User security access method
A security access and user technology, applied in the field of information security, can solve the problem of insufficient security of user security access methods, and achieve the effect of satisfying use and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0033] The user security access method in the embodiment of the present invention specifically includes the following steps:
[0034] Step 1. The access device is started, and the terminal blacklist and access information table are initialized.
[0035] In this step, the blacklist may at least include the IP address of the user terminal and the last access information of the corresponding user terminal. The access information table can at least include the IP address 3001 of the user terminal, the number of visits of the user terminal and whether it satisfies the PING access strategy, etc., and whether each user terminal in the access information table satisfies the PING access strategy is preferably defaulted to no.
[0036] Step 2. The access device issues a PING access policy.
[0037] In this step, the PING access policy refers to a set of behaviors for performing PING access to the agreed port of the access device.
[0038] Step 3. The access device closes the PING res...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More