技术领域technical field
本发明涉及信息技术领域,特别是涉及一种终端接入网络的控制方法及装置。The present invention relates to the field of information technology, in particular to a method and device for controlling terminal access to a network.
背景技术Background technique
随着信息化建设的快速发展,现有的电力系统网络中往往存在数量众多、分布范围广泛的终端设备,包括台式机、笔记本、网络设备、打印机、扫描仪以及移动智能终端等。根据目前统计发现,电力系统的内网和应用系统发生故障的原因更多的是由于安全因素导致,如病毒感染、恶意接入、违规访问以及系统漏洞等,而这些安全隐患,几乎全部来自于用户终端。因此,提供一种保证各终端安全接入网络的方法及装置是非常有必要的。With the rapid development of information construction, there are often a large number of widely distributed terminal devices in the existing power system network, including desktops, notebooks, network devices, printers, scanners, and mobile smart terminals. According to the current statistics, the failures of the intranet and application systems of the power system are mostly caused by security factors, such as virus infection, malicious access, illegal access, and system loopholes, etc., and these security risks are almost all from user terminal. Therefore, it is very necessary to provide a method and device for ensuring that each terminal is safely connected to the network.
发明内容Contents of the invention
本发明的目的是提供一种终端接入网络的控制方法及装置,其目的在于解决终端不能安全接入网络的问题。The purpose of the present invention is to provide a method and device for controlling terminal access to the network, and the purpose is to solve the problem that the terminal cannot safely access the network.
为解决上述技术问题,本发明提供一种终端接入网络的控制方法,包括:In order to solve the above technical problems, the present invention provides a method for controlling terminal access to the network, including:
在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件;After receiving the network access request of the terminal, reviewing the terminal to determine whether the terminal meets the preset conditions for secure network access;
在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;After the terminal passes the audit to access the network, monitor the process of the terminal accessing the network;
当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。When it is detected that the terminal has illegal access to the network, the terminal is blocked from accessing the network.
可选地,所述对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件包括:Optionally, the auditing the terminal and judging whether the terminal meets the preset conditions for secure network access include:
对所述请求接入网络的终端的身份进行认证,判断所述终端是否为合法用户;Authenticating the identity of the terminal requesting to access the network, and judging whether the terminal is a legitimate user;
当判定所述终端为合法用户时,对所述终端进行安全认证,判断所述终端是否为预设的可接入网络的合格用户。When it is determined that the terminal is a legitimate user, security authentication is performed on the terminal to determine whether the terminal is a preset qualified user that can access the network.
可选地,所述判断所述终端是否为预设的可接入网络的合格用户包括:Optionally, the judging whether the terminal is a preset qualified user that can access the network includes:
判断所述终端是否正常安装安全访问客户端、是否安装有杀毒软件、所述杀毒软件是否及时更新、系统漏洞补丁是否更新以及口令账号是否合格;如果是,则判定所述终端为合格用户。Judging whether the terminal is normally installed with a secure access client, whether antivirus software is installed, whether the antivirus software is updated in time, whether the system vulnerability patch is updated, and whether the password account is qualified; if so, then determine that the terminal is a qualified user.
可选地,在所述终端通过审核,访问网络之前还包括:Optionally, before the terminal passes the audit and accesses the network, it also includes:
根据所述终端的身份信息,对所述终端的访问权限进行授权。Authorize the access authority of the terminal according to the identity information of the terminal.
可选地,还包括:Optionally, also include:
对所述网络中的端口、设备以及终端的运行状况、安全状况以及所述接入终端的位置和分布状况进行监测并显示。Monitoring and displaying the operation status and security status of ports, devices and terminals in the network, as well as the location and distribution status of the access terminals.
本发明还提供了一种终端接入网络的控制装置,包括:The present invention also provides a control device for terminal access network, including:
审核模块,用于在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件;An audit module, configured to audit the terminal after receiving the network access request of the terminal, and determine whether the terminal meets the preset conditions for secure network access;
监控模块,用于在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;A monitoring module, configured to monitor the process of the terminal accessing the network after the terminal passes the audit to access the network;
阻断模块,用于当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。The blocking module is configured to block the terminal from accessing the network when it is detected that the terminal has illegal access to the network.
可选地,所述审核模块包括:Optionally, the review module includes:
身份认证单元,用于对所述请求接入网络的终端的身份进行认证,判断所述终端是否为合法用户;An identity authentication unit, configured to authenticate the identity of the terminal requesting to access the network, and determine whether the terminal is a legitimate user;
安全认证单元,用于当判定所述终端为合法用户时,对所述终端进行安全认证,判断所述终端是否为预设的可接入网络的合格用户。The security authentication unit is configured to perform security authentication on the terminal when it is determined that the terminal is a legitimate user, and determine whether the terminal is a preset qualified user that can access the network.
可选地,所述安全认证单元用于判断所述终端是否为预设的可接入网络的合格用户包括:Optionally, the use of the security authentication unit to determine whether the terminal is a preset qualified user that can access the network includes:
所述安全认证单元具体用于,判断所述终端是否正常安装安全访问客户端、是否安装有杀毒软件、所述杀毒软件是否及时更新、系统漏洞补丁是否更新以及口令账号是否合格;如果是,则判定所述终端为合格用户。The security authentication unit is specifically used to determine whether the terminal is normally installed with a secure access client, whether anti-virus software is installed, whether the anti-virus software is updated in time, whether the system vulnerability patch is updated, and whether the password account is qualified; if so, then It is determined that the terminal is a qualified user.
可选地,还包括:Optionally, also include:
授权模块,用于在所述终端通过审核,访问网络之前,根据所述终端的身份信息,对所述终端的访问权限进行授权。The authorization module is configured to authorize the access authority of the terminal according to the identity information of the terminal before the terminal passes the audit and accesses the network.
可选地,还包括:Optionally, also include:
显示模块,用于对所述网络中的端口、设备以及终端的运行状况、安全状况以及所述接入终端的位置和分布状况进行监测并显示。The display module is used to monitor and display the operation status and security status of ports, devices and terminals in the network, as well as the location and distribution status of the access terminals.
本发明所提供的终端接入网络的控制方法及装置,在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件,在满足该条件的情况下才允许该终端接入;并且在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。可见,本发明所提供的控制方法及装置,能够通过对接入网络的终端进行审核以及监控,保证所述终端安全接入网络。The method and device for controlling terminal access to the network provided by the present invention, after receiving the terminal access request, audits the terminal to determine whether the terminal meets the preset conditions for secure network access, Only when this condition is met, the terminal is allowed to access; and after the terminal passes the audit to access the network, monitor the process of the terminal accessing the network; when the terminal is detected to have illegal access to the network , block the terminal from accessing the network. It can be seen that the control method and device provided by the present invention can ensure that the terminals access the network safely by auditing and monitoring the terminals accessing the network.
附图说明Description of drawings
图1为本发明所提供的终端接入网络的控制方法的一种具体实施方式的流程图;FIG. 1 is a flowchart of a specific embodiment of a method for controlling terminal access to a network provided by the present invention;
图2为本发明所提供的终端接入网络的控制方法的另一种具体实施方式的流程图;FIG. 2 is a flow chart of another specific embodiment of a method for controlling terminal access to a network provided by the present invention;
图3为本发明所提供的终端接入网络的控制装置的一种具体实施方式的结构框图;FIG. 3 is a structural block diagram of a specific embodiment of a control device for terminal access network provided by the present invention;
图4为本发明所提供的终端接入网络的控制装置的另一种具体实施方式的结构框图。Fig. 4 is a structural block diagram of another specific implementation manner of a control device for terminal access network provided by the present invention.
具体实施方式detailed description
为了使本技术领域的人员更好地理解本发明方案,下面结合附图和具体实施方式对本发明作进一步的详细说明。显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
本发明所提供的终端接入网络的控制方法的一种具体实施方式的流程图如图1所示,该方法包括:A flow chart of a specific implementation of the method for controlling terminal access to the network provided by the present invention is shown in Figure 1, the method includes:
步骤S101:在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件;Step S101: After receiving the terminal access request, review the terminal to determine whether the terminal meets the preset conditions for secure network access;
步骤S102:在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;Step S102: After the terminal passes the audit to access the network, monitor the process of the terminal accessing the network;
步骤S103:当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。Step S103: Blocking the terminal from accessing the network when it is detected that the terminal has access to the network in violation of regulations.
本发明所提供的终端接入网络的控制方法,在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件,在满足该条件的情况下才允许该终端接入;并且在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。可见,本发明所提供的控制方法及装置,能够通过对接入网络的终端进行审核以及监控,保证所述终端安全接入网络。The method for controlling terminal network access provided by the present invention, after receiving the terminal network access request, checks the terminal to determine whether the terminal meets the preset conditions for secure network access. Only when this condition is met, the terminal is allowed to access; and after the terminal passes the audit to access the network, monitor the process of the terminal accessing the network; when the terminal is detected to have illegal access to the network, Block the terminal from accessing the network. It can be seen that the control method and device provided by the present invention can ensure that the terminals access the network safely by auditing and monitoring the terminals accessing the network.
本发明所提供的终端接入网络的控制方法的另一种具体实施方式的流程图如图2所示,该方法包括:The flow chart of another specific embodiment of the method for controlling terminal access to the network provided by the present invention is shown in Figure 2, the method includes:
步骤S201:在对所述请求接入网络的终端的身份进行认证,判断所述终端是否为合法用户;Step S201: After authenticating the identity of the terminal requesting to access the network, determine whether the terminal is a legal user;
在接收到终端申请接入网络的请求后,对该终端的身份进行认证。当判断该终端的身份为合法用户时,进入步骤S202;当判断该终端的身份为非法用户时,拒绝该终端接入该网络。After receiving the terminal's request to apply for accessing the network, the identity of the terminal is authenticated. When it is judged that the identity of the terminal is a legitimate user, enter step S202; when it is judged that the identity of the terminal is an illegal user, deny the terminal access to the network.
步骤S202:当判定所述终端为合法用户时,对所述终端进行安全认证,判断所述终端是否为预设的可接入网络的合格用户;Step S202: When it is determined that the terminal is a legitimate user, perform security authentication on the terminal, and determine whether the terminal is a preset qualified user that can access the network;
在判定终端为合法用户之后,还需要对该终端进行安全信息的认证,只有当终端通过安全信息的认证之后,才能进入步骤S203。如果该终端不满足安全接入网络的条件,则将该终端切换至隔离区域,在隔离区域中只能与内网中的系统设备进行通讯,只有当该终端达到安全入网的要求后,才能够正常访问网络。After it is determined that the terminal is a legitimate user, it is necessary to authenticate the security information of the terminal, and step S203 can only be entered after the terminal passes the security information authentication. If the terminal does not meet the requirements for secure access to the network, the terminal will be switched to the isolated area, where it can only communicate with the system equipment in the intranet. Only when the terminal meets the requirements for secure network access can it be Access the network normally.
其中,判断所述终端是否为预设的可接入网络的合格用户的条件包括:判断终端是否正常安装安全访问客户端、是否安装有杀毒软件、所述杀毒软件是否及时更新以及系统漏洞补丁是否更新等条件。如果是,则判定该终端为合格用户。该过程还可以包括对终端入网之前的弱口令账户的检查,计时发现并隔离存在弱口令账号的终端,要求其修改合格口令之后才能够接入。Among them, the conditions for judging whether the terminal is a preset qualified user that can access the network include: judging whether the terminal is normally installed with a secure access client, whether antivirus software is installed, whether the antivirus software is updated in time, and whether the system vulnerability patch is update conditions. If so, it is determined that the terminal is a qualified user. This process may also include checking the accounts with weak passwords before the terminal accesses the network, discovering and isolating terminals with weak password accounts by timing, and requiring them to modify qualified passwords before they can access.
在终端接入网络时,本发明提供的控制方法还能够对其进行防病毒软件、桌面管理软件以及生产类软件等的安装、安装版本以及运行状态进行检查,并可以通过管理平台进行集中展现,保证终端设备实现软件标准化。When the terminal is connected to the network, the control method provided by the present invention can also check the installation, installation version and running status of anti-virus software, desktop management software and production software, etc., and can perform centralized display through the management platform, Ensure that terminal equipment realizes software standardization.
步骤S203:根据所述终端的身份信息,对所述终端的访问权限进行授权;Step S203: Authorize the access authority of the terminal according to the identity information of the terminal;
对终端的身份信息进行验证,不同的用户享受不同的网络使用权限。The identity information of the terminal is verified, and different users enjoy different network usage rights.
步骤S204:在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;Step S204: After the terminal passes the audit to access the network, monitor the process of the terminal accessing the network;
步骤S205:当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络;Step S205: Blocking the terminal from accessing the network when it is detected that the terminal has illegal access to the network;
对包括多网卡连接、ADSL/3G拨号、私设静态路由、ARP表、网络代理、可连接互联网等外联行为进行识别并阻断。该过程基于系统底层的协议驱动进行监测,与其他类似产品通过主动探测互联网地址的方式相区别,能够在终端设备访问任何互联网时,均在连接成功之前触发系统监测机制。当监测到终端非法访问互联网或不受控网络等违规外联行为时,立即阻断终端接入网络的行为,避免内外网互通,保障业务数据网络的安全。Identify and block outreach behaviors including multi-network card connection, ADSL/3G dial-up, private static routing, ARP table, network proxy, and Internet connection. This process is monitored based on the protocol driver at the bottom of the system. It is different from other similar products that actively detect the Internet address. When the terminal device accesses any Internet, it can trigger the system monitoring mechanism before the connection is successful. When illegal outreach behaviors such as illegal access of terminals to the Internet or uncontrolled networks are detected, the behavior of terminal access to the network is immediately blocked to avoid intercommunication between internal and external networks and ensure the security of business data networks.
步骤S206:对所述网络中的端口、设备以及终端的运行状况、安全状况以及所述接入终端的位置和分布状况进行监测并显示。Step S206: Monitor and display the operation status and security status of ports, devices and terminals in the network, as well as the location and distribution status of the access terminals.
对整个系统中的网络情况、从端口到设备、终端的安全状况等信息进行监测,及时掌握其情况,在网络设备面板视图中展示各个端口的运行状态,并且迅速定位接入网络终端的位置,明确接入设备的位置及分布状况。这样有助于管理员更加直观的获得所辖网络的基础设施情况、分布位置、连接状况、地址分配、Hub接入情况以及接入设备状况信息。Monitor the network situation in the entire system, the security status from ports to devices and terminals, grasp the situation in time, display the operation status of each port in the network device panel view, and quickly locate the location of the terminal accessing the network. Clarify the location and distribution of access devices. In this way, administrators can more intuitively obtain information about the infrastructure, distribution location, connection status, address allocation, Hub access status, and access device status of the network under their jurisdiction.
本发明所提供的终端接入网络的控制方法,在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件,在满足该条件的情况下才允许该终端接入;并且在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。可见,本发明所提供的控制方法及装置,能够通过对接入网络的终端进行审核以及监控,保证所述终端安全接入网络。The method for controlling terminal network access provided by the present invention, after receiving the terminal network access request, checks the terminal to determine whether the terminal meets the preset conditions for secure network access. Only when this condition is met, the terminal is allowed to access; and after the terminal passes the audit to access the network, monitor the process of the terminal accessing the network; when the terminal is detected to have illegal access to the network, Block the terminal from accessing the network. It can be seen that the control method and device provided by the present invention can ensure that the terminals access the network safely by auditing and monitoring the terminals accessing the network.
本发明所提供的终端接入网络的控制装置的一种具体实施方式的结构框图如图3所示,该装置包括:A structural block diagram of a specific embodiment of a control device for terminal access network provided by the present invention is shown in Figure 3, the device includes:
审核模块100,用于在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件;An audit module 100, configured to audit the terminal after receiving the network access request of the terminal, and determine whether the terminal meets the preset conditions for secure network access;
监控模块200,用于在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;A monitoring module 200, configured to monitor the process of the terminal accessing the network after the terminal passes the audit to access the network;
阻断模块300,用于当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。The blocking module 300 is configured to block the terminal from accessing the network when it is detected that the terminal is illegally accessing the network.
本发明所提供的终端接入网络的控制装置,在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件,在满足该条件的情况下才允许该终端接入;并且在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。可见,本发明所提供的控制方法及装置,能够通过对接入网络的终端进行审核以及监控,保证所述终端安全接入网络。The terminal network access control device provided by the present invention, after receiving the terminal network access request, checks the terminal to determine whether the terminal meets the preset conditions for secure network access, and Only when this condition is met, the terminal is allowed to access; and after the terminal passes the audit to access the network, monitor the process of the terminal accessing the network; when the terminal is detected to have illegal access to the network, Block the terminal from accessing the network. It can be seen that the control method and device provided by the present invention can ensure that the terminals access the network safely by auditing and monitoring the terminals accessing the network.
本发明所提供的终端接入网络的控制装置的另一种具体实施方式的结构框图如图4所示,与前一个实施例相比,本实施例中将审核模块100具体分为身份认证单元1001以及安全认证单元1002两个单元,并且增加了授权模块400以及显示模块500两个模块,该装置包括:The structural block diagram of another specific embodiment of the terminal access network control device provided by the present invention is shown in Figure 4. Compared with the previous embodiment, the audit module 100 is specifically divided into identity authentication units in this embodiment 1001 and security authentication unit 1002, and two modules of authorization module 400 and display module 500 are added, the device includes:
身份认证单元1001,用于对所述请求接入网络的终端的身份进行认证,判断所述终端是否为合法用户;An identity authentication unit 1001, configured to authenticate the identity of the terminal requesting to access the network, and determine whether the terminal is a legal user;
安全认证单元1002,用于当判定所述终端为合法用户时,对所述终端进行安全认证,判断所述终端是否为预设的可接入网络的合格用户;A security authentication unit 1002, configured to perform security authentication on the terminal when it is determined that the terminal is a legitimate user, and determine whether the terminal is a preset qualified user that can access the network;
所述安全认证单元具体用于,判断所述终端是否正常安装安全访问客户端、是否安装有杀毒软件、所述杀毒软件是否及时更新、系统漏洞补丁是否更新以及口令账号是否合格,如果是,则判定所述终端为合格用户。The security authentication unit is specifically used to determine whether the terminal is normally installed with a secure access client, whether antivirus software is installed, whether the antivirus software is updated in time, whether the system vulnerability patch is updated, and whether the password account is qualified, and if so, then It is determined that the terminal is a qualified user.
授权模块400,用于在所述终端通过审核,访问网络之前,根据所述终端的身份信息,对所述终端的访问权限进行授权;An authorization module 400, configured to authorize the access authority of the terminal according to the identity information of the terminal before the terminal passes the audit and accesses the network;
监控模块200,用于在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;A monitoring module 200, configured to monitor the process of the terminal accessing the network after the terminal passes the audit to access the network;
阻断模块300,用于当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络;A blocking module 300, configured to block the terminal from accessing the network when it is detected that the terminal has illegal access to the network;
显示模块500,用于对所述网络中的端口、设备以及终端的运行状况、安全状况以及所述接入终端的位置和分布状况进行监测并显示。The display module 500 is configured to monitor and display the operation status and security status of ports, devices and terminals in the network, as well as the location and distribution status of the access terminals.
本发明所提供的终端接入网络的控制装置,在接收到所述终端接入网络请求之后,对所述终端进行审核,判断所述终端是否符合预设的安全接入网络的条件,在满足该条件的情况下才允许该终端接入;并且在所述终端通过审核接入网络后,对所述终端访问网络的过程进行监控;当监测到所述终端存在违规接入网络的行为时,阻断所述终端访问网络。可见,本发明所提供的控制方法及装置,能够通过对接入网络的终端进行审核以及监控,保证所述终端安全接入网络。The terminal network access control device provided by the present invention, after receiving the terminal network access request, checks the terminal to determine whether the terminal meets the preset conditions for secure network access, and Only when this condition is met, the terminal is allowed to access; and after the terminal passes the audit to access the network, monitor the process of the terminal accessing the network; when the terminal is detected to have illegal access to the network, Block the terminal from accessing the network. It can be seen that the control method and device provided by the present invention can ensure that the terminals access the network safely by auditing and monitoring the terminals accessing the network.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。Each embodiment in this specification is described in a progressive manner, each embodiment focuses on the difference from other embodiments, and the same or similar parts of each embodiment can be referred to each other.
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本发明。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the invention. Therefore, the present invention will not be limited to the embodiments shown herein, but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201511030564.0ACN105610839A (en) | 2015-12-31 | 2015-12-31 | Controlling method and device for accessing network by terminal |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201511030564.0ACN105610839A (en) | 2015-12-31 | 2015-12-31 | Controlling method and device for accessing network by terminal |
| Publication Number | Publication Date |
|---|---|
| CN105610839Atrue CN105610839A (en) | 2016-05-25 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201511030564.0APendingCN105610839A (en) | 2015-12-31 | 2015-12-31 | Controlling method and device for accessing network by terminal |
| Country | Link |
|---|---|
| CN (1) | CN105610839A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106850534A (en)* | 2016-11-30 | 2017-06-13 | 北海高创电子信息孵化器有限公司 | A kind of scientific and technological information detection method based on internet |
| CN107172646A (en)* | 2017-06-06 | 2017-09-15 | 苏州小雨伞网络科技有限公司 | A kind of striding equipment method for monitoring network |
| CN107277040A (en)* | 2017-07-20 | 2017-10-20 | 西安云雀软件有限公司 | A kind of method for carrying out terminal Access Control in Intranet |
| CN107948199A (en)* | 2017-12-27 | 2018-04-20 | 北京奇安信科技有限公司 | A kind of method and device being used for quickly detecting to terminal shared access |
| CN110493195A (en)* | 2019-07-23 | 2019-11-22 | 上海文化广播影视集团有限公司 | A kind of network access control method and system |
| CN111177692A (en)* | 2019-11-29 | 2020-05-19 | 云深互联(北京)科技有限公司 | Terminal credibility level evaluation method, device, equipment and storage medium |
| CN113285929A (en)* | 2021-05-10 | 2021-08-20 | 新华三技术有限公司 | Terminal validity detection method and device |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103441864A (en)* | 2013-08-12 | 2013-12-11 | 江苏华大天益电力科技有限公司 | Method for monitoring illegal external connection of terminal equipment |
| CN103929323A (en)* | 2013-12-16 | 2014-07-16 | 汉柏科技有限公司 | Health degree monitoring method of cloud network equipment |
| CN104821943A (en)* | 2015-04-27 | 2015-08-05 | 西北工业大学 | Method for enhancing security of access of Linux hosts to network system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103441864A (en)* | 2013-08-12 | 2013-12-11 | 江苏华大天益电力科技有限公司 | Method for monitoring illegal external connection of terminal equipment |
| CN103929323A (en)* | 2013-12-16 | 2014-07-16 | 汉柏科技有限公司 | Health degree monitoring method of cloud network equipment |
| CN104821943A (en)* | 2015-04-27 | 2015-08-05 | 西北工业大学 | Method for enhancing security of access of Linux hosts to network system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106850534A (en)* | 2016-11-30 | 2017-06-13 | 北海高创电子信息孵化器有限公司 | A kind of scientific and technological information detection method based on internet |
| CN107172646A (en)* | 2017-06-06 | 2017-09-15 | 苏州小雨伞网络科技有限公司 | A kind of striding equipment method for monitoring network |
| CN107277040A (en)* | 2017-07-20 | 2017-10-20 | 西安云雀软件有限公司 | A kind of method for carrying out terminal Access Control in Intranet |
| CN107948199A (en)* | 2017-12-27 | 2018-04-20 | 北京奇安信科技有限公司 | A kind of method and device being used for quickly detecting to terminal shared access |
| CN110493195A (en)* | 2019-07-23 | 2019-11-22 | 上海文化广播影视集团有限公司 | A kind of network access control method and system |
| CN111177692A (en)* | 2019-11-29 | 2020-05-19 | 云深互联(北京)科技有限公司 | Terminal credibility level evaluation method, device, equipment and storage medium |
| CN111177692B (en)* | 2019-11-29 | 2022-07-12 | 云深互联(北京)科技有限公司 | Terminal credibility level evaluation method, device, equipment and storage medium |
| CN113285929A (en)* | 2021-05-10 | 2021-08-20 | 新华三技术有限公司 | Terminal validity detection method and device |
| Publication | Publication Date | Title |
|---|---|---|
| US11245687B2 (en) | Hardware-based device authentication | |
| US10757094B2 (en) | Trusted container | |
| EP2936372B1 (en) | Hardware-based device authentication | |
| US7526792B2 (en) | Integration of policy compliance enforcement and device authentication | |
| US8789202B2 (en) | Systems and methods for providing real time access monitoring of a removable media device | |
| US9503477B2 (en) | Network policy assignment based on user reputation score | |
| CN105610839A (en) | Controlling method and device for accessing network by terminal | |
| WO2018157247A1 (en) | System and method for securing communications with remote security devices | |
| US20090247125A1 (en) | Method and system for controlling access of computer resources of mobile client facilities | |
| US11812261B2 (en) | System and method for providing a secure VLAN within a wireless network | |
| US20220311777A1 (en) | Hardening remote administrator access | |
| US20240364689A1 (en) | Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty Requirements | |
| KR200427501Y1 (en) | User based network security system | |
| US11962621B2 (en) | Applying network access control configurations with a network switch based on device health | |
| CN116781398A (en) | Cloud platform login method and device, computer equipment and storage medium | |
| CN112491886A (en) | Security control method, system, device and storage medium based on network system | |
| US20250039174A1 (en) | Using hidden fields for bot detection | |
| KR102371181B1 (en) | Communication Security Method Performed in the User Devices installed Agent-Application and the Server-System that Communicated with the User Devices | |
| WO2023187310A1 (en) | Applying network access control configurations with a network switch based on device health | |
| Zhao et al. | User trust for access control in software defined networking | |
| CN119966703A (en) | A network access control method, system, device and medium based on zero trust | |
| Munir et al. | Security Attacks and Countermeasures in Cloud Computing | |
| WO2006001590A1 (en) | Netwok security system co-operated with an authentification server and method thereof |
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication | Application publication date:20160525 |