Method, device and system for security control
A security control and control command technology, applied in the field of Internet security, can solve problems such as system damage, potential safety hazards, inaccessible external network hosts or internal network host authority restrictions, and achieve the effect of authority limitation and safe remote control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.
[0060] The present invention provides a method for security control, such as figure 1 shown, including:
[0061] Step 1: The peer device receives the control command request sent by the host on the corresponding side;
[0062] In this step, the host on the corresponding side sends a control command request to the peer device, and the control command request can be a single control command, or multiple consecutive control commands in the form of a command line;
[0063] Step 2: The peer device conducts a whitelist check on the control command in the received control command request to verify whether the authority of the corresponding side host supports the control command;
[0064] In this step, the peer device may pre-store the authority information of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com