Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting network nonlicet nodes by adjacent supervise

A technology for adjacent nodes and monitoring networks, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problem of lack of detection mechanism for illegal node access, and achieve the effect of reducing harm

Inactive Publication Date: 2007-03-07
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0024] The private networks of various industries have taken a lot of measures to prevent illegal access, but there is no effective detection mechanism for the access of illegal nodes. The present invention provides a technical solution to the harm of this model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting network nonlicet nodes by adjacent supervise
  • Method for detecting network nonlicet nodes by adjacent supervise
  • Method for detecting network nonlicet nodes by adjacent supervise

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] There are many uncertain factors in the discrete state, and its prevention needs to be considered carefully. At the same time, effective methods are needed to detect the existence of illegal nodes and issue warnings in time. The authentication of legitimate nodes uses public key\private key pairs to authenticate with the authentication server. The daily file operation key needs to be changed constantly, but it must be able to decrypt previously encrypted files. Timestamps can be used as encryption and decryption seeds. The storage time of each file is used as a time stamp, and the operation key of each time stamp is stored in the management server. For the detection of illegal nodes, the multi-level authentication structure shown in Figure 2 can be used.

[0050] The host computer m communicates with n, and the computer m carries the access password assigned by the proxy server that allows it to access the network segment of the host computer. Every time it passes throu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention belongs to computer safety field, which is used to test network illegal points and uses adjacent points to test mechanism of network identification servo and internet computer legal property to improve traditional mode passive identification to send requirement data not reliable for monitoring service test.

Description

Technical field [0001] The invention belongs to the field of computer security and is used for detecting illegal nodes on the network. Background technique [0002] Illegal nodes on the network refer to computer nodes with illegal outreach and illegal access, collectively referred to as illegal nodes. Usually the LAN of each unit has a unified exit, that is, the gateway is connected to the Internet, and a firewall is set up, so that the security of LAN users accessing the Internet through the gateway is improved, or some units with higher security requirements have their LANs closed at all. , Internet connection is not allowed. But from another point of view, security is at the cost of restrictions. In order to achieve a certain purpose, LAN users use other methods to illegally access the Internet. The risk of this connection is that the host is exposed to both the internal network and the external network. At present, there are many security products to detect illegal acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
Inventor 陶然李志勇张昊杜华
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products