Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for network access control

A network access and control method technology, applied in the field of network security, can solve problems such as network access control loopholes, complex operations, and increased security risks of equipment, so as to achieve double credibility and improve network security.

Active Publication Date: 2021-11-05
上海文化广播影视集团有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the current data collection method is relatively simple, the amount of collected data is small but not comprehensive enough, which leads to loopholes in network access control and cannot effectively guarantee network security.
Although the traditional way of installing additional agents for data collection increases the amount of collected data, the operation is more complicated, and the increase in equipment also increases the corresponding security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for network access control
  • Method and system for network access control
  • Method and system for network access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. The present invention is not limited to this embodiment, and other embodiments may also belong to the scope of the present invention as long as they conform to the gist of the present invention.

[0056] In a preferred embodiment of the present invention, based on the above-mentioned problems in the prior art, a network admission control method is now provided, in which a network admission server is pre-configured in the network, and the network admission server is based on the pre-generated basis The database performs network access control on real-time online terminals;

[0057] The network is also configured with a core switch and an access switch. The core switch and the access switch are respectively connected to the network admission server.

[0058] Such as figure 1 As shown, the generation process of the basic database specifically in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a network access control method and system, which relate to the technical field of network security, including detection of real-time online terminals in the network; performing security audits on real-time online terminals according to the basic database: if the security audit passes, the real-time online terminals are allowed to access access to the network; if the security audit is not passed, the real-time online terminal is authenticated according to the basic database: if the security authentication is passed, the real-time online terminal is allowed to access the network, and the first access authority is set; if the security authentication is not passed, the real-time online terminal is Perform security assessment on the real-time online terminal: if the security assessment passes, the real-time online terminal is allowed to access the network, and the second access authority is set; if the security assessment fails, the real-time online terminal is refused to enter the network. The invention performs multiple verifications on the authenticity of user identities and terminal risks, realizes network access control and obtains access rights, and improves network security.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network access control method and system. Background technique [0002] With the development and integration of computer technology and network communication technology, terminal security management is becoming more and more important for every enterprise. A good terminal security control technology can ensure that the security policy of the enterprise is truly implemented and effectively control various Illegal security incidents, to the greatest extent contain the repeated malicious attacks and damages in the network. At present, in enterprise networks, user terminal computers do not update system patches and virus databases in time, set up proxy servers privately, access external networks privately, and abuse enterprise software to disable behaviors abound. Once a vulnerable user terminal is connected to the network, the It is equivalent to opening the door to pote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0876H04L63/08H04L63/145H04L63/1433H04L2101/622
Inventor 胡恺丁庆
Owner 上海文化广播影视集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products