Control method for network access admittance

A control method and network access technology, applied in wide area network, data exchange through path configuration, digital transmission system, etc., can solve problems such as illegal copying of internal resources and security risks in the company

Inactive Publication Date: 2015-03-25
WUXI CINSEC INFORMATION TECH
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the LANs of many companies have the following security risks: When outsiders bring laptops into the company and access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for network access admittance
  • Control method for network access admittance
  • Control method for network access admittance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] A network access control method provided by the embodiment of the present invention realizes a method for secure network access, preventing external computers from accessing a local area network, directly using the public network without permission, or copying company resources without permission; It can also prevent the company's computers from directly accessing untrusted computers and prevent the company's computers from being poisoned.

[0021] A network access admission control method provided by an embodiment of the present invention will be described in detail below with reference to the accompanying drawings.

[0022] Such as figure 1 , 2 , 3, 4, and 5, a method for controlling network access admission provided by an embodiment of the present invention is characterized in that it includes the following steps:

[0023] S1: Log in to the WEB management system of the security gateway, register detailed information for each computer in the company, and assign a US...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a control method for network access admittance. The control method for network access admittance is characterized in that a security gateway is arranged to conduct information preset on an internal computer in a company, meanwhile, strict information authentication is conducted on a foreign computer, and then the secondary authentication is conducted on a user who passes initial authentication. According to the control method for network access admittance, a safety network access method is achieved, the foreign computer is prevented from having access to an LAN and directly using a public network without permissions or copying the resource of the company without permissions, the computer in the company can also be prevented from directly visiting unauthentic computers, and the computer in the company is prevented from being infected by viruses.

Description

technical field [0001] The invention relates to a control method for network access admission. Background technique [0002] At present, the LANs of many companies have the following security risks: When outsiders bring laptops into the company and access the company’s LANs through wired or wireless means without permission, there is a risk of illegal copying of internal company resources. . [0003] Therefore, prior art needs to be improved. Contents of the invention [0004] In order to solve the deficiencies of the prior art, the present invention provides a control method for network access access, realizes a method for network security access, and prevents external computers from accessing the local area network, directly using the public network without permission, or Permission to copy the company's resources; it can also prevent the company's computer from directly accessing untrusted computers, and prevent the company's computer from being poisoned. [0005] In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/105H04L9/3247H04L12/2856H04L63/0815H04L63/0853H04L63/0876H04L67/025
Inventor 耿振民刘海刚
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products