Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internal network boundary management and control method

An intranet and boundary technology, which is applied in the field of network security and can solve problems such as the inability to ensure that computer security protection measures are in place.

Active Publication Date: 2019-04-12
北京城强科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above analysis, the present invention proposes a control method for intranet boundaries to solve the problem in the prior art that computer security protection measures cannot be deployed in place

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internal network boundary management and control method
  • Internal network boundary management and control method
  • Internal network boundary management and control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] In the description of the present invention, it should be noted that the terms "first", "second", and "third" are used for description purposes only, and should not be understood as indicating or implying relative importance.

[0037] In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as there is no conflict with each other.

[0038] An embodiment of the present invention provides a method for managin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an internal network boundary management and control method. The internal network boundary management and control method comprises the following steps: authenticating an internalnetwork boundary device; sequentially detecting whether the intranet boundary device includes first tag information indicating that a client program is installed, second tag information indicating that the installed client program is online, and third label information indicating the deployment of security protection measures when the intranet boundary device passes the authentication and is a computer device; closing a switch port corresponding to the intranet boundary device when the intranet boundary device does not include the first tag information, the second tag information, or the third tag information; and keeping the switch port corresponding to the intranet boundary device open when the intranet boundary device includes the first tag information, the second tag information, andthe third tag information. The intranet boundary management and control method provided by the invention can ensure that the computer security protection measures are deployed in place.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an intranet boundary management and control method. Background technique [0002] There are a large number of unknown types of access layer devices in the intranet. However, most network management systems only manage key network devices such as core switches, routers, and aggregation switches. The security management of intranet terminal access cannot reach 100% coverage , The spread of viruses, information theft, and network attacks seriously threaten the safe operation of the intranet, and it is imperative to effectively control the network boundary. [0003] In the existing security control method for intranet terminal access, by obtaining the MAC address of the terminal device and comparing it with the terminal in the authentication device database, the port of the device that has not passed the authentication is closed. However, for computers with high security pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/721
CPCH04L45/66H04L61/103H04L63/0876
Inventor 常雄薛锋叶超
Owner 北京城强科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products