Method of controlling network access and its system

A network access and control method technology, applied in the field of endpoint security access control, can solve problems such as access control of endpoints that cannot be accessed, and achieve the effects of reducing maintenance costs, ensuring identity legitimacy, and ensuring security

Active Publication Date: 2006-03-29
NEW H3C TECH CO LTD
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to provide a network access control method to overcome the inability to perform mandatory user identity authentication for non-http / https protocol access under the existing Web authentication method, and the 802.1x authentication method requires a specific client, and cannot be accessed according to the access method. The shortcomings of access control for access endpoints based on the security status of the terminals, simple and safe implementation of access control for user endpoints, to ensure the identity of users accessing the network and the security of terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of controlling network access and its system
  • Method of controlling network access and its system
  • Method of controlling network access and its system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The core of the present invention is to integrate the advantages of traditional Portal / Web authentication and client authentication, and use the extended Portal protocol to perform mandatory user identity authentication for non-http / https protocol access under the Web authentication mode. For users who only access the Internet through Web authentication, control their access rights so that they can only access the isolated area of ​​the user network, that is to say, only allow the user to access restricted network resources, such as domain name servers, patch servers, virus servers, etc.; Provide users with the download link of the security client through the web page; and check the security status of the user terminal through the security client. The user terminal performs operations such as virus database repair and patch installation; mandatory security authentication is performed for user non-http / https protocol access, so that users who pass the security authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a network access control method and a system including: limiting the access extent of authority to users on-line by the web certification of a portal server to limit it to access the limited network resources only, a user downloads the safety UE by the Web, when the user accesses the protected network resources, the safety UE is used to certificate the safety of the UE and users passing through the safety certification access the protected network resources freely. The system includes: network access devices connected by network, a portal server and an AAA server.

Description

technical field [0001] The invention relates to network access control technology, in particular to an endpoint security access control method and system. Background technique [0002] With the rapid development of network application technology, network information security issues have become increasingly prominent. Ensuring the security of user terminals, preventing threats from invading the network, and effectively controlling user network access behaviors are the prerequisites for ensuring the safe operation of enterprise networks, and they are also urgent problems to be solved in enterprise network security management. [0003] At present, as an important technology and management method to solve network security problems, network access authentication technology is also rapidly popularized. Traditional user network access authentication methods mainly include 802.1x (port-based access control protocol) authentication, PPPoE (point-to-point protocol over Ethernet) auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/22
Inventor 郭晓征韦晓山
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products