Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network access control method and system for a securely controlled terminal

A controlled terminal and control method technology, applied in transmission systems, digital transmission systems, network interconnection, etc., can solve problems such as high maintenance and debugging costs, multiple debugging and maintenance interfaces, and inconvenience for maintenance and debugging personnel, so as to improve work efficiency and Convenience, reducing the number of reserved interfaces, improving convenience and efficiency

Active Publication Date: 2020-03-31
湖南酷客轨道装备有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of sharing the network according to various services, dividing the network into different VLANs brings another problem, that is, the isolation and authorization of maintenance and debugging. Reserve the debugging interface, this method wastes the interface, and the security of the reserved debugging and maintenance interface cannot be guaranteed, and the reserved debugging and maintenance interfaces are many and not universal, which will bring great inconvenience to the specific maintenance and debugging work in the future
[0004] In the existing network, according to the debugging and maintenance needs of various services, a certain debugging and maintenance interface is reserved correspondingly according to the type of business. Since not every kind of business is required for debugging and maintenance at the same time, this technical solution brings great The waste of interfaces also brings great inconvenience to the maintenance and debugging personnel of various businesses. It is easy to make mistakes in the specific corresponding interfaces, resulting in high maintenance and debugging costs, and may even lead to certain access security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network access control method and system for a securely controlled terminal
  • A network access control method and system for a securely controlled terminal
  • A network access control method and system for a securely controlled terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in more detail below in conjunction with the accompanying drawings and embodiments.

[0023] The invention discloses a network access control method of a security-controlled terminal, which combines figure 1 and figure 2 As shown, the method is implemented based on a system, the system includes a terminal device 1 and a security module 2, and the method includes the following steps:

[0024] Step S1, the terminal device 1 logs into the security module 2;

[0025] Step S2, the terminal device 1 establishes network communication with the security module 2;

[0026] Step S3, the security module 2 performs identity verification on the terminal device 1, and executes step S4 after the verification is successful;

[0027] Step S4, the terminal device 1 obtains a network address, and sets the local network address as the obtained network address;

[0028] Step S5, the terminal device 1 is connected to the network.

[0029] In the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network access control method of a security-controlled terminal. The method is implemented based on a system, the system includes a terminal device and a security module, and the method includes the following steps: Step S1, the terminal device logs in to the security module; step S2, the terminal device establishes network communication with the security module; step S3, the security module performs identity verification on the terminal device, and executes step S4 after successful verification; step S4, the terminal device acquires a network address, And set the local network address as the obtained network address; step S5, the terminal device is connected to the network. The present invention realizes the sharing of maintenance and debugging interfaces among various businesses, minimizes the number of required maintenance and debugging interfaces, further improves the convenience and efficiency of various business maintenance and debugging personnel, and reduces the cost of various business maintenance and debugging work. And effectively guarantee the security of various services without interfering with each other.

Description

technical field [0001] The present invention relates to a terminal network access method, in particular to a security controlled terminal network access control method and system. Background technique [0002] With the rapid development and popularization of the network, the network function is becoming more and more powerful, and the phenomenon of multi-service sharing network is becoming more and more frequent; the security between various services is getting more and more attention, and different VLANs are generally used to realize the isolation of business applications. Maximize the isolation of various services of the shared network from each other, so as to achieve the effect of non-interference between various services; [0003] However, in the process of sharing the network according to various services, dividing the network into different VLANs brings another problem, that is, the isolation and authorization of maintenance and debugging. Reserving debugging interfa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/24H04L12/46
CPCH04L41/28H04L63/08H04L63/0815H04L12/4641H04L2101/60
Inventor 王晨光
Owner 湖南酷客轨道装备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products