Network-resource-access control method based on identity authentication and data-packet filtering technology

An identity authentication and network resource technology, applied in electrical components, transmission systems, etc., can solve the problems of illegal use of network resources, unfavorable fine-grained access control of network resources, lack of identity confirmation of network resource visitors, etc., and achieve accurate audit analysis. , the effect of preventing illegal access

Inactive Publication Date: 2014-02-26
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND +1
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First, there is still a risk of illegal use of network resources due to the lack of confirmation of the identity of network resource visitors during the access control process;
[0005] Second, it cannot prevent illegal access control of network resources in the internal network;
[0006] Third, it is not conducive to fine-grained access control to network resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-resource-access control method based on identity authentication and data-packet filtering technology
  • Network-resource-access control method based on identity authentication and data-packet filtering technology
  • Network-resource-access control method based on identity authentication and data-packet filtering technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0023] The device connection diagram of the embodiment is as figure 1 shown. The client and server participating in the communication in the present invention are based on the windows operating system and support the program development of version 2.0 of Windows Sockets. Among them, the user sends a network resource access request through the client, the server receives the client's network resource access request and provides specified resources, and the identity authentication server is used to complete the user's identity authentication.

[0024] The flowchart of the method of the present invention is as figure 2 shown, including the following steps:

[0025] Step 1: The user requests to access the specified resource on the server through the client.

[0026] Step 2: The client intercepts the user request and requires the user to perform identit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network-resource-access control method based on identity authentication and a data-packet filtering technology. A network access request is filtered at a network-resource-access requesting client and a server side and a network request initiated by a user is intercepted at the client and the user is required to complete identity authentication; after the authentication succeeds, the client forwards user identify information and the access request to the server side; and the server side intercepts the network request and verifies whether the request passes the identify authentication and if so, the user is allowed to access specified network resources. Through SPI programming interfaces provided by Windows Sockets, one layer is inserted into Socket to filter network data packets so that an objective of filtering network connection requests is realized; a third-party identity authentication system is used in combination to realize functions such as identity authentication and the like through interfaces provided by the third-party identity authentication system. The network-resource-access control method based on the identity authentication and the data-packet filtering technology combines the network-resource-access request with user identity authentication so that fine-grit network-resource access can be realized.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a network resource access control method based on identity authentication and data packet filtering technology. Background technique [0002] With the development of information technology, information has become an important asset of organizations. The protection of information assets is getting more and more attention, especially with the rapid development of network technology today, most organizations will complete operations such as data interaction through the network, and information becomes network resources. The risk of illegal access and use, how to implement network resource access control has become an urgent need. [0003] At present, the main network access control method is based on the policy configuration of routers, switches, firewalls and other devices, which can achieve the purpose and function of access control to a certain extent. However, these acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王润高韩丽李红王晓程王斌王红艳
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products