Unlock instant, AI-driven research and patent intelligence for your innovation.

Enterprise network access control method and device

A network access control and enterprise network technology, applied in the field of enterprise network access control methods and devices, can solve the problems of monitoring and management, network internal structure and access boundary failure, etc.

Active Publication Date: 2019-11-22
BEIJING PIPAXING TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, the access control of most business private networks is almost concentrated on the entry and exit of the network, but there is no necessary monitoring and management of the internal structure and access boundary of the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise network access control method and device
  • Enterprise network access control method and device
  • Enterprise network access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0094] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0095] In order to solve the above technical problem, the embodiment of the present invention provides a method for enterprise network access control. figure 1 Shows a flowchart of a method for controlling access to an enterprise network according to an embodiment of the present invention. Such as figure 1 As shown, the method at least includes the following steps S102 to S108:

[0096] Step S102, monitoring w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an enterprise network access control method and device. The method comprises: monitoring whether the access port of a network boundary device of an enterprise network has changes at the exterior of the enterprise network or not; if it is monitored that the access port of a network boundary device of an enterprise network has changes at the exterior of the enterprise network, obtaining a monitoring result, wherein the monitoring result includes the access port change condition of the network boundary device; analyzing the monitoring result based on the presetting network safety strategy, and determining whether the access port changes of the network boundary device are abnormal or not; and performing network access control of the enterprise network according to the analysis result. According to the embodiment of the invention, the enterprise network boundary protection condition is controlled in real time and the enterprise network is safely protected.

Description

Technical field [0001] The invention relates to the technical field of network applications, in particular to an enterprise network access control method and device. Background technique [0002] Communication between information points and internal and external networks is an indispensable business requirement in corporate networks. In order to ensure that business data is not illegally obtained and tampered with during network transmission and exchange, corresponding network information security protection measures have been implemented at different levels deploy. [0003] In related technologies, most of the business private networks' access control to the network is almost concentrated at the entrance and exit of the network, but the necessary monitoring and management of the internal structure and access boundaries of the network are not implemented. Therefore, it is urgent to solve this technical problem. Summary of the invention [0004] In view of the above problems, the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/20
Inventor 张睿童文裴越峰江亚辉金迪颖刘小雄
Owner BEIJING PIPAXING TECH CO LTD