Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Terminal security access control method

A technology for access control and terminal security, applied in transmission systems, electrical components, etc., can solve problems such as lack of access control and failure to eliminate potential safety hazards in time

Inactive Publication Date: 2015-02-18
STATE GRID CORP OF CHINA +1
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current operation and maintenance process, for terminal devices that have hidden safety hazards or have already occurred, the operation and maintenance personnel lack the necessary automatic technical means to physically isolate the terminal from the network, and can only manually disconnect the network cable or log in to switch off the response The network isolation of switch ports is not only unable to eliminate potential safety hazards in time, but also puts forward high requirements on the timeliness of operation and maintenance personnel to deal with hidden dangers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal security access control method
  • Terminal security access control method
  • Terminal security access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0083] Embodiment: Switch operation method based on command template

[0084] In order to support the ARP table control of various models of switches from different manufacturers, this method analyzes the operation modes of various models of switches from Cisco, Huawei, H3C and Nortel, and provides a switch ARP table operation based on command templates method. The method establishes a general exchange ARP table operation command sequence template, adapts parameters to different types of exchanges, obtains specific exchange execution commands, and completes the operation on the ARP form through a telnet or SSH channel.

[0085] 1. Template definition

[0086] The ARP table operation command sequence that this method adopts is as follows:

[0087] command serial number

Excuting an order

illustrate

connect

Use telnet or ssh to connect to the switch

password input

Enter switch password

privileged mode

Enter ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a terminal security access control method. A system which comprises a database module, an ARP table scanning module, a terminal isolation module, a VRV system communication module and a dangerous equipment recognition module is firstly built. The method comprises the steps that firstly, an known equipment table and a switch table are manually built, and stored in the database module; secondly, an ARP state table is obtained, wherein the ARP state table is composed of ARP information composed of MAC address-IP address pairs; thirdly, a question equipment table is obtained by the VRV system communication module from an external VRV system and stored in the database module; fourthly, a dangerous equipment table is obtained; fifthly, an isolation equipment table is read by the terminal isolation module, and dangerous equipment in the dangerous equipment table is isolated. The network application function of a terminal can be limited through a client program deployed on the terminal, or the network access behavior of the terminal is controlled by deploying a firewall, and terminal equipment can be automatically isolated from a network in time.

Description

technical field [0001] The invention belongs to a method for controlling the security of terminal equipment in a power information network. Background technique [0002] Terminal equipment is an important part of the power information network, and terminal security is the key work in power information operation and maintenance. In order to strengthen the security management of power terminals, the State Grid Corporation of China has deployed and implemented a VRV terminal control program similar to Beixinyuan to realize real-time collection and early warning of terminal security status. However, in the current operation and maintenance process, for terminal devices that have hidden safety hazards or have already occurred, the operation and maintenance personnel lack the necessary automatic technical means to physically isolate the terminal from the network, and can only manually disconnect the network cable or log in to switch off the response The network isolation of switc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 张宿新周冬青张炜程振凯阮兆文
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products