A security access method and system for a device port

A security access and device port technology, applied in the field of network security, can solve problems such as the inability to eliminate security risks, and achieve the effect of avoiding attacks and strengthening operation and maintenance security.

Active Publication Date: 2022-07-19
ZHEJIANG UNIVIEW TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a method and system for securely accessing device ports, which overcomes the problem that hidden dangers of safety cannot be eliminated when the SSH port is closed or modified for daily operation and maintenance in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security access method and system for a device port
  • A security access method and system for a device port

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Embodiment 1. Obtain through the operation and maintenance server.

[0052]Set up an operation and maintenance server that both the device and the client can log in, such as an operation and maintenance server or other management server, to synchronize the unique identifier, time, and change cycle of the device. The specific process is as follows:

[0053] The device side reports the unique identifier and change cycle of the device side to the operation and maintenance server, and synchronizes the time;

[0054] The client accesses the operation and maintenance server, obtains the unique identifier of the device, the change cycle, and synchronizes the time.

Embodiment 2

[0055] Embodiment 2. Obtained by scanning a two-dimensional code or by manual input.

[0056] The operation and maintenance personnel need to know the specific rules in advance, input the unique identification and change cycle of the device to the client, and manually enter the time to synchronize with the device. That is, when the operation and maintenance personnel know the information such as the unique identifier of the device and the port change period, they can manually fill in the unique identifier, port change period, obtain the current time parameters locally, and generate the access port locally on the client side.

[0057] Preferably, the client of the present invention adopts the solution of Embodiment 1 to obtain the unique identifier, time, and change period of the device, which can effectively ensure the security of the port generation rule.

[0058] In an embodiment of the present invention, the port generation rules for the client and the device are shown in t...

Embodiment 3

[0067] Example 3, taking the first row of Table 1 as an example.

[0068] From 16:00 to 17:00 on November 28, 2018, DATA1=1709; DATA2=31479; DATA3=3753; DATA4=27599, with 1709, 31479, 3753, 275994 as the specific port sequence.

[0069] Then the device listens on four ports: 1709, 31479, 3753, and 275994.

[0070] The client needs to send TCP connection packets to the four ports 1709, 31479, 3753, and 27599 in sequence, and the connection packet time of each two ports can be set, for example, it is not allowed to exceed 5 seconds. That is, after sending a TCP connection packet to port 1709, a TCP connection packet needs to be sent to 31479 within 5 seconds, and so on.

[0071] The device determines that the client has initiated a TCP connection to the four ports in turn, and the connection sequence and connection interval meet the preset rules, and then issues firewall configuration rules to release the client's access to port 18470 on the device. After that, the client acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security access method and system for a device port. According to the same port generation rule and a preset change cycle, the device terminal and the client terminal are based on the unique identification and time of the device terminal to generate a valid for a period of time. Access the port, start the port access listening on the port, change the port in a certain period of time, and release or prohibit the client from accessing the access port generated by the device according to the preset access rules. The invention solves the security access hidden danger of the equipment operation and maintenance port, the operation and maintenance port changes randomly, the access of the operation and maintenance port needs to meet the preset rules, avoids the attack of hackers, and effectively strengthens the operation and maintenance security without adding new equipment.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a security access method and system for a device port. Background technique [0002] Video surveillance is an important part of the security system. Video surveillance is widely used in many occasions because of its intuitive, accurate, timely and rich information content. In recent years, with the rapid development of computer, network and image processing and transmission technology, the popularization trend of video surveillance has become more and more obvious. [0003] In the popularization of video surveillance, users pay more and more attention to the security protection of video surveillance systems. How to prevent the leakage of privacy caused by the outflow of video recordings is a problem that every user is concerned about. [0004] A large part of the outflow of video recordings is caused by illegal users intruding into the system. Usually, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/1441H04L63/0876H04L63/08
Inventor 赵晖
Owner ZHEJIANG UNIVIEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products