Methods of judging and blocking outlets

A network, judgment and processing technology, applied in electrical components, transmission systems, etc., can solve problems such as data outflow, computer poisoning, computer system failure, etc., and achieve the effect of rigorous and effective methods, ensuring confidentiality, and improving security.

Active Publication Date: 2018-05-15
台众计算机股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, exchanging information via the Internet also carries many risks
For example, the personal financial authentication data in e-commerce on the network is stolen, or the computer system is hacked, which further leads to data leakage, computer poisoning, damage to important files, and even computer system failure, which affects the personal or corporate security. rights and interests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods of judging and blocking outlets
  • Methods of judging and blocking outlets
  • Methods of judging and blocking outlets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The specific embodiments adopted by the present invention will be further described by the following embodiments and attached drawings.

[0032] The invention provides a method for judging and blocking a network point, which is to judge whether the corresponding network point is a legitimate network point in a network segment according to an ARP (Address Resolution Protocol) packet, and decide whether to block the network point according to whether it is legal or not. Please refer to the following Figure 1 to Figure 3 The method of judging and blocking network points in the first embodiment of the present invention is described as follows.

[0033] Such as figure 1 As shown, it is a flow chart showing the method for judging and blocking network points according to the first embodiment of the present invention. The method for judging and blocking an outlet according to the first embodiment of the present invention mainly includes a packet receiving step and a packet j...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for judging and blocking a network point, comprising a packet receiving step and a packet judging processing step, the packet collecting step accepts the ARP packet of the network point in the network segment, and the packet judging processing step is based on a permission list and the network point's The IP address and media access control address in the ARP packet are used to judge whether the network is legal, so as to block the packet or allow the connection, thereby protecting the network system and improving the security of network use.

Description

technical field [0001] The invention relates to a method for judging and blocking a network point, in particular to a method for judging and blocking the legality of a network point according to an allow list. Background technique [0002] The widespread use of the Internet today has enhanced the ease of information exchange. However, exchanging information via the Internet also carries many risks. For example, the personal financial authentication data in e-commerce on the network is stolen, or the computer system is hacked, which further leads to data leakage, computer poisoning, damage to important files, and even computer system failure, which affects the personal or corporate security. rights and interests. [0003] Receiving network packets has its own risks, especially packets from a dangerous network point, such as packets sent by external computers through the network, which can endanger other people's computers in various ways, including wiretapping, tampering, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 李坤荣
Owner 台众计算机股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products