Unlock instant, AI-driven research and patent intelligence for your innovation.

Shared access detection method and device

A technology for sharing access and detection methods, applied in the field of computer communication, can solve problems such as reducing the security of the company's intranet, and achieve the effect of improving security

Active Publication Date: 2017-05-31
杭州迪普信息技术有限公司
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in practical applications, many employees use shared access to access the Internet through the company's intranet environment, such as privately building wireless hotspots in the company network environment to access the Internet, which greatly reduces the company's intranet security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared access detection method and device
  • Shared access detection method and device
  • Shared access detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0020] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a shared access detection method, which can be applied in a gateway device of a local area network, and can comprise the steps of collecting an HTTP message from a user terminal, and acquiring a preset identification field carried by the HTTP message; judging a terminal type of the user terminal based on the preset identification field; if the user terminal is a mobile terminal, matching an IP address of the user terminal with a strategy in a preset strategy group, and carrying out access control on the user terminal based on the matched strategy, wherein the strategy group comprises a plurality of strategies with different types, and pre-configured IP list types to which the strategies with different types correspond are different. By utilizing the method provided by the invention, the accessed user terminal can be controlled through the pre-configured strategy group, so that the safety of a company intranet is improved.

Description

technical field [0001] The present application relates to the field of computer communication, in particular to a method and device for detecting shared access. Background technique [0002] Network sharing access refers to the behavior of multiple user terminals sharing a public network IP to access the Internet through NAT (Network Address Translation, Network Address Translation), HTTP proxy and other methods. [0003] However, in practical applications, many employees use shared access to access the Internet through the company's intranet environment, such as privately building wireless hotspots in the company network environment to access the Internet, which greatly reduces the company's intranet security. Contents of the invention [0004] In view of this, the present application provides a shared access detection method and device, which are used to control the accessed user terminals through a pre-configured policy group, so as to improve the security of the compan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L29/06
CPCH04L12/2856H04L63/0227H04L63/0236
Inventor 魏方征
Owner 杭州迪普信息技术有限公司