Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-strategy control method and device for shared access

A shared access, multi-strategy technology, applied in the field of communications, can solve the problems of inconsistent requirements for shared access, insufficient user monitoring, and inability to implement separate control of different access devices, so as to meet the needs of use.

Inactive Publication Date: 2018-11-27
BEIJING QIANXIN TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually, everyone uses the same processing strategy, but in different scenarios, people have different requirements for shared access: within the company, because different positions have different requirements for shared access, it is necessary to make adjustments for the shared access of different positions. Differentiated restrictions; as an operator, due to the inconsistency of broadband and fees in different schools, it is necessary to implement differentiated restrictions on the shared access of students from different schools
[0003] However, in the prior art, there is only one global control strategy for shared access, and the same restriction standard is adopted for all users. With the same control method, it is impossible to control different access devices separately, and the monitoring of users is not diversified enough, and at the same time, some users are restricted from using the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-strategy control method and device for shared access
  • Multi-strategy control method and device for shared access
  • Multi-strategy control method and device for shared access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0044] figure 1 It shows a schematic flowchart of a shared access multi-policy control method provided by this embodiment, including:

[0045] S101. Acquire Internet packets, perform policy matching on the Internet packets in sequence according to the shared access policies of each user object, and mark the Internet packets with a policy ID if the matching is successful.

[0046] Wherein, the user objects form different object sets according to different locations and times of the users, and each user object includes several users.

[0047]Specifically, the corresponding user objects are defined in the shared access policy, and each user object corresponds to multip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a multi-strategy control method and device for shared access. The method comprises the steps of sequentially performing strategy matching on an Internet message according to a shared access strategy of each user target, marking a strategy ID for the successfully matched Internet message; extracting the data content of a target Internet message, and obtaining the number of device types accessed by the users; performing feature analysis on the data content, obtaining the number of devices accessed by the users according to the feature analysis result andthe number of device types accessed by the users; and obtaining a target shared access strategy, and monitoring or blocking the devices accessed by the users. Different shared access strategies are set for different user targets, and different execution operations such as monitoring or blocking are adopted for the devices accessed by the users through matching the different shared access strategies when an Internet message is received, thereby being capable of simultaneously controlling the different accessed devices respectively, enabling the monitoring of the users to be diversified, and meeting use requirements of all users for the network at the same time.

Description

technical field [0001] Embodiments of the present invention relate to the field of communication technologies, and in particular to a shared access multi-policy control method and device. Background technique [0002] With the development of communications and electronics, various mobile terminal devices have entered people's lives, and mobile terminals are connected to the Internet through wireless, which is convenient for users but also creates huge security risks. Especially in the company, there are strict regulations on whether shared access can be accessed, how many PCs, and how many mobile terminals can be accessed. Usually, everyone uses the same processing strategy, but in different scenarios, people have different requirements for shared access: within the company, because different positions have different requirements for shared access, it is necessary to make adjustments for the shared access of different positions. Differentiated restrictions; as an operator, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/813H04L12/911H04L47/20
CPCH04L47/20H04L47/70
Inventor 岳勇张洪钏金科
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products