Access control method and device for terminal equipment

A terminal equipment and access control technology, applied in the network field, can solve the problems of difficult detection of terminal equipment with malicious connection requests, lack of access control methods, access control, etc.

Active Publication Date: 2021-06-15
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a terminal device access control method and device for the above-mentioned deficiencies of the prior art, to solve the problems in the prior art due to the large number of terminal devices connected to the communication network and the difficulty of connecting devices. Sparseness makes it difficult to detect terminal devices with malicious connection requests, and lacks an effective access control method to control the access of devices with connection requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device for terminal equipment
  • Access control method and device for terminal equipment
  • Access control method and device for terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides an access control method for terminal equipment, which is applied to nodes in a blockchain network, such as figure 1 As shown, the method includes:

[0057] Step S102: Determine whether the terminal device is a new device according to the connection request of the terminal device.

[0058] It should be noted that the terminal device access control method provided in this embodiment is applied to a node in the blockchain network. The node can be a fog computing node, a cloud node, or an edge computing node, etc., preferably a fog computing node. Computing nodes. This embodiment takes fog computing nodes as an example. Each fog computing node is connected through a blockchain network to form a fog computing network. Any node in the fog computing network can receive a connection request from a terminal device, and the terminal device also Can pass WiFi (Wireless-Fidelity, wireless connection), ZigBee (also known as Zigbee, is a wireless network pr...

Embodiment 2

[0111] Such as figure 2 As shown, this embodiment provides an access control device for terminal equipment, which is set on a node in a blockchain network, and the device includes:

[0112] The first judging module 21 is used to judge whether the terminal device is a new device according to the connection request of the terminal device;

[0113] The first acquiring module 22 is connected with the first judging module 21, and is used to acquire the prestored access denial times of the terminal equipment when the judging result of the first judging module 21 is no;

[0114] The second judging module 23 is connected with the first acquiring module 22, and is used to judge whether the number of rejected access times is within the preset first threshold range, and if not, reject the access of the terminal device;

[0115] The second acquisition module 24 is connected to the second judgment module 23, and is used to calculate the authentication trust degree of the current connecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method and device for terminal equipment. The method comprises the following steps: judging whether the terminal equipment is new equipment or not according to a connection request of the terminal equipment; if not, obtaining a pre-stored access rejection frequency of the terminal equipment; judging whether the number of times of refusing to access is within a preset first threshold range, and if not, refusing to access the terminal equipment; if yes, calculating the authentication credibility of the current connection of the terminal equipment based on a pre-created authentication credibility model; and if the authentication credibility is within a preset second threshold range, allowing the terminal equipment to access, otherwise, refusing the terminal equipment to access. The method and the device can solve the problems that in the prior art, due to the fact that the number of terminal devices connected with a communication network is large and the sparsity of the connected devices is large, detection of the terminal devices with malicious connection requests is difficult, and an effective access control method is lacked to conduct access control on the devices with the connection requests.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a terminal equipment access control method and device. Background technique [0002] In a communication network, network nodes usually need to connect a large number of terminal devices, and terminal devices often join or leave the communication network dynamically. When a new terminal device connects (or leaves) the communication network, the network node needs to ensure that the registered terminal Uninterrupted service to devices also requires limiting or denying service requests from malicious or compromised end devices. Once a malicious terminal accesses the communication network, it may endanger the security of the connected network nodes or even the entire communication network. [0003] However, due to the large number of terminal devices connected to the communication network and the sparseness of connected devices, it is difficult to detect terminal devices wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/101H04L63/0428H04L41/145H04L41/147
Inventor 曹咪徐雷陶冶智晓欢刘伟边林
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products