Network access control method with system health detection prior to access

A technology of health detection and network access, which is applied in transmission systems, wide area networks, security devices, etc., can solve the problems of verifying the legal identity of end users and the lack of security, so as to improve access verification performance and avoid viruses or Effects of hacker attacks and ensuring access security

Inactive Publication Date: 2018-03-06
台山市金讯互联网络科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The deployment of the above (B) scheme is more flexible than the (A) scheme and the security is also improved, but the (B) scheme cannot really verify the legal identity of the terminal user. Once the user name and password of the terminal are leaked, those with ulterior motives can Use the leaked user information to log in on any computer in the corporate network, and the security is still not guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method with system health detection prior to access
  • Network access control method with system health detection prior to access
  • Network access control method with system health detection prior to access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Please also see Figure 1 to Figure 7 , figure 1 It is a schematic diagram of a network connection using the RADIUS protocol for terminal access verification in the prior art, figure 2 It is a schematic diagram of signaling for terminal access verification using the RADIUS protocol in the prior art, image 3 A schematic diagram of the signaling steps of the network access control method that performs system health detection before access in the present invention, Figure 4 The flow chart of the network access control method for performing system health detection before accessing in the present invention, Figure 5 yes Figure 4 The flowchart in S3, Figure 6 yes Figure 4 The flowchart in S4, Figure 7 yes Figure 4 The flow chart of the authentication server delivering the access control policy in the middle.

[0045]A network access control method of the present invention that performs system health detection before access, and its corresponding network topol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a network access control method with system health detection prior to access. The method comprises the steps of: S1: registering a user name, passwords and a handheld device identification code of a user of network terminal; S2: filling the user name of the terminal on a login interface of the network terminal, and emitting a connection request for obtaining dynamicverification codes to an authentication server; S3: sending one dynamic verification code to the handheld device of the terminal user by the authentication server; and S4: performing login authentication by employing the user name and the passwords of the terminal and the dynamic verification codes, and issuing corresponding access control policies to an access device by a policy server accordingto a system health report of the terminal. The network terminal requests one dynamic verification code to the authentication server, the dynamic verification code is employed to determine a legal identity of a user, a system health report is submitted to the policy server prior to access of a terminal, and therefore virus or hacker attack from the network terminal is effectively avoided and network access safety is comprehensively guaranteed.

Description

technical field [0001] The invention relates to the field of communication control, in particular to a network access control method that performs system health detection before access. Background technique [0002] Due to the consideration of enterprise network service types and security, users at different levels have very different requirements for network services and network security during the process of terminal access to the network. At present, the following two technical solutions are mainly used to implement differentiated processing for different users. [0003] (A) The scheme uses VLAN (Virtual Local Area Network) technology to logically isolate different networks; for example, assign switch ports 1 to 10 to VLAN1, ports 11 to 23 to VLAN2, and terminals of the finance department with higher security requirements can only be connected to Access to VLAN1, while other terminals such as the production department access to VLAN2, achieving logical isolation at the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L29/06H04W12/08H04W12/06H04W12/088
CPCH04L12/2856H04L63/0263H04L63/0807H04L63/0815H04L63/083H04L63/10H04W12/08
Inventor 袁兴飚
Owner 台山市金讯互联网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products