Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

30 results about "Network Access Protection" patented technology

Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer, based on its health. With NAP, system administrators of an organization can define policies for system health requirements. Examples of system health requirements are whether the computer has the most recent operating system updates installed, whether the computer has the latest version of the anti-virus software signature, or whether the computer has a host-based firewall installed and enabled. Computers with a NAP client will have their health status evaluated upon establishing a network connection. NAP can restrict or deny network access to the computers that are not in compliance with the defined health requirements.

Trusted network access and access control system and method

The invention discloses a trusted network access and access control system. The control system comprises a network access requester, a network access decision-maker and a network access controller. When the network access requester accesses to the network, platform identity authentication is carried out, and secure and trusted states of the requester are detected; the secure and trusted states are sent to the network access decision-maker, and the decision-maker judges the secure and trust level of the requester and gives a network access decision; the network access decision is sent to the network access controller, and the controller limits the requested network access. The invention further discloses a trusted network access and access control method. The control system carries out the platform identity authentication on the basis of TCM and ensures the network access control while avoids identity forging. Network areas are divided on the basis of a digital label technology and dynamically updated, network self-adaption is realized, and the access security of different logical areas is ensured. Secure and trusted strategies are configured, and combined with the TCM cryptographic algorithm, so that the security and credibility of the platform state of the requester are ensured.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD

Trusted network access method and system for mobile terminal

The invention discloses a trusted network access method and a trusted network access system for a mobile terminal, and belongs to the technical field of trusted network access. The method comprises the following steps that: 1) the mobile terminal loads an integrity measurement collector and detects the integrity of the integrity measurement collector, and a policy decision point loads an integrity measurement verifier and detects the integrity of the integrity measurement verifier; 2) the mobile terminal transmits a network access request to a policy enforcement point; 3) after receiving the network access request, the policy enforcement point transmits a network access judgment request to the policy decision point, and authenticates the user identity of the mobile terminal; 4) after the user identity passes authentication, platform identity authentication is performed between the policy decision point and the mobile terminal, the policy decision point and the mobile terminal mutually authenticate system integrity, and a platform trust relationship between the policy decision point and the mobile terminal is established; and 7) the policy decision point transmits a suggestion indicating whether to access the policy enforcement point according to the platform trust relationship, and the policy enforcement point authorizes network access permission to the mobile terminal according to the suggestion. By the method and the system, network resources can be well protected.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Download method and system based on home gateway, and home gateway

ActiveCN102916907AAffect normal network access businessAffect network access businessNetwork connectionsNetwork Access DeviceNetwork Access Protection
The invention provides a download method and a download system based on a home gateway, and the home gateway, and the home gateway, wherein the method comprises the following steps: a download request message, including the document address and the document name of at least one document to be downloaded, sent by a user terminal is received by the home gateway; if the downlink data in the network access process does not appear within the preset time of a first downlink channel used for performing the network access, the document corresponding to the document address and the document name is downloaded through the first downlink channel, and the downloading of the document is stopped until the downlink data occur on the first downlink channel. Through the download method and the download system based on the home gateway, and the home gateway provided by the invention, the document can be downloaded through the home gateway when the user terminal does not perform the network access, thereby the network bandwidth is more fully and reasonably utilized, the download in the prior art when the user terminal performs the network access is avoided; and the occupation of a large quantity of bandwidths can influence the normal network access business of a user.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

A two-way network access authentication method based on digital certificate

The invention relates to the technical field of network security. The invention discloses a two-way network access authentication method based on a digital certificate, which specifically includes the following steps: Step 1: Divide the network access authentication system into an access area and a trusted area, and classify the client to be authenticated. The terminal accesses the physical port of the trusted client; Step 2. After receiving the access information of the client to be authenticated, the authentication server actively initiates network access authentication to the client to be authenticated; Step 3. After the client to be authenticated receives the network access authentication, Submit the device authentication information to the authentication server, the authentication server starts authentication after receiving the authentication information, and feeds back the authentication result to the client to be authenticated. By physically connecting the client to be authenticated and the trusted client, the authentication server actively initiates network access authentication to the client to be authenticated after receiving the access information, so as to realize network access identity authentication of routing devices, switching devices, security protection devices, etc. , which improves the security and practicability of the network.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Video acquisition security processing system and method based on zero trust mechanism

InactiveCN112804215AEffective reinforcement methodEnhance the ability to resist Trojan virus invasionClosed circuit television systemsTransmissionNetwork Access ProtectionEmbedded system
The invention provides a video acquisition security processing system and method based on a zero-trust mechanism, and the system comprises a monitoring front-end equipment trusted operation control unit which is disposed in a network camera operation system, and is used for monitoring the program process and key file data of front-end equipment, providing a network access protection mechanism, detecting and blocking the operation of the unauthorized program on the monitoring front-end equipment; the monitoring front-end equipment access authentication and signaling security protection unit is used for completing identity authentication between the front-end equipment and the security management platform through a preset security protocol and carrying out polling inspection on the front-end equipment; and the audio and video data security protection unit is used for controlling the network camera to collect the audio and the video, encoding the audio and the video through a preset encryption algorithm, encrypting and sending the audio and the video, and decrypting the audio and the video at the audio and video viewing end. According to the invention, the control security, the service signaling security and the audio and video data security of the front-end camera are effectively improved, so that the data security of each link of video acquisition is ensured.
Owner:SHANDONG ZHONGFU INFORMATION IND +3

Method for accessing network, proxy server and network access system

The invention relates to the field of communications, and discloses a method for accessing a network, a proxy server and a network access system, so as to solve the technical problem that a large amount of data traffic of the mobile terminal needs to be consumed when the mobile terminal accesses the network in the prior art. The method includes: a proxy server receives a data access request from a mobile terminal to access a network through a network of a mobile communication operator; the proxy server obtains corresponding requested data from a resource server according to the data access request from the mobile terminal, and passes the requested data through The network of the mobile communication operator is transmitted to the mobile terminal; the data transmission in the process of accessing the network by the mobile terminal is marked with a traffic-free identifier, and all or part of the data traffic generated in the process of accessing the network by the mobile terminal through the proxy server is determined by the mobile network operator based on the free-flow identification. Traffic ID counts it against the designated service provider. The technical effect of reducing the data flow of the mobile terminal when the mobile terminal accesses the network is achieved.
Owner:北京鸿享技术服务有限公司

A trusted network access and access control method

The invention discloses a trusted network access and access control system. The control system comprises a network access requester, a network access decision-maker and a network access controller. When the network access requester accesses to the network, platform identity authentication is carried out, and secure and trusted states of the requester are detected; the secure and trusted states are sent to the network access decision-maker, and the decision-maker judges the secure and trust level of the requester and gives a network access decision; the network access decision is sent to the network access controller, and the controller limits the requested network access. The invention further discloses a trusted network access and access control method. The control system carries out the platform identity authentication on the basis of TCM and ensures the network access control while avoids identity forging. Network areas are divided on the basis of a digital label technology and dynamically updated, network self-adaption is realized, and the access security of different logical areas is ensured. Secure and trusted strategies are configured, and combined with the TCM cryptographic algorithm, so that the security and credibility of the platform state of the requester are ensured.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD

Download method and system based on home gateway, and home gateway

ActiveCN102916907BAffect normal network access businessAffect network access businessNetwork connectionsNetwork Access ProtectionComputer terminal
The invention provides a download method and a download system based on a home gateway, and the home gateway, and the home gateway, wherein the method comprises the following steps: a download request message, including the document address and the document name of at least one document to be downloaded, sent by a user terminal is received by the home gateway; if the downlink data in the network access process does not appear within the preset time of a first downlink channel used for performing the network access, the document corresponding to the document address and the document name is downloaded through the first downlink channel, and the downloading of the document is stopped until the downlink data occur on the first downlink channel. Through the download method and the download system based on the home gateway, and the home gateway provided by the invention, the document can be downloaded through the home gateway when the user terminal does not perform the network access, thereby the network bandwidth is more fully and reasonably utilized, the download in the prior art when the user terminal performs the network access is avoided; and the occupation of a large quantity of bandwidths can influence the normal network access business of a user.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Network access method in charge overdue and out-of-service state, distribution server as well as system

The invention discloses a network access method in a charge overdue and out-of-service state, a distribution server as well as a system. The method comprises the following steps: whether a mobile terminal is in the charge overdue and out-of-service state is judged, a traffic-free mode is started, a data access request for network access is sent to a proxy server in the mode when the mobile terminal is in the charge overdue and out-of-service state, wherein the data access request contains the communication identification of the mobile phone, and the communication identification has traffic-free internet surfing permission when the mobile terminal is in the charge overdue and out-of-service state; the mobile terminal receives requested data acquired by the proxy server from a resource server on the basis of the data access request, data transmission during network access is marked with traffic-free identification, and all or part of data traffic produced in the network access process of the mobile terminal is calculated into an assigned service provider by a mobile network operator on the basis of the traffic-free identification, so that the technical problem that network access cannot be performed through the network of the mobile network operator when the mobile terminal is in the charge overdue and out-of-service state in the prior art is solved.
Owner:北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products