Network admission control method and system

A network access and control method technology, applied in the field of network security, can solve problems such as network access control loopholes, complex operations, and increased security risks of equipment, so as to achieve double credibility and improve network security.

Active Publication Date: 2019-11-22
上海文化广播影视集团有限公司 +1
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the current data collection method is relatively simple, the amount of collected data is small but not comprehensive enough, which leads to loopholes in network access control and cannot effectively guarantee network security.
Although the traditional way of installing additional agents for data collection increases the amount of collected data, the operation is more complicated, and the increase in equipment also increases the corresponding security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network admission control method and system
  • Network admission control method and system
  • Network admission control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. The present invention is not limited to this embodiment, and other embodiments may also belong to the scope of the present invention as long as they conform to the gist of the present invention.

[0056] In a preferred embodiment of the present invention, based on the above-mentioned problems in the prior art, a network admission control method is now provided, in which a network admission server is pre-configured in the network, and the network admission server is based on the pre-generated basis The database performs network access control on real-time online terminals;

[0057] The network is also configured with a core switch and an access switch. The core switch and the access switch are respectively connected to the network admission server.

[0058] Such as figure 1 As shown, the generation process of the basic database specifically in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network admission control method and system, and relates to the technical field of network security, and the method comprises the steps: detecting a real-time online terminalin a network; performing security auditing on the real-time online terminal according to a basic database; if the real-time online terminal passes the security auditing, permitting the real-time online terminal to access the network; if the real-time online terminal does not pass the security audit, performing security authentication on the real-time online terminal according to the basic data if the real-time online terminal passes the security authentication, permitting the real-time online terminal to access the network, and setting a first access permission; if the real-time online terminal does not pass the security authentication, performing security evaluation on the real-time online terminal according to the basic data if the real-time online terminal passes the securityevaluation, permitting the real-time online terminal to access the network, and setting a second access permission; and if the real-time online terminal does not pass the security assessment, refusingthe real-time online terminal to enter the network. According to the invention, multiple verification is carried out on the authenticity of the user identity and the terminal risk, network admissioncontrol and access permission acquisition are realized, and the network security is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network access control method and system. Background technique [0002] With the development and integration of computer technology and network communication technology, terminal security management is becoming more and more important for every enterprise. A good terminal security control technology can ensure that the security policy of the enterprise is truly implemented and effectively control various Illegal security incidents, to the greatest extent contain the repeated malicious attacks and damages in the network. At present, in enterprise networks, user terminal computers do not update system patches and virus databases in time, set up proxy servers privately, access external networks privately, and abuse enterprise software to disable behaviors abound. Once a vulnerable user terminal is connected to the network, the It is equivalent to opening the door to pote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0876H04L63/08H04L63/145H04L63/1433H04L2101/622
Inventor 胡恺丁庆
Owner 上海文化广播影视集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products