Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bypass authentication and audit method

A bypass and router technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as network paralysis, high cost, and manpower consumption, and achieve the goal of reducing transformation costs, reducing equipment performance requirements, and reducing costs Effect

Inactive Publication Date: 2017-11-10
HANGZHOU DUNCHONG SCI & TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is a solution to achieve the above functions: embed the authentication and audit equipment into the live network, that is, control the original data flow of the terminal, and embed the equipment into the backbone network where the user accesses the network. Because the user's data flow needs to be forwarded by the device, it can be By intercepting the user's http request to achieve the purpose of http authentication, the data stream can be directly copied to the user state to collect audit data. When this solution is used, it needs to change the network structure of the existing network and consume a lot of unnecessary manpower. Moreover, the forwarding performance requirements of the equipment are very high, and the cost is high. When the equipment fails, it will cause the network to be paralyzed. It is also necessary to consider whether to be the master or backup, which will bring disadvantages to people.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical scheme of the present invention is described further below:

[0023] A bypass authentication and audit method is characterized in that it comprises the following steps:

[0024] Step (1), connecting the WAN port of the authentication and auditing equipment to a Layer 3 switch or router, and isolating it from the user terminal network;

[0025] Step (2), using the port mirroring function of the layer-3 switch or router, the user's Internet access data is mirrored to the LAN port of the authentication and auditing equipment;

[0026] Step (3), authentication and audit equipment judge the direction of data according to the MAC address of user's gateway;

[0027] Step (4), analyzing the user's network access request at the authentication and auditing device, and performing auditing and authentication functions on user data.

[0028] The direction of the data includes two directions, namely the data sent by the user and the data sent to the user.

[0029] Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a bypass authentication and audit method. The bypass authentication and audit method comprises steps that (1), authentication and audit equipment is accessed to a three-layer switch or a router and realizes network isolation from a user terminal; step (2), a port mirror image function of the three-layer switch or the router is utilized, and networking data of a user is transferred to the authentication and audit equipment in a mirror image mode; step (3), the direction of the data is determined by the authentication and audit equipment according to an MAC address of a gateway of a user; and step (4), a network access request of the user is analyzed by the authentication and audit equipment, and the authentication and audit function for the user data is further carried out. The method is advantaged in that the user can be prevented from changing the network topological structure, and reconstruction cost of the user is reduced; equipment performance requirements of the user during use are reduced, and cost is reduced; when the equipment being used by the user is in a fault, only the authentication and audit function fails, and normal network access of the user is not influenced.

Description

technical field [0001] The invention relates to a bypass authentication and audit method. Background technique [0002] With the popularity of public networks, network security has become more and more important. During network deployment, there are more and more requirements for certification and auditing, including the re-deployment and reconstruction of many existing existing networks. The realization of the authentication and auditing function must rely on the data flow of the user's access network, and realize the authentication and auditing by controlling or intercepting the user's online data. During the transformation of the existing network, reducing transformation costs, reducing maintenance manpower and performance requirements have become the primary selection criteria for customers. At present, there is a solution to achieve the above functions: embed the authentication and audit equipment into the live network, that is, control the original data flow of the t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/707H04L45/24
CPCH04L41/28H04L45/22H04L41/12
Inventor 张震
Owner HANGZHOU DUNCHONG SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products