Secure access method and system for equipment port
A security access and device port technology, applied in the field of network security, can solve problems such as the inability to eliminate security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] Embodiment 1, obtain through the operation and maintenance server.
[0052]Set up an operation and maintenance server that both the device and the client can log in to, such as an operation and maintenance server or other management servers, to synchronize the unique identifier, time, and change cycle of the device. The specific process is as follows:
[0053] The device side reports the unique identification of the device side, the change cycle to the operation and maintenance server, and synchronizes the time;
[0054] The client accesses the operation and maintenance server to obtain the unique identifier of the device, the change cycle, and synchronize the time.
Embodiment 2
[0055] Embodiment 2, obtain by scanning the two-dimensional code or by manual input.
[0056] The operation and maintenance personnel need to know the specific rules in advance, input the unique identification and change cycle of the device to the client, and manually input the time to synchronize with the device. That is, when the operation and maintenance personnel know the unique identifier of the device, the port change period and other information, they can manually fill in the unique identifier, port change period, obtain the current time parameters locally on the client side, and generate the access port locally.
[0057] Preferably, the client of the present invention adopts the solution of Embodiment 1 to obtain the unique identifier, time, and change cycle of the device, which can effectively ensure the security of the port generation rules.
[0058] In an embodiment of the present invention, the port generation rules of the client and device are shown in the followi...
Embodiment 3
[0067] Embodiment 3, take the first line of Table 1 as an example.
[0068] From 16:00 to 17:00 on November 28, 2018, DATA1=1709; DATA2=31479; DATA3=3753; DATA4=27599, with 1709, 31479, 3753, and 275994 as the specific port sequence.
[0069] Then the device listens on four ports: 1709, 31479, 3753, and 275994.
[0070] The client needs to send TCP connection packets to ports 1709, 31479, 3753, and 27599 in sequence, and the connection packet time for each two ports can be set, for example, no more than 5 seconds is allowed. That is, after sending a TCP connection message to port 1709, it needs to send a TCP connection message to 31479 within 5 seconds, and so on.
[0071] The device judges that the client has initiated TCP connections to the 4 ports in sequence, and the sequence and interval of connections meet the preset rules, and then sends the firewall configuration rules to allow the client to access port 18470 on the device. After that, the client accesses 18470 to re...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com