Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal access office network security control method and authentication server

An authentication server and terminal access technology, applied in the field of network security, can solve problems such as insufficient management and control means at the terminal level, managers with weak anti-monitoring capabilities, and information confidentiality risks, so as to reduce the risk of information leakage, ensure the legitimacy of identities, The effect of ensuring information security

Active Publication Date: 2022-03-08
CHINA UNITECHS
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Large-scale enterprises have many branches, scattered regions, and high complexity of physical space. Various terminals are distributed and deployed in multiple office areas across regions, making intensive management difficult.
[0006] 2. Safety compliance risk
The network real-name system is the basic requirement of the national network security regulations. Large enterprises have many employees and strong mobility. The management and control methods at the terminal level are insufficient, and there is a greater risk of security responsibility audits.
The office network will inevitably involve some sensitive information and confidential information. However, under normal circumstances, all types of access terminals do not enable the mandatory security authentication mode, and the anti-monitoring ability is weak. Once a leak occurs, it will bring great harm to the administrator. Passive, or even seriously damage national security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal access office network security control method and authentication server
  • Terminal access office network security control method and authentication server
  • Terminal access office network security control method and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the purpose, technical solutions, and advantages of the embodiments of the present application clearer, the embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments of the application and their descriptions are used to explain the application, but not to limit the application.

[0033] The embodiment of this application provides a terminal access office network security management and control method, the method is applied to the authentication server in the office network, such as figure 2 As shown, the terminal is connected to the switch, the switch is connected to the authentication server, and the communication message between the terminal and the authentication server is forwarded through the switch. The communication message exchanged between the terminal and the switch conforms to the IEEE802.1X protocol, and the communication message exchanged ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a terminal access office network security control method and an authentication server. The method includes: receiving a RADIUS protocol authentication request sent by a switch, and the RADIUS protocol authentication request carries the terminal's user name, password, MAC address, switch address and The name of the access port where the terminal is connected to the switch; check whether there is the second network access information of the terminal with the same MAC address in the white list of the terminal; if it does not exist, send an authentication failure notification to the switch; if it exists, compare the first network access information one by one Whether the terminal user name, password, switch address, and access port name in the terminal are the same as the corresponding information in the second network access information; if they are the same, a notification of successful authentication is sent to the switch; if they are not the same, a notification of authentication failure is sent to the switch. This application can strengthen the security management and control of the office network.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a terminal access office network security control method and an authentication server. Background technique [0002] This section is intended to provide a background or context to embodiments of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] Large-scale enterprise groups generally have their own dedicated internal office network systems to provide voice calls, high-fidelity video conferencing and other office application services for enterprise employees. Such as figure 1 As shown, the logical structure of the office network system can be divided into: 1) business platform, which mainly includes business management systems of various terminals, such as production management system or office management system; 2) media processing layer, which mainly provides multimed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L43/10H04L41/0213
CPCH04L63/083H04L63/0876H04L43/10H04L41/0213
Inventor 严睿
Owner CHINA UNITECHS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products