A device access authority control method, device and system

A technology of authority control and device access, which is applied in the transmission system, electrical components, etc., to achieve the effect of improving security

Active Publication Date: 2021-05-07
邱婧
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] In view of this, the object of the present invention is to provide a device access authority control method, device and system to solve the technical problem of access authority control of all access equipment on Ethernet ports

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device access authority control method, device and system
  • A device access authority control method, device and system
  • A device access authority control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0239] as attached figure 1 As shown, an embodiment of a device access authority control method, which is used to control the authority of access device 30, specifically includes the following steps:

[0240] S101) Obtain the basic authority control data of the access device 30, the basic authority control data of the access device 30 at least includes access authority requirement data, the identification and type of the port 101 accessed by the access device 30;

[0241] S102) Bind the port 101 and the access device 30 and determine whether the binding is successful;

[0242] S103) If the binding is successful, authorize the access of the access device 30 according to the type of the accessed port 101 and the access authority requirement data;

[0243] S104) continuously detect and maintain the current VLAN state of the port 101, continuously detect the collision statistics of the port 101, continuously detect whether the identity status of the access device 30 is valid, and...

Embodiment 2

[0292] as attached figure 2 As shown, another embodiment of the device access authority control method is used to control the authority of the access device 30, which is characterized in that it specifically includes the following steps:

[0293] S101) Acquiring basic authority control data of the access device 30;

[0294] Obtain the identity authentication information of the access device 30 connected to the controlled port;

[0295] According to the identity authentication information of the access device 30, the identity authentication key and authentication rules of the access device 30 are obtained directly or indirectly locally or remotely, and the identity of the access device 30 is successfully authenticated.

[0296] S102) Bind the port 101 and the access device 30 and determine whether the binding is successful;

[0297] The technical solution for binding the port 101 and the access device 30 includes but is not limited to binding the port 101 and the access devi...

Embodiment 3

[0324] as attached image 3 As shown, another embodiment of a device access authority control method is used to control the authority of the access device 30, which is characterized in that it specifically includes the following steps:

[0325] S201) access authority initialization;

[0326] According to the design data requirements, create all VLANs, and divide all VLANs into controlled VLANs and normal VLANs. The device requesting cross-VLAN communication in a way prohibits the cross-VLAN communication between the controlled VLAN and the normal VLAN; its effect is to cut off the communication channel between the terminal equipment 30 in the controlled VLAN and the terminal equipment 32 in the normal VLAN, preventing unauthorized The access device 30 in the authorized controlled VLAN communicates with the terminal device 32 in the normal VLAN through cross-VLAN technology, cancels the permission of the non-default authorized fixed terminal device to access the normal VLAN, c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a device access authority control method, device and system, comprising: acquiring access device authority control basic data; binding a port to an access device and judging whether the binding is successful; if successful, according to the access port type and access permission request data, authorize the access device; continuously detect and maintain the current VLAN status of the port, continuously detect port collision statistics, whether the identity status of the access device is valid, and the online status of the access device; determine whether the access device should be revoked If the revocation conditions are met, the port is divided into a controlled VLAN according to the port type; the binding between the port and the access device is cancelled. By applying the present invention to control the whole process of access authorization of access equipment, prevention of illegal access, revocation of authorization, etc., it can ensure that legal access equipment can and can only obtain the access authority within the scope of permission, and prevent illegal access equipment from obtaining access to authorized equipment. The same access rights greatly improve the security of Ethernet terminal equipment.

Description

technical field [0001] The present invention relates to the technical field of network security control, in particular to a device access authority control method, device and system applied to intelligent control of Ethernet network security. Background technique [0002] With the advancement of information network technology, Ethernet network technology and related products and systems have been rapidly and massively applied to various industries, and have become the infrastructure of an information society. However, following that, various hidden dangers of network security have become increasingly prominent, the most prominent of which is the access authority control problem of access devices connected to Ethernet ports. [0003] At present, in the prior art, there are mainly the following technical solutions for solving the problem of access authority control of access devices connected to Ethernet ports: [0004] Solution 1 is to control the access rights of access dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/10
Inventor 邱婧
Owner 邱婧
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products