Secure access method and system for equipment port

A security access and device port technology, applied in the field of network security, can solve problems such as the inability to eliminate security risks

Active Publication Date: 2020-07-07
ZHEJIANG UNIVIEW TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a method and system for securely accessing device ports, which overcomes the problem that hidden dangers of safety cannot be eliminated when the SSH port is closed or modified for daily operation and maintenance in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method and system for equipment port
  • Secure access method and system for equipment port

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Embodiment 1, obtain through the operation and maintenance server.

[0052]Set up an operation and maintenance server that both the device and the client can log in to, such as an operation and maintenance server or other management servers, to synchronize the unique identifier, time, and change cycle of the device. The specific process is as follows:

[0053] The device side reports the unique identification of the device side, the change cycle to the operation and maintenance server, and synchronizes the time;

[0054] The client accesses the operation and maintenance server to obtain the unique identifier of the device, the change cycle, and synchronize the time.

Embodiment 2

[0055] Embodiment 2, obtain by scanning the two-dimensional code or by manual input.

[0056] The operation and maintenance personnel need to know the specific rules in advance, input the unique identification and change cycle of the device to the client, and manually input the time to synchronize with the device. That is, when the operation and maintenance personnel know the unique identifier of the device, the port change period and other information, they can manually fill in the unique identifier, port change period, obtain the current time parameters locally on the client side, and generate the access port locally.

[0057] Preferably, the client of the present invention adopts the solution of Embodiment 1 to obtain the unique identifier, time, and change cycle of the device, which can effectively ensure the security of the port generation rules.

[0058] In an embodiment of the present invention, the port generation rules of the client and device are shown in the followi...

Embodiment 3

[0067] Embodiment 3, take the first line of Table 1 as an example.

[0068] From 16:00 to 17:00 on November 28, 2018, DATA1=1709; DATA2=31479; DATA3=3753; DATA4=27599, with 1709, 31479, 3753, and 275994 as the specific port sequence.

[0069] Then the device listens on four ports: 1709, 31479, 3753, and 275994.

[0070] The client needs to send TCP connection packets to ports 1709, 31479, 3753, and 27599 in sequence, and the connection packet time for each two ports can be set, for example, no more than 5 seconds is allowed. That is, after sending a TCP connection message to port 1709, it needs to send a TCP connection message to 31479 within 5 seconds, and so on.

[0071] The device judges that the client has initiated TCP connections to the 4 ports in sequence, and the sequence and interval of connections meet the preset rules, and then sends the firewall configuration rules to allow the client to access port 18470 on the device. After that, the client accesses 18470 to re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure access method and system for an equipment port. The method comprises: generating rules by an equipment side and a client side according to the same port, generating aneffective access port within a period of time on the basis of a unique identifier and time of the equipment side according to a preset change period, starting interception of port access at the port,changing the port according to a certain time period, and releasing or forbidding the client to access the access port generated by the equipment side according to a preset access rule. The securityaccess hidden danger of the equipment operation and maintenance port is solved, the operation and maintenance port changes randomly, the access of the operation and maintenance port needs to meet thepreset rule, the attack of hackers is avoided, new equipment does not need to be added, and the operation and maintenance security is effectively enhanced.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a method and system for securely accessing a device port. Background technique [0002] Video surveillance is an important part of the security system. Video surveillance is widely used in many occasions because of its intuition, accuracy, timeliness and rich information content. In recent years, with the rapid development of computer, network, image processing and transmission technology, the popularization trend of video surveillance has become more and more obvious. [0003] During the popularization of video surveillance, users pay more and more attention to the security protection of video surveillance systems. How to prevent the leakage of privacy caused by the outflow of video recordings is a concern of every user. [0004] A large part of the outflow of video recordings is caused by illegal users intruding into the system. Usually, the intruder will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1441H04L63/0876H04L63/08
Inventor 赵晖
Owner ZHEJIANG UNIVIEW TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products