A method for detecting Internet-connected devices accessing intranets

A technology of Internet equipment and detection methods, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as lack of detection and forensics, and achieve the effect of good user experience, low cost, and highly reliable detection

Active Publication Date: 2021-12-17
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is still a lack of effective and systematic technical means to detect and collect evidence for illegal outreach behaviors, as well as the backtracking, tracking and responsibility determination of security incidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for detecting Internet-connected devices accessing intranets
  • A method for detecting Internet-connected devices accessing intranets
  • A method for detecting Internet-connected devices accessing intranets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method for accessing an intranet by a device connected to the Internet, comprising: using a random number generator to generate a detection random number and a verification random number; The terminal uses the detection message and the reply message to detect all network devices with DHCP service enabled, and generates a list of detection results; constructs an Internet communication verification message based on the verification random number and the TCP / IP protocol, and the intranet terminal passes the The network device sends an Internet communication verification message to the forensic server for communication verification. The method of the present invention does not cause the actual external connection of the intranet terminal, has higher security and reliability, lower cost, and better user experience, thereby realizing highly reliable detection of Internet-connected devices accessing the intranet.

Description

technical field [0001] The invention relates to the technical field of intranet security, in particular to a method for detecting access of an Internet-connected device to an intranet. Background technique [0002] Intranet security covers multiple aspects, such as data leakage prevention, terminal security, and network security. Enterprise intranets are facing various threats all the time, and illegal outreach is one of them. For the detection of illegal outreach on the internal network, enterprises generally deploy terminal security products. Once an internal terminal illegally accesses the Internet, this type of product immediately blocks the terminal and prohibits access to the external network to ensure internal network security. At the same time, enterprise organizations will also adopt a variety of security protection methods (such as firewalls, gatekeepers, security gateways, middle machines, etc.) to ensure the physical independence of the internal network. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/26
CPCH04L63/126H04L43/12H04L61/5014
Inventor 卿昱黄云婷刘飞伍荣王邦礼倪琛孙皓彭正冲阎松孙远清
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products