Illegal connection judgment method based on set coverage

A connection judgment and illegal technology, applied in the transmission system, electrical components, etc., can solve the problems of information leakage, inability to identify and steal illegal equipment, etc., and achieve the effect of improving work efficiency, convenient and quick judgment method, and reducing work burden

Active Publication Date: 2018-05-08
JIANGSU FRONTIER ELECTRIC TECH +2
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional connection legitimacy judgment method mostly uses the server to independently identify the identities of multiple clients, so as to ensure the legitimacy of each client identity, but when there is a data connection between an illegal device and the client, the server cannot promptly identify the Illegal devices can be identified. Illegal devices can steal information stored on the client and even obtain data stored in the server with the help of the client, causing information leakage to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal connection judgment method based on set coverage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] Preferred embodiment 1, step 2, the client sends an authentication request to the server, and the server compares the registration information of the client with the legal terminal list;

[0051] If the comparison is successful, the server continues to establish a communication channel with the client, and the server sends a list of legal terminals to the client, and records the client as a legal client;

[0052] If the comparison is unsuccessful, the server will record the client as an illegal client and stop communicating with the client. At the same time, the server will call the illegal client to mark the illegal client's tag information, and store the tag information in the illegal connection address book , to record the number of illegal client accesses; the above tag information contains the unique identification of the terminal; through the tag information, both the server and the client can perform accurate identification.

[0053] By illegally connecting to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an illegal connection judgment method based on set coverage. The method comprises the following steps that S1, a server and a plurality of clients are established, wherein registration information only corresponding to client information is stored in the clients; S2, the clients send authentication requests to the server, and the server compares the registration informationof the clients with a legal terminal list; and S3, legal clients receive the legal terminal list, when the legal clients receive communication requests sent by other clients, the legal clients identify the registration information of the clients which send the communication requests and judge whether the registration information exists in the legal terminal list or not. According to the method, when a communication environment is established, the legal terminal list are sent to various legal clients and the server does not need to independently carry out identity identification, so the judgment method is convenient and fast, the identity identification work is shared by the clients, the work load of the server is mitigated, and the working efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of data connection, in particular to a method for judging an illegal connection based on set coverage. Background technique [0002] At present, illegal connection is the main factor causing security risks such as data leakage, especially illegal external connection. Illegal external connection means that the machine where the client is installed accesses the external network without permission. [0003] The traditional connection legitimacy judgment method mostly uses the server to independently identify the identities of multiple clients, so as to ensure the legitimacy of each client identity, but when there is a data connection between an illegal device and the client, the server cannot promptly identify the Illegal devices can be identified. Illegal devices can steal information stored on the client and even use the client to obtain data stored in the server, causing information leakage to a certain exte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/0876H04L63/101H04L63/123H04L63/162
Inventor 许道强张立东孙虹官国飞葛崇慧宋庆武
Owner JIANGSU FRONTIER ELECTRIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products