Check patentability & draft patents in minutes with Patsnap Eureka AI!

Network safety access control method based on ICAP

A network security and access control technology, applied in the field of network access control, can solve the problems of low accuracy and poor real-time flow control, and achieve the effect of strong real-time performance, low maintenance cost and performance improvement.

Inactive Publication Date: 2014-02-12
WUXI WEDGE NETWORK TECH
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The deployment mode deployed behind the optical splitter in the mode of splitting has poor real-time traffic control. Usually, the device will display the report after the user visits the destination website, and the user's HTTP session cannot be operated before the user visits the destination website. , for example: warn the user that this HTTP session is risky, allow and record the HTTP session, or block this session
The deployment mode of deploying security scanning devices to the core backbone network in series has low accuracy, and there are many cases of missed and misjudgment, and the deployment mode of series connection has extremely high requirements for the performance and stability of the equipment and other shortcomings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety access control method based on ICAP
  • Network safety access control method based on ICAP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] The network security access control method based on the ICAP protocol of the present invention includes URL filtering control and HTTP flow control, such as figure 1 The URL filtering control shown is the security control when the user client sends an HTTP request to the HTTP server, including the following steps:

[0034] Step 101: the user client sends an HTTP request to the ICAP client;

[0035] Step 102: The ICAP client HTTP request is encapsulated as an ICAP Preview-based ICAP request and sent to the ICAP server;

[0036] Step 103: the ICAP server sends corresponding action instructions to the ICAP client according to the URL address in the ICAP request to the decapsulated ICAP request, the action instructions include blocking action instructions, warning action instructions, and detection and recording action instructions;

[0037] Step 104: The ICAP client sends return information to the user client according to the received action instruction, and sends the HTT...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network safety access control method based on an ICAP. The method comprises URL filter control and HTTP flow control. The URL filter control is safety control required when a user client terminal sends an HTTP request to an HTTP server, the HTTP flow control is safety control required when the HTTP server sends an HTTP answer message to the user client terminal, and when an ICAP server scans malicious flow, the ICAP server bocks network access through an ICAP client terminal. Compared with the prior art, the method has the advantages of being high in real-time performance, low in cost, strong in expandability, multiple in strategy variety and the like.

Description

technical field [0001] The invention relates to a method for controlling network access, in particular to a method for controlling network security access based on the ICAP protocol. Background technique [0002] With the continuous expansion of the network scale of operators and the increase of users, a large number of various websites have emerged, among which there are many malicious websites, such as: phishing websites, pornographic websites, gambling websites, etc. How to enable users (such as parents to control children's network access) or enterprises to customize the WEB URLs that employees can access according to their own needs is the future development direction. At the same time, unsafe content such as hacker attacks, viruses, and Trojan horses are flooding the Internet and intensifying, which has brought challenges to the throughput and security of large-scale networks such as operators and IDC network equipment. [0003] Due to the above requirements, combined...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 彭朝晖
Owner WUXI WEDGE NETWORK TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More