Network asset identification method and device, medium and equipment

A network asset and identification method technology, applied in the field of network information security, can solve the problems of reducing company/enterprise network security, difficulty in network equipment asset management, and lack of dedicated management

Pending Publication Date: 2021-02-23
BEIJING GRIDSUM TECH CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above factors make it difficult to manage the network equipment assets of the company/enterprise. As time goes by, there will be a large number of unused, managed or unregistered or registered information inconsistent with the actual situation in the company/enterprise. main network asset
[0004] Due to the long-term lack of dedicated management of these unowned network assets, the unowned network assets connected to the external network can

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset identification method and device, medium and equipment
  • Network asset identification method and device, medium and equipment
  • Network asset identification method and device, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0038] figure 1 It is a schematic diagram of an implementation environment shown according to an exemplary embodiment. figure 1 A schematic diagram of a network of a company (Company1) is shown in , and the company includes three departments in total: an administrative department, a financial department, and a business department. The local area network (intranet) of the whole company is connected to the Internet (external network) Internet through router 100; , wherein the proxy server 102 is used to act as an agent for the external network access requirements of all network assets (equipment or hosts) in the whole company, and the Web server 103 is used to provide the personnel of the whole company to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network asset identification method and device, a medium and equipment. The network asset identification method comprises the following steps: acquiring an IP address list ofa target local area network; determining a survival host in the target local area network according to the IP address in the IP address list; performing full-port scanning on the survival host, and determining a survival port on the survival host; obtaining parameter information of the survival host, and obtaining parameter information of a corresponding survival port on the survival host; and adding the parameter information of the survival host and the parameter information of the survivalport on the survival host to a first network asset list corresponding to the target local area network.Through the first network asset list corresponding to the target local area network, network operation and maintenance personnel can conveniently manage the network assets in the target local area network.

Description

technical field [0001] The present application relates to the field of network information security, in particular to a method, device, medium and equipment for identifying network assets. Background technique [0002] With the rapid development of Internet technology, there are more and more types of network devices connected to the local area network of a company / enterprise, such as PCs, servers, routers, mobile phones, tablet computers, printers, etc. Company / enterprise intranet. These network devices will not only exchange visits with each other, but also many of these network devices will connect to the Internet and establish connections with external networks. Usually, the company / enterprise intranet restricts external access by establishing certain rules such as firewalls. [0003] With the business development of the company / enterprise, various business platforms and / or management systems will also increase, and the corresponding personnel mobility will also increa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/108H04L63/0236H04L63/1416
Inventor 邱成鹏
Owner BEIJING GRIDSUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products