Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

'Gene network identity management' method based on depth identification and registration

An identity management and network technology, applied in the field of information security, can solve problems such as inability to meet accurate identity identification and control, identity identification uncertainty, and poor accuracy, and achieve the effects of improving accuracy, ensuring accuracy, and reducing coincidence probability

Inactive Publication Date: 2012-04-25
潘薇
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, both the network device management interface and the terminal device system provide the function of modifying MAC and IP addresses, which makes it easier to achieve the goal of changing the identity and breaking away from the corresponding management rules through IP and MAC modification, resulting in the passing of data packets. Source MAC identification has great uncertainty and poor accuracy
[0009] Accurate identification of identities is the basis for the management and control of devices and terminals in the network, but the existing methods can no longer meet the requirements for accurate identification and control of identities, which has brought many security and management problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 'Gene network identity management' method based on depth identification and registration
  • 'Gene network identity management' method based on depth identification and registration
  • 'Gene network identity management' method based on depth identification and registration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0022] The present invention adopts the following technical solution: obtain the identity information of the device through a specified program running on the network device or terminal, the identity information includes IP address, physical MAC, etc., and transmit these information to the registration management terminal through an encrypted private protocol, so as to To prevent information from being modified, the system running on the management terminal can be an open system or a dedicated embedded system device. Under higher security requirements, the management terminal must be an embedded special device, so that the storage of identity information is more secure. The characteristics of the genetic identity registration adopted by the present invention are mainly manifested in: 1. Informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for carrying out identity recognition and registration on equipment accessing to a network. In the process method, information is obtained by operating programs in corresponding network equipment and terminals; obtained content refers to an IP (Internet Protocol) address, a physical MAC (Medium / Media Access Control), a logic MAC (Medium / Media Access Control) and other key information of the network equipment and terminals, such as identities of the serial number / type / size of an internal memory, the serial number / type / size of a CPU (Central Processing Unit), the number / type / size of a hard disk and the like; and the identities are network identity genes similar to biological genes and are important information of the identities of network members. A plurality of the key information of the network equipment and terminals can be combined together so that the probability of being coincident in combined identity information is greatly reduced; and meanwhile, the combined identity information is registered and recorded by a third party, therefore, the accurate identity recognition method is realized. Therefore, accurate identity recognition is carried out on the equipment connected in the network.

Description

technical field [0001] The invention belongs to the field of information security, and specifically relates to a device or terminal connected to the network that is identified and registered to perform precise identification, and network security and management based on the precise identification can greatly improve Raise the level of network security management. Background technique [0002] IP is the abbreviation of Internet Protocol (Internet Protocol) in English, which is a protocol designed for computer networks to communicate with each other. In the Internet, it is a set of rules that enable all computer networks connected to the Internet to communicate with each other, and stipulates the rules that computers should abide by when communicating on the Internet. Computer systems produced by any manufacturer can be interconnected with the Internet as long as they comply with the IP protocol. [0003] An IP address is a 32bit address assigned to each host connected to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 潘薇
Owner 潘薇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products