Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method and device

A technology of access control and access control list, which is applied in the field of information security and computer, and can solve the problem of single access control method

Active Publication Date: 2021-08-20
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing access control method is relatively simple, and usually a list of MAC (Media Access Control, Media Access Control) addresses that are allowed to be accessed is pre-set, and the terminal to be accessed is verified through the MAC address.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0027] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0028] figure 1 An exemplary system architecture 100 to which embodiments of the access control method or access control device of the present application can be applied is shown.

[0029] Such as figure 1 As shown, the system architecture 100 may include terminal devices ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses an access control method and device. A specific implementation of the method includes: acquiring the identification information and location information of the target terminal; determining whether the distance between the target terminal and the network interface of the data center is less than a preset threshold according to the location information; in response to determining the distance between the target terminal and the network interface If the distance is less than the preset threshold, modify the access control list of the router according to the port information and identification information of the router corresponding to the network interface, so as to allow the target terminal to perform data transmission with the data center through the network interface. This embodiment implements determining whether to allow data transmission between the terminal and the data center based on the location information, thereby improving the security of the data center.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to the field of information security technology, and in particular to an access control method and device. Background technique [0002] With the rapid development of network and information technology, the data center has become the cornerstone of various businesses of the enterprise. Information collection terminals transmit a large amount of data to the data center through optical fiber interfaces every day. The network security of the data center is very important, so it is necessary to Strictly control the access and transmission of terminals. [0003] The existing access control method is relatively simple, usually a MAC (Media Access Control, Media Access Control) address list that is allowed to be accessed is pre-set, and the terminal to be accessed is verified through the MAC address. Contents of the invention [0004] The purpose of this application is to pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/107
Inventor 李盖凡杨翰林
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD