Supercharge Your Innovation With Domain-Expert AI Agents!

A method for accessing network equipment

A network device and a technology for verifying information, which is applied in the field of network security, can solve problems such as virtualized terminals and production IP equipment counterfeiting, and achieve the effects of convenient unified classified management, simple deployment, and improved security standards

Active Publication Date: 2018-05-11
HANGZHOU INFOGO TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the above problems and solve the problem that virtualized terminals and production IP devices are counterfeited, the present invention provides a network device access method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for accessing network equipment
  • A method for accessing network equipment
  • A method for accessing network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0025] Enterprise networks have widely adopted desktop virtualized terminals and mobile terminals, and these terminal devices have the need to access the business network. Now most access systems can only approve these devices to directly enter the network through IP addresses, which will lead to attackers. It is easy to fake a normal terminal and enter the service network. Even if the IP-MAC-PORT binding technology is used, the attac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network device access method of the present invention includes: establishing a verification information database; receiving a data packet sent by the network device; verifying the Mac information of the network device in the data packet according to the verification information database; verifying DHCP information and HTTP information according to the Mac information , SSDP information; set up a data packet capture thread, verify SNMP query information, NMAP scan information and NETBIOS scan information; the present invention is simple to deploy, adopts the mode of active detection and passive collection, and can effectively overcome the IP / MAC forgery problem by relying on verification information, and improve Network access security standards ensure the security of enterprise network information, and at the same time, can identify the types and models of various non-IP devices, which is convenient for users to manage in a unified manner and accurately locate and track.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network device access method based on a wide area network or a local area network. Background technique [0002] With the development of virtualization, most enterprises and institutions have begun to deploy virtualized desktops, and various IP devices emerge in an endless stream in today's network, such as: webcams, network sensors, Internet phones, etc. These non-traditional PC devices are from The external observation of the network layer is difficult to identify, and at the same time these devices are part of the network. Traditional methods cannot accurately locate and access in management, and are easily replaced by IP / MAC forgery. Tracking and classifying them is very difficult. The difficulty is that more and more security professionals are failing in audits due to the existence of these devices, because these devices can allow malicious users to defraud resour...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 罗治华邵晓慧刘民
Owner HANGZHOU INFOGO TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More