Unlock instant, AI-driven research and patent intelligence for your innovation.

Reverse access control system and method

An access control and reverse technology, applied in the direction of transmission systems, electrical components, etc., can solve the problem that network access control technology cannot prevent computer terminals from accessing other networks, cannot prevent the connection of unauthorized devices, and cannot block computer terminal connections and other issues to achieve the effect of protecting safety

Active Publication Date: 2020-08-18
中国航天系统科学与工程研究院
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) None of the above technologies can prevent computer terminals in the authorized network from connecting to unauthorized devices through network interfaces;
[0006] (2) Network access control technology cannot prevent computer terminals in the authorized network from accessing other networks;
[0007] (3) Use network addressing technology to block network connections. If the fixed network address is leaked and the user actively blocks the connection between the computer terminal and the network address, this technology cannot block the connection between the computer terminal and the Internet;
[0008] (4) Network addressing technology cannot prevent devices in the authorized network from accessing other networks that are not connected to the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reverse access control system and method
  • Reverse access control system and method
  • Reverse access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] A reverse access control method, the steps are as follows, as image 3 as shown,

[0091] S1. According to the type of the operating system of the application server, the application server installs a server-side system;

[0092] S2, the client registration unit extracts the server CPU serial number, generates the unique ID of the server through encoding, and injects the unique ID of the server into the installation program of the client system to complete the registration of the client system;

[0093]S3. The computer terminal is installed with a client system containing the unique ID of the server, so that the computer terminal becomes a computer terminal in the authorized network;

[0094] S4. The interruption strategy setting unit sets the interruption strategy, and sends the interruption strategy information to the interruption strategy receiving and pushing unit;

[0095] The interruption strategy includes the strategy of legality verification success and legali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a reverse access control method, which comprises the following steps that S1: according to the type of an operating system of an application server, the application server installs a server-side system; S2, a client registration unit extracts a server CPU serial number, and injects a server unique ID into a client system to complete client system registration; S3, a computer terminal becomes a computer terminal in an authorized network; S4, an interrupt strategy setting unit sets an interrupt strategy, and sends interrupt strategy information to an interrupt strategy receiving and pushing unit; S5, the interrupt strategy is pushed to a client interrupt strategy receiving unit; S6, the client interrupt strategy receiving unit receives the interrupt strategy information; and S7, the client daemon process module performs legality verification. Verification is carried out through the client daemon process module installed in the computer terminal and the server which is not easy to forge, and the computer terminal in the authorized network is prevented from being connected to external information equipment or the network in an unauthorized mode through the network interface.

Description

technical field [0001] The invention relates to the technical field of computer terminal information security in a network, in particular to a reverse access control system and method. Background technique [0002] With the vigorous development of information technology, governments and enterprises rely more and more on information systems to handle various tasks. In order to ensure the information security of their units, some governments and enterprises have established LANs that are physically isolated from the outside world to prevent internal information systems. Information leakage within the unit. However, due to environmental, human and other factors, the information in the authorized network may be transferred to the external network through abnormal network channels, thereby causing great losses to the government or enterprises. [0003] In order to avoid the occurrence of the above situation, units generally adopt access control technology to control the network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04L63/20
Inventor 薛惠锋张文涛杨海杨轩韩磊郭莉丽边悦
Owner 中国航天系统科学与工程研究院