Network safety access control architecture and realizing method
An access control and network security technology, applied in the transmission system, electrical components, etc., can solve the problems of theft, cracking, and deception of user names and passwords
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The network system security access control method of the present invention will be described in detail below with reference to the accompanying drawings.
[0022] First, Node A and Node B register on the server side respectively, and obtain necessary data such as their node ID, encryption key and algorithm, and the security domain label of the network to which they belong. When arriving at node B, Data first forms a section of network layer data called packets through various steps above the network layer of node A, and then it is delivered to the 'upper-level adapter' of node A described in the present invention, and 'upper-level adapter' decomposes Data According to the number of the packet, the number of packets decomposed, the position of the original packet where the data segment is located, the length of the small segment and other information, the label of the data segment is combined and attached to the front of each small data segment. The addition of additiona...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


