A Distributed Terminal Access Control Method and Device

An access control and distributed monitoring technology, applied in transmission systems, electrical components, etc., can solve the problems that server equipment cannot provide normal business services, and the number of server equipment filtering rules is limited.

Active Publication Date: 2020-01-14
ZHEJIANG UNIVIEW TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] There are a large number of front-end devices in the video surveillance system. Correspondingly, the number of rules that need to be configured in the video management server and other devices also increases accordingly. However, the number of filtering rules supported by the server device itself is limited, and generally only supports 1000 rules. When the number exceeds the maximum number of rules supported by the server device, the server device will not be able to provide normal business services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Distributed Terminal Access Control Method and Device
  • A Distributed Terminal Access Control Method and Device
  • A Distributed Terminal Access Control Method and Device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] As stated in the background technology of this application, in the existing technology, the control rules are set on the server, and the corresponding filtering operations need to be processed by the server, which increases the processing burden of the server. Moreover, with the increase of front-end devices, the server The number of control rules that need to be configured has also increased significantly, which not only increases the processing capacity of the server for rule screening, but also, due to the limitation of the number of rules stored in the server itself, once the number of front-end rules requires too many rules, it will cause some control rules to fail. Configured on the server, the control strategy cannot be implemented.

[0059] The inventor of the present application hopes to use the method provided in this application to set corresponding control rules based on service types in each switch of the distributed monitoring system, and to update the corr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention disclose a distributed terminal access control method, and an apparatus. According to the method, a corresponding service type-based control rule is set in each switch of a distributed monitoring system, and a corresponding control rule is updated based on change of the service type of a front-end device, so that each switch performs, according to a corresponding control rule, service-level access control on the front-end device connected with the switch, forwards a packet in accordance with the control rule normally, and discards a packet not in line with the control rule, therefore, terminal access is controlled accurately, the control rule in each switch is updated timely according to the change of the service type of the front-end device, and the storage burden on the server device caused by setting of a lot of control rules is prevented.

Description

technical field [0001] The present application relates to the field of monitoring data transmission, in particular to a distributed terminal access control method and device. Background technique [0002] With the development of IP (Internet Protocol, Internet Protocol) video surveillance services, customers pay more and more attention to the security protection of video surveillance systems. Usually, the intruder will first use a vulnerability scanning tool to perform a port scan on the target device. The port scan generally connects messages to various well-known ports and some common service port ranges of the target device, and judges whether the device is using the port according to the response type of the received message. Then, by analyzing the vulnerability of the service port, further intrusion attacks are launched. [0003] In the existing technology, a defense solution based on control rules is proposed, so that the monitoring system has a certain self-defense f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0218H04L63/0236H04L63/0263H04L63/101H04L63/205
Inventor 周迪赵晖
Owner ZHEJIANG UNIVIEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products