Supercharge Your Innovation With Domain-Expert AI Agents!

Network device access method

A technology for network equipment and terminal equipment, applied in the field of network security, can solve the problems of virtualized terminal and production IP equipment counterfeiting, and achieve the effect of convenient unified classification management, convenient and accurate positioning and tracking, and overcoming the problem of counterfeiting.

Active Publication Date: 2015-02-04
HANGZHOU INFOGO TECH
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the above problems and solve the problem that virtualized terminals and production IP devices are counterfeited, the present invention provides a network device access method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network device access method
  • Network device access method
  • Network device access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0025] Enterprise networks have widely used desktop virtualization terminals and mobile terminals, and these terminal devices have the need to access business networks. Now most access systems can only approve these devices to directly enter the network through IP addresses, which will lead to attackers It is easy to counterfeit a normal terminal to enter the business network. Even if the IP-MAC-PORT binding technology is adopted, the attacker can escape the detect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network device access method which comprises establishing a verification information database; receiving data package sent by a network device; verifying Mac information of the network device in the data package according to the verification information database; verifying DHCP information, HTTP information and SSDP information according to the Mac information; establishing data package capture threads; and verifying SNMP inquiry information, NMAP scanning information and NETBIOS scanning information. The network device access method is simple in deployment, and can effectively solve the IP / MAC counterfeiting problem based on verification information by utilizing the active detection and passive collection method, so that network access security standard is improved, network information security of an enterprise is ensured, and meanwhile, types and models of various non-IP equipment can be identified, and thus users can carry out unified sort management and accurate positioning and tracking conveniently.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network device access method based on a wide area network or a local area network. Background technique [0002] With the development of virtualization, most enterprises and institutions have begun to deploy virtualized desktops, and various IP devices emerge in an endless stream in today's networks, such as: network cameras, network sensors, Internet phones, etc. These non-traditional PC devices are from External observation at the network layer is difficult to identify, and at the same time, these devices are part of the network. Traditional methods cannot accurately locate and access in management, and are easily replaced by IP / MAC forgery. It is very difficult to track and classify them. Due to the existence of these devices, more and more security professionals fail in audits, because these devices can allow malicious users to defraud resources, bypass controls, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 罗治华邵晓慧刘民
Owner HANGZHOU INFOGO TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More