Unlock instant, AI-driven research and patent intelligence for your innovation.

Network service security access method, terminal, system and readable storage medium

A network service and security access technology, applied in the field of computer-readable storage media and network service security access, can solve problems affecting network service efficiency, affecting network stability, and complex solutions

Active Publication Date: 2020-04-17
网御安全技术(深圳)有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, this scheme to change the entire network topology is relatively complicated, which affects both the stability of the network and the efficiency of network services
And the beneficial effect 3 of its patent is described: "Users in the intranet can still use the static IP address to access specific terminals such as network printers and servers in the original way, while ensuring network security, it improves the intranet access to specific terminals. Access efficiency", as can be seen from the patent's description of its own beneficial effects, in this solution, access to specific network services provided by specific terminals is still more inclined to use static IP addresses to improve access efficiency, and there is no True Hide Protects ISPs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network service security access method, terminal, system and readable storage medium
  • Network service security access method, terminal, system and readable storage medium
  • Network service security access method, terminal, system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096]In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0097] Please refer to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to a local area network-based network service security access method, terminal and system and a readable storage medium. The network service security access method comprises the steps of monitoring a processing event of network communication data based on a local area network, pausing execution of the processing event, and analyzing identity information of a processing terminal corresponding to the processing event according to an MAC frame of the network communication data, if the processing terminal is determined to be a preset terminal capable of accessing a specific network service according to the identity information, obtaining a shared key of the processing terminal, calculating randomized new identity information according to a preset calculation method according to the shared key and the identity information, and replacing the identity information with the new identity information, and enablingthe network communication data to carry the new identity information to continue to execute the network communication data processing event, so as to hide the specific network service which should bedisclosed for other users except a preset specific network service visitor, thereby achieving the purpose of securely accessing the specific network service.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a LAN-based network service security access method, terminal, system and computer-readable storage medium. Background technique [0002] In a local area network with high security requirements or special application scenarios, one or a part of the network nodes usually provide specific network services to other nodes that meet the requirements. For example, within an enterprise, only one computer in a certain department’s LAN provides data download services, and only computers on the network with download permissions can access the service; An export computer has the authority to access other regional networks, and it needs to summarize various monitoring data in the production environment in this region and transmit them to other regions. Therefore, the export computer needs to open a data service port in the internal network to allow the responsible monitor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/103H04L63/0414H04L63/062H04L63/0876
Inventor 不公告发明人
Owner 网御安全技术(深圳)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More