Reverse access control system and method
An access control and reverse technology, applied in the direction of transmission systems, electrical components, etc., can solve the problem that network access control technology cannot prevent computer terminals from accessing other networks, cannot prevent the connection of unauthorized devices, and cannot block computer terminal connections and other issues to achieve the effect of protecting safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0090] A reverse access control method, the steps are as follows, as image 3 as shown,
[0091] S1. According to the type of the operating system of the application server, the application server installs a server-side system;
[0092] S2, the client registration unit extracts the server CPU serial number, generates the unique ID of the server through encoding, and injects the unique ID of the server into the installation program of the client system to complete the registration of the client system;
[0093]S3. The computer terminal is installed with a client system containing the unique ID of the server, so that the computer terminal becomes a computer terminal in the authorized network;
[0094] S4. The interruption strategy setting unit sets the interruption strategy, and sends the interruption strategy information to the interruption strategy receiving and pushing unit;
[0095] The interruption strategy includes the strategy of legality verification success and legali...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


