Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for network access control

A network access control and network technology, applied in the field of network transmission security, can solve problems such as normal access restrictions, effect discounts, and pages that cannot be displayed, so as to ensure network security, reduce maintenance work, and improve effectiveness.

Active Publication Date: 2015-04-29
BEIJING UNIV OF TECH
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is effective when the terminal is in the enterprise intranet (private network) or simple Internet (no need for Web and gateway authentication), but in some complex network (requires Web and gateway authentication) environment, the effect of this method is not will be greatly discounted
For example, in airports and other wireless network environments that require identity authentication, if the mobile security office terminal (notebook) needs to access the website www.abcd.com and its content (this website is an accessible network resource, that is, it is in the network whitelist), it must First access to the airport wireless network, the wireless controller of the network will intercept the HTTP request and redirect to the web authentication page of the network for identity verification, however, due to the strict access restrictions of the white list, this page cannot be displayed, making the mobile security office The normal access of the terminal (notebook) to the website www.abcd.com in the white list is restricted. In this case, the connection between the mobile security office terminal and the server may even fail to be established, which affects the management effect of network access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for network access control
  • Method and system for network access control
  • Method and system for network access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the schematic diagrams in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. It should be noted that the relative arrangement of components and steps set forth in these embodiments does not limit the scope of the invention unless specifically stated otherwise.

[0028] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] Techniques, methods, and systems known to those of ordinary skill in the relevant art may no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for network access control, and relates to the technical field of network transmission security. When the mobile office terminal is under strict network access control, the network connection status of a terminal is dynamically detected, and the terminal can successfully pass the Web and gateway authentication according to the corresponding detection status. According to the method for network access control, the equipment is more compatible in complex changeful network environments, while the network security of the equipment is ensured, the effectiveness of network access control can be improved, the maintenance work of the security administrator can be reduced, and the support and guarantee can further be provided for the accessible network resources of the equipment.

Description

technical field [0001] The invention relates to the technical field of network transmission security, in particular to a method and system for network access control. Background technique [0002] At present, user terminal equipment is widely used. For example, users browse the Internet and do daily work. Generally, Microsoft operating systems (windows) are installed. These operating systems allow users to install and uninstall any software by themselves, which brings great hidden dangers to system security. Attacked by viruses or Trojan horses hidden in self-installed software, the office system belongs to the business system of the unit, and the data involved is sensitive data of the unit, and the leakage of data will bring security threats. In order to allow users to freely install software and browse the Internet on their own terminal equipment, and to ensure the safety of users when using office systems, a management method for network access control of user terminal eq...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L43/08H04L63/0876H04L63/101H04L67/02H04L67/04
Inventor 张建标柴锐阎林林莉刘燕辉
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products