A reverse access control system and method

An access control and reverse technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve the problem that network access control technology cannot prevent computer terminals from accessing other networks, and cannot prevent unauthorized devices from connecting to networks. Addressing technology cannot prevent and other problems to achieve the effect of protecting security

Active Publication Date: 2022-07-05
中国航天系统科学与工程研究院
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) None of the above technologies can prevent computer terminals in the authorized network from connecting to unauthorized devices through network interfaces;
[0006] (2) Network access control technology cannot prevent computer terminals in the authorized network from accessing other networks;
[0007] (3) Use network addressing technology to block network connections. If the fixed network address is leaked and the user actively blocks the connection between the computer terminal and the network address, this technology cannot block the connection between the computer terminal and the Internet;
[0008] (4) Network addressing technology cannot prevent devices in the authorized network from accessing other networks that are not connected to the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A reverse access control system and method
  • A reverse access control system and method
  • A reverse access control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] A reverse access control method, the steps are as follows, such as image 3 shown,

[0091] S1. According to the type of the application server operating system, the application server installs a server-side system;

[0092] S2, the client registration unit extracts the server CPU serial number, generates the server unique ID by encoding, and injects the server unique ID into the installation program of the client system to complete the client system registration;

[0093]S3, the computer terminal installs the client system containing the unique ID of the server, so that the computer terminal becomes the computer terminal in the authorized network;

[0094] S4, the interruption strategy setting unit sets an interruption strategy, and sends interruption strategy information to the interruption strategy receiving and pushing unit;

[0095] The interruption strategy includes the strategy of successful and failed legality verification; if the legality verification is succ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a reverse access control method. S1. According to the type of the application server operating system, the application server installs a server-side system; S2. The client registration unit extracts the server CPU serial number, and injects the unique ID of the server into the client system to complete the process. Client system registration; S3, make the computer terminal become the computer terminal in the authorized network; S4, the interruption policy setting unit sets the interruption policy, and sends interruption policy information to the interruption policy receiving and pushing unit; S5, pushes it to the client interruption A policy receiving unit; S6, the client interruption policy receiving unit receives the interruption policy information; S7, the client daemon process module performs validity verification. The invention verifies the client daemon process module installed in the computer terminal and the server that is not easy to forge, and prevents the computer terminal in the authorized network from connecting to the external information equipment or the network without authorization through the network interface.

Description

technical field [0001] The present invention relates to the technical field of computer terminal information security in a network, in particular to a reverse access control system and method. Background technique [0002] With the vigorous development of information technology, governments and enterprises are increasingly relying on information systems to handle various tasks. In order to ensure the information security of their units, some governments and enterprises have established local area networks that physically isolate their units from the outside world to prevent internal information systems. Internal information leakage of the unit. However, due to environmental, human and other factors, the information in the authorized network may be transferred to the external network through abnormal network channels, thereby causing great losses to the government or enterprises. [0003] In order to avoid the occurrence of the above situation, the unit generally adopts the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/08H04L63/0876H04L63/20
Inventor 薛惠锋张文涛杨海杨轩韩磊郭莉丽边悦
Owner 中国航天系统科学与工程研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products