Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protection method, system and device of terminal device and readable storage medium

A technology for terminal equipment and security protection, which is applied in transmission systems, electrical components, etc., and can solve problems such as unrecognizable mac-like devices

Active Publication Date: 2020-02-28
SHANDONG LUNENG SOFTWARE TECH +1
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main problem of the Radius authentication method is that it cannot identify the imitation mac devices that are illegally accessed.
Unable to actively filter hidden infiltration behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method, system and device of terminal device and readable storage medium
  • Safety protection method, system and device of terminal device and readable storage medium
  • Safety protection method, system and device of terminal device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Those of ordinary skill in the art can realize that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, computer software, or a combination of the two. In order to clearly illustrate the relationship between hardware and software Interchangeability. In the above description, the composition and steps of each example have been generally described according to their functions. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present invention.

[0053] The block diagrams shown in the drawings are merely functional entities and do not necessarily correspond to physically separate entities. Tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety protection method, system and device for a terminal device and a readable storage medium. The method comprises the steps that the terminal device is online, and the IPand device fingerprint information of the terminal device is acquired; comparing and judging the equipment fingerprint information corresponding to the IP with the equipment fingerprint information and the IP in a fingerprint reference library; if the equipment fingerprint information corresponding to the IP is matched with the equipment fingerprint information and the IP in a fingerprint reference library, judging that the identity of the terminal equipment is legal, and allowing the terminal equipment to access a power information network; If the equipment fingerprint information corresponding to the IP is not matched with the fingerprint information and the IP in the fingerprint reference library, adding the terminal equipment corresponding to the IP into a blacklist, blocking the equipment from surfing the Internet, and carrying out early warning. The network safety is further reinforced through a device fingerprint mode, illegal invasion and MAC counterfeit devices are discovered,the device fingerprint mode basically has no influence on the system performance, and a part of network penetration attacks can be resisted.

Description

technical field [0001] The present invention relates to the technical field of terminal equipment security protection, in particular to a terminal equipment security protection method, system, equipment and readable storage medium. Background technique [0002] With the continuous advancement of the ubiquitous power Internet of Things construction, a large number of terminal devices are connected to the power information network, and illegal devices are counterfeited to break the system, which brings huge hidden dangers to the security management and control of the information network. [0003] At present, Radius authentication is widely used for information network security management and control. RADIUS authentication is a distributed client / server system, which realizes a secure network and opposes unauthenticated access. The specific implementation method is to open the protocol authentication mode on the switch side, and realize the information collection and verificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/101
Inventor 李冬常英贤刘晗焦洋陈剑飞张营李正浩邓华许立颜康王浩刘姝邑许聪张晨玥宋天航
Owner SHANDONG LUNENG SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products