Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for improving security of server by adopting IP strategy packet

A server and security technology, applied in the server field, can solve problems such as inability to access authorization, and achieve the effect of low cost, powerful function and high performance

Inactive Publication Date: 2021-03-30
深圳深度探测科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The purpose of the present invention is to provide a method of using IP policy package to improve server security, which overcomes the problem that the device can be authorized, but the access cannot be authorized, and the unauthorized access is shielded to the greatest extent, and the Trojan horse and malicious login are reduced. And other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving security of server by adopting IP strategy packet
  • Method for improving security of server by adopting IP strategy packet
  • Method for improving security of server by adopting IP strategy packet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a particular order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for improving the security of a server by adopting an IP strategy packet, which comprises the following steps of: S010, allocating a number to a client, and respectively registering an ID (Identity) and a secret key in the client and a trusted authorization system; S020, mutually recognizing the client and the trusted authorization system based on a protocol; S030,enabling the client to perform authentication, and if the authentication is passed, enabling the trusted authorization system to take the IP address of the client as a parameter, filling an IP strategy packet and sending the IP strategy packet to a corresponding server; S040, analyzing and processing the IP strategy packet by a preposed IP filter of the server, and recording the IP address of thelegal client; and S050, if the authentication of the client and the trusted authorization system is normal, enabling the IP packet from the client to communicate with the server. According to the method, remote unauthorized access and unauthorized internet surfing of the server are shielded to the maximum extent, and the problems of random connection of an internal Trojan horse program to an external network, remote malicious attacks, connection and the like are reduced.

Description

technical field [0001] The invention relates to the technical field of servers, in particular to a method for improving server security by using IP policy packets. Background technique [0002] With the evolution of the market and the advancement of technology, the security requirements of the system are getting higher and higher. However, the server often needs to respond to a request from an unknown IP address, and there may be a Trojan horse program that has been put in for a long time on the server. How to achieve high security while ensuring the convenience of remote access is a difficult problem. [0003] In order to save trouble, it is usually left to its own devices, otherwise, the firewall must be temporarily modified and configured manually. Firewalls don't necessarily work sometimes. For example, the Trojan horse program located on the server is difficult to find, but it can access the external network at will, and the security problem of the system is very ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0236
Inventor 王志东王志晓
Owner 深圳深度探测科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products