Enterprise network access control method and device

A network access control and enterprise network technology, applied in the field of enterprise network access control methods and devices, can solve the problems of monitoring and management, network internal structure and access boundary, etc.

Active Publication Date: 2016-10-26
BEIJING PIPAXING TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, the access control of most business private networks is almost concentrated on the entry and exit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise network access control method and device
  • Enterprise network access control method and device
  • Enterprise network access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0095] In order to solve the above technical problems, an embodiment of the present invention provides a method for enterprise network access control. figure 1 A flow chart of an enterprise network access control method according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method at least includes the following steps S102 to S108:

[0096] Step S102, monitoring outside the enterprise network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an enterprise network access control method and device. The method comprises: monitoring whether the access port of a network boundary device of an enterprise network has changes at the exterior of the enterprise network or not; if it is monitored that the access port of a network boundary device of an enterprise network has changes at the exterior of the enterprise network, obtaining a monitoring result, wherein the monitoring result includes the access port change condition of the network boundary device; analyzing the monitoring result based on the presetting network safety strategy, and determining whether the access port changes of the network boundary device are abnormal or not; and performing network access control of the enterprise network according to the analysis result. According to the embodiment of the invention, the enterprise network boundary protection condition is controlled in real time and the enterprise network is safely protected.

Description

technical field [0001] The invention relates to the field of network application technology, in particular to an enterprise network access control method and device. Background technique [0002] Communication between information points and internal and external networks is an essential business requirement in enterprise networks. In order to protect business data from being illegally obtained and tampered with during network transmission and exchange, corresponding network information security protection measures have been implemented at different levels. deploy. [0003] In related technologies, the access control of most business private networks is almost concentrated at the network entry and exit gates, but there is no necessary monitoring and management of the network internal structure and access boundaries. Therefore, urgently need to solve this technical problem. Contents of the invention [0004] In view of the above problems, the present invention is proposed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/20
Inventor 张睿童文裴越峰江亚辉金迪颖刘小雄
Owner BEIJING PIPAXING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products