Unlock instant, AI-driven research and patent intelligence for your innovation.

Network safety access control architecture and realizing method

An access control and network security technology, applied in the transmission system, electrical components, etc., can solve the problems of theft, cracking, and deception of user names and passwords

Inactive Publication Date: 2006-04-26
武蒙
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing network technologies usually only focus on information encryption above the transport layer in terms of security. However, in practical applications, many servers or nodes are still subject to various violations, such as: being implanted with Trojan horse programs to make some important users Theft of name and password, cracking the password of the management user of the server and invading the server, deception of various network layers, such as TCP pseudo-connection D.O.S based on ARP deception, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety access control architecture and realizing method
  • Network safety access control architecture and realizing method
  • Network safety access control architecture and realizing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The network system security access control method of the present invention will be described in detail below with reference to the accompanying drawings.

[0022] First, Node A and Node B register on the server side respectively, and obtain necessary data such as their node ID, encryption key and algorithm, and the security domain label of the network to which they belong. When arriving at node B, Data first forms a section of network layer data called packets through various steps above the network layer of node A, and then it is delivered to the 'upper-level adapter' of node A described in the present invention, and 'upper-level adapter' decomposes Data According to the number of the packet, the number of packets decomposed, the position of the original packet where the data segment is located, the length of the small segment and other information, the label of the data segment is combined and attached to the front of each small data segment. The addition of additiona...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security access control system structure, which comprises: composing receive and transmit nodes respectively by an upper adaptor, a bottom adaptor, a data processor, and encode / decode device; the transmission node treats the data packaged by network layer to send into transmission queue in data link layer; the receive node receives and treats data from data link layer to send to network layer, and controls the data security and access right by node label and system time. Based on cryptography calculation, this invention encodes data packet to make terminals of different groups invisible with each other and user need not input name and password by inner mechanism, and provides security guarantee to terminal communication.

Description

1. Technical field [0001] The invention relates to a computer application technology, in particular to a network security access control system structure and a realization method. 2. Background technology [0002] Existing network technologies usually only focus on information encryption above the transport layer in terms of security. However, in practical applications, many servers or nodes are still subject to various violations, such as: being implanted with Trojan horse programs to make some important users Name and secret value are stolen, cracking the password of the management user of the server and invading the server, deception of various network layers, such as TCP pseudo-connection D.O.S based on ARP spoofing, etc. Because of the uniqueness of 'node identification' expressed by the present invention, users using the present invention can automatically log in at the server end without inputting user names and passwords. The invention is based on safety, can effect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 武蒙
Owner 武蒙