Method and system for preventing equipment from being illegally used

A device and host device technology, applied in the computer field, can solve problems such as the inability of effective detection by disguised legitimate devices, and achieve the effect of preventing network intrusion

Pending Publication Date: 2021-03-12
深圳万物安全科技有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, through ACL to control the network communication of the device, it is impossible to effectively detect the illegal device masquerading and deceiving the legitimate device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing equipment from being illegally used
  • Method and system for preventing equipment from being illegally used
  • Method and system for preventing equipment from being illegally used

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0036] see figure 1 , figure 1 It is a schematic flowchart of an embodiment of a method for preventing fraudulent use of equipment in an embodiment of the present invention. The method for preventing fraudulent use of equipment includes the following steps:

[0037] Step S100: the host device sends an ARP request to all network devices, and receives and parses the ARP response of the device.

[0038] The host device constructs an ARP request and sends it to devices on the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for preventing equipment from being illegally used, and the method comprises the steps of: enabling host equipment to transmit an ARP request to whole-network equipment, and receiving and analyzing an ARP response of the equipment; obtaining survival equipment of the whole network according to the result of the ARP response; and enabling the host equipment to initiate a detection protocol to survival equipment of the whole network, receiving a detection response message, extracting equipment information from the response message, comparing the equipment information with information stored in a database, and judging whether to implement network blocking on the equipment or not according to a comparison result. According to the technical scheme provided by the embodiment of the invention, counterfeit detection can be carried out on all IP address devices, and network intrusion counterfeited through IP / MAC addresses is completely eradicated.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for preventing fraudulent use of equipment. Background technique [0002] At present, the secure access of dumb terminals (cameras, alarms, access control, printers, video conferencing, currency counters and other unattended terminals) mainly uses IP / MAC address binding on the switch to realize the network accuracy of dumb terminal devices. access control. The Windows or Linux operating system provides a method to modify the MAC address of the device, which can artificially modify the IP / MAC address of the device, bypass the IP / MAC binding authentication, and achieve the purpose of illegally accessing the network. [0003] At present, the commonly used method for device access perception is basically: for illegal device access, the ACL is mainly used to control its network communication. However, through ACL to control the network communication of devices,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0236H04L63/10H04L61/103H04L63/1408
Inventor 艾建明陈志伟
Owner 深圳万物安全科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products