Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network resource access control method based on identity authentication and data packet filtering technology

A technology of identity authentication and network resources, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of unfavorable fine-grained access control of network resources, inability to prevent illegal access control of network resources, illegal use of network resources, etc. To achieve the effect of preventing illegal access behavior

Pending Publication Date: 2022-01-21
BEIJING INST OF COMP TECH & APPL
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is how to provide a network resource access control method based on identity authentication and data packet filtering technology, so as to solve the problem that the existing access control has the risk of illegal use of network resources and cannot prevent network resources in the internal network. Illegal access control, not conducive to fine-grained access control of network resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network resource access control method based on identity authentication and data packet filtering technology
  • Network resource access control method based on identity authentication and data packet filtering technology
  • Network resource access control method based on identity authentication and data packet filtering technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, content and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0051] The purpose of the present invention is to propose a network resource access control method based on identity authentication and data packet filtering technology. Aiming at the above-mentioned problems in the prior art, the request for accessing network resources is combined with the user identity to achieve fine-grained Network resource access, and effective post-event audit analysis.

[0052] The basic principle of the present invention is to filter network access requests at the network resource access request initiator (client) and network resource access receiver (server), intercept the network request initiated by the user on the client, and require the user to complete identity authentication After the aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network resource access control method based on an identity authentication and data packet filtering technology, and belongs to the field of computer networks. A network request initiated by a user is intercepted on a client, the user is required to complete identity authentication, and after the authentication is successful, the client forwards user identity information and an access request to a server; and the server intercepts the network request, verifies whether the request passes the identity authentication, and permits the user to access the specified network resource if the request passes the identity authentication. A layer is inserted into the Socket through an SPI programming interface provided by Windows Sockets, network data packets are filtered, and the purpose of filtering network connection requests is achieved; in combination with a third-party identity authentication system, functions of identity authentication and the like are realized through an interface provided by the third-party identity authentication system. According to the invention, identity authentication and fine-grained network resource access control can be realized quickly at low cost, and the method can be quickly adapted to third-party identity authentication to meet identity authentication requirements in different scenes.

Description

technical field [0001] The invention belongs to the field of computer networks, and in particular relates to a network resource access control method based on identity authentication and data packet filtering technology. Background technique [0002] With the development of information technology, information has become an important asset of organizations. The protection of information assets is getting more and more attention, especially with the rapid development of network technology today, most organizations will complete operations such as data interaction through the network, and information becomes network resources. The risk of illegal access and use, how to implement network resource access control has become an urgent need. [0003] At present, the main network access control method is based on the policy configuration of routers, switches, firewalls and other devices, which can achieve the purpose and function of access control to a certain extent. However, thes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/08H04L63/0227
Inventor 王润高任艳慧祝连海李景郑煦汪嫱张智慧
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products