Security control method and equipment
A security control and security technology, applied in the field of communication, can solve the problems of inability to obtain data, implementation difficulties, and inability to carry out confidentiality, and achieve the effects of ensuring security, improving utilization, and access layer security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] The present invention proposes a security control method, which is applied to a monitoring system including an access device (such as an access switch, a router, etc.), an encoding device (such as an EC) and a VM server, and the connection between the access device and the encoding device For direct connection, such as image 3 As shown, the method includes the following steps:
[0051] In step 301, the encoding device sends a registration request message to the access device, and the destination address of the registration request message is the VM server, and is used for registering on the VM server.
[0052] Step 302, the access device receives the registration request message from the encoding device, and sends the registration request message to the VM server.
[0053] In the present invention, before the coding device is not successfully registered, the access device needs to listen to the registration request message on the port directly connected to the coding ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 