Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Intranet Boundary Control Method

An intranet and boundary technology, applied in the field of network security, can solve problems such as the inability to ensure that computer security protection measures are deployed in place

Active Publication Date: 2021-12-17
北京城强科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above analysis, the present invention proposes a control method for intranet boundaries to solve the problem in the prior art that computer security protection measures cannot be deployed in place

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Intranet Boundary Control Method
  • An Intranet Boundary Control Method
  • An Intranet Boundary Control Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] In the description of the present invention, it should be noted that the terms "first", "second", and "third" are used for description purposes only, and should not be understood as indicating or implying relative importance.

[0037] In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as there is no conflict with each other.

[0038] An embodiment of the present invention provides a method for managin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for managing and controlling an intranet boundary. The method includes: authenticating an intranet boundary device; The first label information representing the installation of the client program, the second label information representing the online installation of the installed client program, and the third label information representing the deployment of security protection measures; when the intranet boundary device does not contain the first label information, When the second label information or the third label information, close the switch port corresponding to the intranet border device; when the intranet border device contains the first tag information, the second tag information and the third tag information, keep the corresponding The switch port is open. The intranet boundary management and control method provided by the invention can ensure that computer safety protection measures are deployed in place.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an intranet boundary management and control method. Background technique [0002] There are a large number of unknown types of access layer devices in the intranet. However, most network management systems only manage key network devices such as core switches, routers, and aggregation switches. The security management of intranet terminal access cannot reach 100% coverage , The spread of viruses, information theft, and network attacks seriously threaten the safe operation of the intranet, and it is imperative to effectively control the network boundary. [0003] In the existing security control method for intranet terminal access, by obtaining the MAC address of the terminal device and comparing it with the terminal in the authentication device database, the port of the device that has not passed the authentication is closed. However, for computers with high security pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/721
CPCH04L45/66H04L61/103H04L63/0876
Inventor 常雄薛锋叶超
Owner 北京城强科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products