Check patentability & draft patents in minutes with Patsnap Eureka AI!

Admission control method and device, computer equipment, medium and program product

A technology of admission control and terminal equipment, applied in computer parts, computing, character and pattern recognition, etc., can solve the problems of inability to realize admission control and single granularity.

Inactive Publication Date: 2020-09-04
奇安信网神信息技术(北京)股份有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the security policy standard has a large granularity or a single dimension, more precise access control cannot be achieved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Admission control method and device, computer equipment, medium and program product
  • Admission control method and device, computer equipment, medium and program product
  • Admission control method and device, computer equipment, medium and program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0023] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an admission control method, which is applied to an admission server and comprises the following steps: receiving a plurality of data packets from terminal equipment; and for each data packet in the plurality of data packets, determining feature information of the terminal equipment based on the data packet, and determining that the terminal equipment is in a suspicious state when it is determined that the feature information of the terminal equipment is not matched with a pre-constructed feature template of a predetermined application. Then, under the condition that itis determined that the holding duration of the terminal equipment in the suspicious state exceeds the preset duration, control information is sent to the terminal equipment, and the control information is used for indicating the terminal equipment to install and operate the preset application. The invention further provides an admission control device, computer equipment, a medium and a program product.

Description

technical field [0001] The present disclosure relates to an admission control method, device, computer equipment, medium and program product. Background technique [0002] Access control technology is used to prevent various hacking techniques from harming enterprise security. For example, with the help of Network Access Control (NAC) technology, authorized, legal, safe, and trustworthy terminal devices can be controlled to access the enterprise network, while unauthorized terminal devices are not allowed to access. [0003] In the access control scheme, a unified security policy standard is usually established in advance. When a terminal device sends a data packet, it detects the security status of the terminal device based on a pre-established security policy standard, and executes a corresponding disposal strategy according to the detection result. When the security policy standard has a large granularity or a single dimension, more precise access control cannot be achi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/10H04L63/101H04L63/102G06F18/22
Inventor 余盈宽施佳杰徐涛欧国华张巨世
Owner 奇安信网神信息技术(北京)股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More