentication method and system

A technology of terminal security and management method, applied in the field of terminal security management, which can solve the problems of unfavorable resource security, inability to know the use of equipment, etc.

Inactive Publication Date: 2011-09-21
LIAONING GOETHINK TECH
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing companies have certain loopholes in the security management of public equipment on the LAN. For equipment in the public domain, any personnel in the company can use it, but generally a public account is assigned. This scheme has a disadvantage, that is, it is impossible to know the specific Who is using the device is not conducive to protecting the security of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal security management and authentication method and system
  • Terminal security management and authentication method and system
  • Terminal security management and authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] How the present invention is implemented will be described in detail below in conjunction with the accompanying drawings.

[0014] The terminal security management system of the present invention includes: a plurality of terminals connected to the intranet; a switch or router connected to the local area network for providing access to the terminals; a terminal manager system connected to the local area network are connected to each other, and perform security management on the terminal through the switch or the router.

[0015] The local area network is a wired Ethernet local area network or a wireless local area network that meets the 802.1X standard series. Preferably, different usage permissions are set in the system of the terminal. For ordinary employees, it is a computer with limited permissions. The limited permissions refer to Users who use this computer only have the authority to use power users, that is, they can only use some functions and programs of the sys...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security management and authentication method and system. The system comprises a terminal manager. The terminal manager comprises an identity authentication service chip / module, a strategic management service chip / module and an alarm platform, wherein the identity authentication service chip / module is used for authenticating the identity of a terminal, and returning an authentication response message to the terminal after the terminal passes the identity authentication; the strategic management service chip / module comprises a memory / module used for storing management strategies corresponding to different users and terminals, and a management strategy configuration chip / module used for receiving the command of a system manager so as to manage and maintain the management strategies in a management strategy database module; and the alarm platform is used for sending an alarm to maintenance personnel. The security management method can be implemented by adding user information, a password corresponding to the user information, inherent characteristic information of the terminal and use authority information required by the user into the transmitted authentication message request.

Description

【Technical field】 [0001] The invention relates to the technical field of terminal security management, in particular to a G terminal security management and authentication method and system. 【Background technique】 [0002] With the development of information technology today, people's work and life have become more and more dependent on computers and networks; however, since the day the network was born, it has had a major hidden danger - security issues. People are enjoying the benefits brought by the network. At the same time, it has to bear the hidden pain caused by network security issues. [0003] When it comes to network security, people naturally think of network perimeter security, but the reality is that most of the network security risks come from within. Conventional security defense methods are often limited to the gateway level, network boundary (firewall, IDS, vulnerability scanning) and other aspects of defense, and important security facilities are roughly c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 焦利郑治国韩兴宇刘赛
Owner LIAONING GOETHINK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products