Device of terminal network access control system and implementation method

A technology of access control and terminal network, applied in the direction of transmission system, electrical components, etc., can solve problems such as data loss, easy to be ignored, system intrusion, etc., to improve processing speed, reduce repetitive and unnecessary processing, and ensure security sexual effect

Inactive Publication Date: 2019-04-09
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the main tool for people to conduct business processing, data processing and access to the network, computer terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device of terminal network access control system and implementation method
  • Device of terminal network access control system and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] as attached figure 1As shown, the device of the terminal network access control system of the present invention mainly includes a management terminal, a server terminal and a client terminal. The management terminal is used to configure the terminal network access strategy in real time and audit logs for network access. display information; the server is used to configure policies and transmit audit information, including sending the policies configured by the management end to the client and passing the audit logs generated by the client to the management end; the client is used to parse and store the server According to the policy sent, the data packet is processed accordingly according to the pre-processed configuration policy, and the corresponding audit log is generated according to the processing result and sent to the server.

[0054] Among them, the management terminal includes a policy configuration module and a message display module; the management terminal i...

Embodiment 2

[0071] as attached figure 2 As shown, the implementation method of the terminal network access control system of the present invention, the method steps are as follows:

[0072] S1. The terminal registers after installing the client program, submits the basic information of the terminal to the server, the server stores the basic information of the terminal in the database, and the management terminal conducts a network access audit on the terminal, assigns or modifies network access policies, and notifies the server;

[0073] S2. The server queries the database to generate a network access control strategy IP list, and the IP list only includes the terminal IP addresses authorized to allow access and the authorized whitelist IP addresses;

[0074] S3. The server notifies the client to update the network access control IP list;

[0075] S4. The client judges whether the source IP address and the destination IP address are in the IP list:

[0076] ①, if yes, execute step S5; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device and implementation of a terminal network access control system, and belongs to the security field. A technical problem to be solved by the invention is how to ensure the security of a terminal network access control system. According to the technical scheme, the terminal network access control system device comprises a management end, a server end and a client end,wherein the management end is used for carrying out real-time configuration on a terminal network access strategy and displaying audit log information of network access, the server is used for configuring transmission of strategies and audit information, and specifically comprises the steps of sending the strategies configured by the management end to the client and transmitting audit logs generated by the client to the management end, and the client end is used for analyzing and storing the strategy sent by the server end, carrying out corresponding processing on the data packet according tothe preprocessed configuration strategy, generating a corresponding audit log according to a processing result, and sending the audit log to the server. The invention also discloses an implementationmethod of the terminal network access control system.

Description

technical field [0001] The invention relates to the field of terminal security, in particular to a terminal network access control system device and implementation method. Background technique [0002] With the increasing degree of social informatization, information security issues have gradually become the focus of attention. In order to protect data resources from illegal access, people have done a lot of research and practice on border security protection such as firewalls. However, as the main tool for people to conduct business processing, data processing and access to the network, computer terminals are easily ignored in information security management and deployment, which may easily lead to data loss or system intrusion. [0003] According to security defense surveys in recent years, more than 80% of management and security problems in governments, schools, enterprises and institutions come from computer terminals. The widespread use of computer terminals has the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/101H04L63/205H04L67/02H04L69/162
Inventor 刘维霞朱书彬何孟宁赵全烈
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products