Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe access method and system of network ports

A network port and secure access technology, applied in the field of information security software, can solve problems such as inconvenient access, inaccessibility, and inability to access TCP3389 port, etc., and achieve the effect of reducing network security risks and improving security

Inactive Publication Date: 2020-11-17
福建深空信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the network port is clearly restricted to only trusted IPs, or no one can access it, then legitimate users can only access it when the IP meets the conditions and is trusted, or they cannot access it at all, which will bring inconvenience to access
[0005] For example, if an administrator restricts the TCP port 3389 of a certain device to be accessed only by its own IP address 1.2.3.4, then when the administrator's IP changes (such as rerouting to the Internet, IP reassignment), the administrator cannot access The device's TCP port 3389 has

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access method and system of network ports

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The technical solution of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0022] The invention provides a method for securely accessing a network port, comprising the following steps:

[0023] Step S1, providing server H and intermediary system M;

[0024] Step S2, a network filter driver is installed on the server H to protect the specified network port on the server H, the network filter driver refuses any IP access to these protected network ports by default, only when the middleman system M When a notification is sent, the network filter driver temporarily allows the IP required by the notification to access the network port required by the notification;

[0025] Step S3, the administrator A visits the intermediary system M, and requests the intermediary system M to send a notice to the network filter driver on the server H to temporarily allow the corresponding IP address of the administrator A to access ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safe access method and system of network ports. On one hand, a network filtering driver is installed on a server H and used for protecting specified ports on the server, andany IP is refused to access the protected ports under the default condition, so that the unauthorized IP cannot access the protected ports, and the network security risk is reduced; and on the otherhand, a port to be accessed by a trusted IP submitted by an administrator A is transmitted to the network filtering driver on the server H through a man-in-the-middle system M, and then the network filtering driver temporarily permits the specified trusted IP to access the protected network port x for y seconds, so that normal legal user access is not blocked and is not limited by the IP change ofthe administrator A: when the IP of the administrator A changes, the administrator A can access the network port x of the server H as long as accessing the man-in-the-middle system M again. Accordingto the invention, the security of network port access and the convenience of legal user access are improved.

Description

technical field [0001] The invention belongs to the field of information security software, and in particular relates to a method and system for securely accessing network ports. Background technique [0002] A network port is used to identify the connection endpoints between two communication devices. In order to prevent unauthorized access, in general, the network port can be clearly restricted to only trusted IPs, or no one can access it. [0003] There is following shortcoming in prior art: [0004] If the network port is clearly restricted to only trusted IPs, or no one can access it, then legitimate users can only access it when the IP meets the conditions and is trusted, or they cannot access it at all, which will cause inconvenience in accessing. [0005] For example, if an administrator restricts the TCP port 3389 of a certain device to be accessed only by its own IP address 1.2.3.4, then when the administrator's IP changes (such as rerouting to the Internet, IP r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0884H04L63/10
Inventor 陈道恭
Owner 福建深空信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products