Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access control method and system for secure controlled terminal

A technology of controlled terminal and control method, applied in transmission systems, digital transmission systems, network interconnection, etc., can solve the problems of high maintenance and debugging costs, many debugging and maintenance interfaces, and inconvenient maintenance and debugging personnel, so as to improve work efficiency and improve work efficiency. Convenience, reducing the number of reserved interfaces, improving convenience and efficiency

Active Publication Date: 2017-09-01
湖南酷客轨道装备有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of sharing the network according to various services, dividing the network into different VLANs brings another problem, that is, the isolation and authorization of maintenance and debugging. Reserve the debugging interface, this method wastes the interface, and the security of the reserved debugging and maintenance interface cannot be guaranteed, and the reserved debugging and maintenance interfaces are many and not universal, which will bring great inconvenience to the specific maintenance and debugging work in the future
[0004] In the existing network, according to the debugging and maintenance needs of various services, a certain debugging and maintenance interface is reserved correspondingly according to the type of business. Since not every kind of business is required for debugging and maintenance at the same time, this technical solution brings great The waste of interfaces also brings great inconvenience to the maintenance and debugging personnel of various businesses. It is easy to make mistakes in the specific corresponding interfaces, resulting in high maintenance and debugging costs, and may even lead to certain access security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method and system for secure controlled terminal
  • Network access control method and system for secure controlled terminal
  • Network access control method and system for secure controlled terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in more detail below in conjunction with the drawings and embodiments.

[0023] The invention discloses a network access control method of a safety controlled terminal, which combines figure 1 with figure 2 As shown, the method is implemented based on a system that includes a terminal device 1 and a security module 2, and the method includes the following steps:

[0024] Step S1, the terminal device 1 logs into the security module 2;

[0025] Step S2, the terminal device 1 establishes network communication with the security module 2;

[0026] Step S3, the security module 2 performs identity verification on the terminal device 1, and executes step S4 after the verification is successful;

[0027] Step S4, the terminal device 1 obtains a network address, and sets the local network address as the obtained network address;

[0028] Step S5, the terminal device 1 accesses the network.

[0029] In the above network access control method, the termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network access control method for a secure controlled terminal. The method is achieved on the basis of a system, and the system comprises terminal equipment and a security module. The method comprises the following steps that 1, the terminal equipment logs in the security module; 2, the terminal equipment establishes network communication with the security module; 3, identity authentication is conducted on the terminal equipment by the security module, and the step 4 is executed after authentication succeeds; 4, the terminal equipment acquires a network address, wherein a local network address is set as the acquired network address; and 5, the terminal equipment accesses the network. According to the method, a maintenance and debugging interface is shared by various services, the number of needed maintenance and debugging interfaces is decreased maximally, then the convenience to maintenance and debugging personnel for the services is increased, the efficiency of the maintenance and debugging personnel for the services is improved, the maintenance and debugging work cost of the services is reduced, and it is effectively guaranteed that the security among the services is not interfered with one another.

Description

Technical field [0001] The invention relates to a terminal network access method, in particular to a network access control method and system for a safety controlled terminal. Background technique [0002] With the rapid development and popularization of networks, network functions are becoming more and more powerful, and the phenomenon of multi-service sharing networks is becoming more frequent; security between various services is getting more and more attention, and different VLANs are generally used to isolate service applications. Maximize the isolation of various services on the shared network to achieve the effect of non-interference between various services; [0003] However, in the process of sharing the network according to various services, after the network is divided into different VLANs, another problem is brought about, that is, the isolation and authorization of maintenance and debugging. In order to improve the security of the entire system, it is often based on th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/24H04L12/46
CPCH04L41/28H04L63/08H04L63/0815H04L12/4641H04L2101/60
Inventor 王晨光
Owner 湖南酷客轨道装备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products