Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing safety access public network of network terminal as well as special network access controller thereof

A network terminal and network access technology, applied in the field of computer network security, can solve the problems of malicious intrusion of firewall equipment, unaffordable costs, etc.

Active Publication Date: 2009-01-28
苏州凌犀物联网技术有限公司
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the current firewall technology and application, some firewall products have remote configuration function, and users can remotely access and configure the firewall based on its IP address in the network, but the corresponding IP address is assigned in the network topology Firewall devices may be maliciously invaded, and they all need to configure additional hardware and complex operating systems. Professional technical personnel are required to configure and manage them during use and daily maintenance.
However, for general small-scale enterprise computer networks and personal or home computer networks, not all of them have the technical basis for the management and maintenance of firewall products currently on the market, nor can they afford to hire professional technicians to manage and maintain firewall products. cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing safety access public network of network terminal as well as special network access controller thereof
  • Method and system for implementing safety access public network of network terminal as well as special network access controller thereof
  • Method and system for implementing safety access public network of network terminal as well as special network access controller thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In a specific embodiment of the present invention, a network terminal access controller (NTAC) is connected in series between the network terminal (NT) and the Internet, and connected in series on the link between the Internet and the NT, to control the flow through the NTAC Packets are inspected and controlled. NTAC is a device transparent to NT and the Internet in the network topology, and does not need to assign IP addresses to it.

[0027] The involved NTACs have the following characteristics:

[0028] NTAC cannot be assigned an IP address, it is not assigned an IP address, and it is transparently set in the overall network topology;

[0029] NTAC has a unique device identification code ID;

[0030] NTAC can store firewall policies for detecting and controlling IP data packets;

[0031] NTAC initialization is set to "Stop NTAC Firewall".

[0032] A feature of the firewall policy is to shield all data packets flowing to NT by default, and only when it detects tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing that a network terminal can safely access a public network. The method comprises the following steps: a network access controller is connected in series between the network terminal and the public network; when a firewall strategy database is required to be configured, a user on a network terminal submits configuration request information; the network access control server generates a group of corresponding configuration command data packet which is transmitted to the network terminal according to the configuration request information; the group of configuration command data packet is captured by the network access control server which is connected in series on the link so as to analyze and execute the corresponding configuration command and complete the update to the configuration of firewall policy; and the user on the network terminal access the public network under the security protection of the firewall policy configured by the network access control server. The invention also discloses a system for realizing that the network terminal can safely access the public network and the network access control server. The method, the system and the network access control server not only can ensure that the network terminal can safely access the public network, but also can be convenient for a user to use.

Description

technical field [0001] The invention relates to computer network security technology, in particular to a method and system for realizing safe access of a network terminal to a public network, and also to a dedicated network access controller thereof. Background technique [0002] A firewall refers to a combination of a series of components set between different networks (such as trusted intranets and untrusted public networks) or network security domains. It is the only entrance and exit of information between different networks or network security domains. By monitoring, restricting, and changing the data flow across the firewall, it shields the information, structure, and operating status of the network from the outside as much as possible, and selectively accepts external access. Strengthen internal device supervision, control access to servers and external networks, and set up a barrier between the protected network and external networks to prevent unpredictable and pote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L12/66
Inventor 万能
Owner 苏州凌犀物联网技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products