Unlock instant, AI-driven research and patent intelligence for your innovation.

User network authentication information extracting method and system

A technology for network authentication and information extraction, which is applied in the field of network information security and can solve problems such as insufficient protection and monitoring.

Inactive Publication Date: 2018-11-02
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, access security for specific services is the focus of technical research, but the existing technology is insufficient for the protection and monitoring of users of specific services and users who only use the LAN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User network authentication information extracting method and system
  • User network authentication information extracting method and system
  • User network authentication information extracting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] A method and system for extracting user network authentication information:

[0020] 1. Configuration: To protect a specific service, you must first learn user network authentication information 1. The collection of user network authentication information is divided into two cases. The first case is to configure the intranet server 4 on the internal network 2. ; The second situation is that the user can connect to the external network 3, and configure the gateway 5 leading to the external network for the user connection.

[0021] 2. Acquiring network authentication information 6: For intranet 2 connection, configure the intranet server 4 to obtain some user network authentication information that users visit on the intranet, such as IP, computer model, browser version, time, etc.; for external network 3. Connect and configure the gateway leading to the external network 5. More user network authentication information can be obtained, such as mobile phone model, tablet mo...

Embodiment 2

[0024] A method and system for extracting user network authentication information:

[0025] 1. For system deployment, for intranet users, deploy the system on an intranet server. When an intranet user accesses internally, the information carried passes through the intranet server, and the program deployed on the intranet server will capture the user's network information. Certification Information. For users who can access the external network, deploy the system on the gateway connected to the external network, and obtain the user's network authentication information through gateway traffic.

[0026] 2. Obtain network authentication information, through the network authentication information obtained on the gateway and the intranet server, the network authentication information obtained on the intranet includes computer model, browser version, time, etc. The user network authentication information obtained through the gateway includes computer model, tablet model, and locatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user network authentication information extracting method and system. The method comprises the following steps: protecting specific service, firstly learning basic user network authentication information, wherein the user network authentication information collection is divided into two conditions: the first condition is that the user network authentication information isconfigured on a server of the intranet completely under the intranet condition, and the second condition is that the gateway, connected with the extranet, of the user is configured when the user canconnect the extranet. The extracting method and system disclosed by the invention not only can protect the user capable of accessing the extranet, but also can play the effect of protecting the user only using the local area network. For the user only using the local area network, the configuration is performed on the server of the corresponding local area network, and the network authentication information of the user can be collected as well, thereby placing the monitoring effect when accessing the specific server.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a method and system for extracting user network authentication information. Background technique [0002] The pace of global informatization is accelerating, and information security is becoming more and more important. In the online society, there are many attackers with ulterior motives who use illegal means to enter specific services and steal user sensitive information. Therefore, the protection of user sensitive information is highly concerned. For individual and corporate users, it is hoped that information related to personal privacy and commercial interests will be published on the Internet. Protected to prevent others from violating the interests of users by means of impersonation; for network operators and managers, they hope that the access, reading and writing of local network information will be protected and controlled to prevent and prevent attacks by ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04L63/20H04L69/22
Inventor 孙波王益静李应博张伟刘成张永铮常鹏高昕王亿芳王梦禹毛蔚轩董建武
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT