Unlock instant, AI-driven research and patent intelligence for your innovation.

Network service security access method, terminal, system and readable storage medium

A network service and security access technology, applied in the field of computer-readable storage media and network service security access, can solve problems affecting network service efficiency, affecting network stability, and not hiding and protecting network service providers.

Active Publication Date: 2020-06-23
网御安全技术(深圳)有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, this scheme to change the entire network topology is relatively complicated, which affects both the stability of the network and the efficiency of network services
And the beneficial effect 3 of its patent is described: "Users in the intranet can still use the static IP address to access specific terminals such as network printers and servers in the original way, while ensuring network security, it improves the intranet access to specific terminals. Access efficiency", as can be seen from the patent's description of its own beneficial effects, in this solution, access to specific network services provided by specific terminals is still more inclined to use static IP addresses to improve access efficiency, and there is no True Hide Protects ISPs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network service security access method, terminal, system and readable storage medium
  • Network service security access method, terminal, system and readable storage medium
  • Network service security access method, terminal, system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096]In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0097] Please refer to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of information security technology, and in particular to a LAN-based network service security access method, terminal, system and readable storage medium. The network service security access method includes: monitoring network communication data processing events based on the LAN, Then suspend execution of the processing event and analyze the identity information of the processing terminal corresponding to the processing event according to the MAC frame of the network communication data; key; according to the shared key and identity information, calculate randomized new identity information according to the preset calculation method, replace the identity information with the new identity information, let the network communication data carry the new identity information and continue to execute network communication data processing events, in order to realize The specific network service that should be disclosed is hidden from other users except the preset specific network service visitors, so as to achieve the purpose of safely accessing the specific network service.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a LAN-based network service security access method, terminal, system and computer-readable storage medium. Background technique [0002] In a local area network with high security requirements or special application scenarios, one or a part of the network nodes usually provide specific network services to other nodes that meet the requirements. For example, within an enterprise, only one computer in a certain department’s LAN provides data download services, and only computers on the network with download permissions can access the service; An export computer has the authority to access other regional networks, and it needs to summarize various monitoring data in the production environment in this region and transmit them to other regions. Therefore, the export computer needs to open a data service port in the internal network to allow the responsible monitor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/103H04L63/0414H04L63/062H04L63/0876
Inventor 不公告发明人
Owner 网御安全技术(深圳)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More