Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security control method and device

A network security and control method technology, applied in the field of network security control methods and devices, can solve problems such as user information leakage, illegal tampering of DNS resolution server IP addresses, etc., and achieve the effect of ensuring user Internet security and preventing leakage.

Inactive Publication Date: 2016-11-23
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to solve the technical problem that the IP address of the DNS resolution server in the DNS configuration information of the system is illegally tampered with during the network business operation process through the Internet through the intelligent terminal, resulting in user information being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security control method and device
  • Network security control method and device
  • Network security control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] The invention provides a network security control method. refer to figure 1 , figure 1 It is a schematic flowchart of an embodiment of the network security control method of the present invention. In this embodiment, the network security control method includes:

[0040] Step S10 , after successful networking, back up the IP address of the reference DNS resolution server, and judge in real time whether the IP address of the DNS resolution server in the system DNS configuration information has been tampered with.

[0041] Whether the IP address of the DNS resolution server in the real-time judgment system DNS configuration information has been tampered with in this step S10 is specifically: whether the IP address of the DNS resolution server in the system DNS configuration information is consistent with the I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security control method comprising the following steps: making a backup of an IP address of a benchmark DNS (domain name system) resolution server after successful networking, and judging whether an IP address of a DNS resolution server in system DNS configuration information is tampered in real time; terminating the execution of network service operations when the IP address is tampered; updating the IP address of the DNS resolution server in the system DNS configuration information to the IP address of the benchmark DNS resolution server; and continuously executing the network service operations. The invention also discloses a network security control device. By adopting the network security control method and device disclosed by the invention, the occurrence of a phenomenon that user information is leaked because the IP address of the DNS resolution server in the system DNS configuration information is tampered can be effectively prevented, and the internet access security of users can be guaranteed.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a network security control method and device. Background technique [0002] When a user uses a smart terminal such as a wireless CPE (Custmer Premise Equipment, which is a wireless terminal access device that receives wifi signals) to access the Internet to perform network business operations, the web page accessed through the domain name is often not the expected page. Because the IP address of the DNS resolution server in the DNS (Domain Name System, Domain Name System) configuration information of smart terminal devices such as the CPE is illegally tampered with by hackers, if the user does not find out and still enters relevant information at this time, the hacker can obtain the relevant information entered by the user. Information, that is, user information is at risk of being leaked, and network business operations have serious security risks. Contents of the inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L9/40
Inventor 孟义超
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products