Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security protection method for terminal equipment, system, equipment and readable storage medium

A technology for terminal equipment and security protection, applied in transmission systems, digital transmission systems, security communication devices, etc., and can solve the problems of imitation mac devices not being recognized.

Active Publication Date: 2022-05-13
SHANDONG LUNENG SOFTWARE TECH +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main problem of the Radius authentication method is that it cannot identify the imitation mac devices that are illegally accessed.
Unable to actively filter hidden infiltration behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security protection method for terminal equipment, system, equipment and readable storage medium
  • A security protection method for terminal equipment, system, equipment and readable storage medium
  • A security protection method for terminal equipment, system, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Those of ordinary skill in the art can realize that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, computer software, or a combination of the two. In order to clearly illustrate the relationship between hardware and software Interchangeability. In the above description, the composition and steps of each example have been generally described according to their functions. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present invention.

[0053] The block diagrams shown in the drawings are merely functional entities and do not necessarily correspond to physically separate entiti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a security protection method, system, device and readable storage medium for terminal equipment. The terminal equipment goes online and obtains the IP and equipment fingerprint information of the terminal equipment; If the device fingerprint information corresponding to the IP matches the device fingerprint information and the IP in the fingerprint reference database, it is judged that the identity of the terminal device is legal, and the terminal device is allowed to connect. If the device fingerprint information corresponding to the IP does not match the fingerprint information and IP in the fingerprint reference database, the terminal device corresponding to the IP is added to the blacklist to block the device from accessing the Internet and give an early warning. The network security is further strengthened by means of device fingerprinting, and devices with illegal intrusion and MAC counterfeiting are also found. The device fingerprinting method basically has no effect on system performance, and can resist some network penetration attacks.

Description

technical field [0001] The present invention relates to the technical field of terminal equipment security protection, in particular to a terminal equipment security protection method, system, equipment and readable storage medium. Background technique [0002] With the continuous advancement of the ubiquitous power Internet of Things construction, a large number of terminal devices are connected to the power information network, and illegal devices are counterfeited to break the system, which brings huge hidden dangers to the security management and control of the information network. [0003] At present, Radius authentication is widely used for information network security management and control. RADIUS authentication is a distributed client / server system, which realizes a secure network and opposes unauthenticated access. The specific implementation method is to open the protocol authentication mode on the switch side, and realize the information collection and verificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0876H04L63/101
Inventor 李冬常英贤刘晗焦洋陈剑飞张营李正浩邓华许立颜康王浩刘姝邑许聪张晨玥宋天航
Owner SHANDONG LUNENG SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products