Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Conflict detection system and method based on classified access control list

An access control list and conflict detection technology, which is applied in the field of network communication security, can solve problems such as failure of access control rules and affecting normal forwarding of messages, and achieve the effects of improving efficiency, reducing calculations, and ensuring network security

Active Publication Date: 2021-06-01
深圳市满星技术产业有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]Facing the current complex network environment, network devices are interconnected, and it is meaningless to simply detect the conflict of the internal access control list of a single network device. Because the conflict of access control lists between devices will invalidate some access control rules, thus affecting the normal forwarding of packets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Conflict detection system and method based on classified access control list
  • Conflict detection system and method based on classified access control list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0042] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] Such as figure 1 As shown, a classification-based access control list conflict detection system includes an access control analysis device and several network devices, and the access control analysis device is respectively connected to several network devices;

[0044] The access control ana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a conflict detection system based on a classified access control list, and a method based on the system comprises the following steps: collecting a network topology structure in real time, and modeling and storing the network topology structure; setting a critical path, collecting network equipment access control strategy information on the critical path in the network topology structure in real time, and analyzing the access control strategy information; classifying the analyzed access control strategy information to obtain an access control strategy information table which may have conflicts; and performing conflict detection on the access control strategy information table which may have conflicts to obtain a conflict detection result. According to the method, the access control list information of critical path related equipment in a management area specified by a user can be collected, the access control list information is analyzed and stored according to a specified structure, and conflict detection is carried out on an access control strategy.

Description

technical field [0001] The invention belongs to the field of network communication security, and in particular relates to a classification-based access control list conflict detection system and method. Background technique [0002] In the information age with the increasing development of network technology, the network has become an important part of people's life and work. As the scale of the network continues to expand, security issues such as illegal attacks, information leakage, and virus intrusion are prone to occur. Once these security issues occur, they may cause huge losses to us. Therefore, network security issues are becoming more and more important. Access control lists filter network traffic by controlling whether packets are forwarded or blocked on the router's interfaces. The router examines each packet and decides whether to forward or discard the packet based on the rules specified in the access list. Access control lists can provide a basic level of sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1408H04L63/0236H04L63/20
Inventor 詹晋川陈江婷张理阳张淼王箭
Owner 深圳市满星技术产业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products