CN103973678B - Access control method for terminal computer - Google Patents

Access control method for terminal computer Download PDF

Info

Publication number
CN103973678B
CN103973678B CN201410175331.9A CN201410175331A CN103973678B CN 103973678 B CN103973678 B CN 103973678B CN 201410175331 A CN201410175331 A CN 201410175331A CN 103973678 B CN103973678 B CN 103973678B
Authority
CN
China
Prior art keywords
mac
terminal
port
authentication
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410175331.9A
Other languages
Chinese (zh)
Other versions
CN103973678A (en
Inventor
刘建兵
薛锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410175331.9A priority Critical patent/CN103973678B/en
Publication of CN103973678A publication Critical patent/CN103973678A/en
Application granted granted Critical
Publication of CN103973678B publication Critical patent/CN103973678B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an access control method for a terminal computer. A terminal has five states, wherein according to the first state, the terminal is an invalid terminal, according to the second state, the terminal is a valid terminal without installing a client side, according to the third state, the terminal is a terminal with an installed valid client side, according to the fourth state, the terminal is a terminal with a valid client side uninstalled, and according to the fifth state, the terminal is a terminal with a privately reinstalled client side. The method comprises the following steps that if the terminal is in the third state, the terminal passes authentication in the access process; if the terminal is in the first state, or the second state, or the fourth state or the fifth state, the terminal cannot pass the authentication in the access process, and the terminal can get access to a network only by forcibly installing the valid client side on the terminal. According to the access control method for the terminal computer, the protected MAC, log-on messages and on-line states are distinguished through the authentication process of MAC authentication, log-on authentication and on-line authentication, so that the five states of the terminal computer are found in real time, and the different authentication processes are performed on the terminal in the different states.

Description

A kind of access management-control method of terminal computer
Technical field
The invention belongs to terminal computer access management technology field, and in particular to a kind of access management and control of terminal computer Method.
Background technology
At present all of terminal management system realizes the premise to terminal management, is all that terminal conduit has been mounted with terminal Reason client software.
The management of terminal computer, using client-server mode, i.e., so-called C/S frameworks, the present invention is no exception Employing this framework.Client is responsible for the status information of acquisition terminal computer, including the basic configuration letter of terminal computer Breath (such as CPU usage, MEM utilization rates, memory utilization rate), system information (version, system password such as operating system, Number etc. of patch is installed), application message (anti-virus software, the various application programs such as run) and Terminal Security Management Information that strategy needs (such as system whether illegal external connection, system password meet code requirement);Server is collecting visitor Statistics, analysis and the management of terminal situation are carried out on the basis of the end data of family.If being fitted without on terminal computer or unloading Client software, server cannot just obtain the relevant information of the terminal, and the terminal cannot include terminal management scope;Such as Fruit does not find and controls the ways and means that this kind of terminal computer installs client, and this part terminal computer will swim always From outside terminal management scope, and become the dead angle and blind area of terminal computer management, all of terminal computer management is arranged Applying all can not play a role thereon.
The content of the invention
(1) technical problem to be solved
For the problem for overcoming prior art to exist, the present invention proposes a kind of access management-control method of terminal computer.
(2) technical scheme
The access management-control method of terminal computer proposed by the present invention, the terminal includes five kinds of states, and first state is Illegal terminal, the second state be do not install client the legal terminal third state be installed the terminal of legitimate client, The terminal that four states are the unloaded terminal of legitimate client, the 5th state is refitting client privately, the method includes following Each step:If the terminal is the third state, the terminal in access procedure by certification, if the terminal be first, Secondth, the 4th or the 5th state, then the terminal can not be by certification in access procedure, and in pressure, the terminal installs legitimate client Network is had access to after end.
(3) beneficial effect
Three verification process that the present invention passes through MAC certifications, authentication registration and on-line authentication composition, to MAC, the note protected Volume information, presence are differentiated, find in real time terminal computer five kinds of states (1. illegal terminal, 2. client is not installed The legal terminal at end, the terminal for 3. having installed legitimate client, 4. the unloaded terminal of legitimate client, 5. reset client privately The terminal at end), different authentication processings are done to five kinds of states, 3. the state that realizes passes through, discovery 1. 2. 4. 5. can not lead to Cross checking.By the enforcement of the technical measures, 1. 2. 4. 5. the terminal computer of state installs legitimate client (including this for pressure Other clients that the client of system and management are required), access network is otherwise unable to, reach and finally make control measures covering institute There is the purpose of online terminal computer, eliminate management dead angle and blind area.And existing all terminal management systems, including being based on 3. the terminal management system of 802.1x technologies, all can only find state, it is impossible to find and differentiate state 1. 2. 4. 5., therefore cannot Effectively management is realized to state terminal 1. 2. 4. 5., management dead angle and blind area is left.
Description of the drawings
Fig. 1 is the flow chart that terminal computer of the present invention accesses management-control method.
Specific embodiment
To make the object, technical solutions and advantages of the present invention become more apparent, below in conjunction with specific embodiment, and reference Accompanying drawing, the present invention is described in more detail.
Fig. 1 is the flow chart of the access management-control method of terminal computer proposed by the present invention.Realize that the method mainly considers Factor include:1) management and control ability of the SEAD modules to switch ports themselves in ACM;2) client registers in PROXY modules in ACM Data;3) in ACM the client registers data that MCC is realized global synchronization, the Access Control without client terminal is divided into two kinds Situation, a kind of terminal for being to be fitted without completely client software, another kind is the terminal for installing terminal software unloading.
As shown in figure 1, the method specifically includes following steps:
The present invention cuts with one fixed MAC Address, can connect network by wired network port and wireless network port IP device be all considered as terminal, including PC, the network printer, IP phone, the various network equipments being connected on access switch.
Terminal equipment access network, is the course of work of ARP protocol.In ethernet networks, every network node all can be certainly An ARP list is set up in oneself ARP buffering areas, to represent the corresponding relation of switch ports themselves PORT and MAC Address.When one Network node is connected on access switch, and after physical link successful connection, the ARP protocol on network node is to the Home Network being located Section sends ARP broadcast packets, declares the MAC Address of oneself, and switch receives after this ARP broadcast, the MAC Address of the node is write Enter the ARP buffering areas of oneself, indicate the MAC Address of the node and the corresponding relation of network port PORT, network node also can be received The ARP broadcast packets of other nodes come to switch forwarding, write the ARP buffering areas of oneself, complete the access of the node Journey.
When source node needs for a packet to be sent to destination node, oneself ARP buffering area row can be first checked for Whether there is the corresponding MAC Address of the IP address in table, if it has, just directly delivering a packet to this MAC Address;If No, just the corresponding MAC Address of this destination node is inquired about to the broadcast packet of local network segment one ARP request of initiation.This ARP please Seek the IP address of the IP address, hardware address and destination host in packet including source node.All of node is received in network To after this ARP request, can check whether purpose IP in packet is consistent with the IP address of oneself.If differ be ignored as This packet;If identical, the node is first added to the MAC Address and IP address of transmitting terminal in the ARP lists of oneself, such as There is the information of the IP in fruit ARP table, then covered, then sent an arp response packet to source node, told Other side oneself is the MAC Address that it is required to look up;Source node is received after this arp response packet, by the destination host for obtaining IP address and MAC Address be added in the ARP lists of oneself, and start the transmission of data using this information.
Alleged MAC certifications of the invention:The terminal device MAC that MAC authentication module Jing switches are obtained, inquiry MAC certifications storehouse, Confirm the MAC legitimacies of access device, legal (existing in storehouse), then by certification, illegal (not existing in storehouse) then refuses.
Alleged authentication registration of the invention:Authentication registration module polls endpoint registration storehouse, to the MAC from client Login state checking is carried out, whether the client for confirming the MAC is registered, registration (existing in storehouse) is then by certification, unregistered (storehouse In do not exist), then refuse.
Alleged on-line authentication of the invention:On-line authentication module selects the online storehouse of terminal by looking into, to by the visitor of authentication registration Family end carries out presence confirmation, then passes through online, does not then refuse online.
Different according to the state of terminal, authentication processing is also what is differed.The SOT state of termination that the present invention considers includes five kinds, It is respectively:1. illegal terminal, the legal terminal for 2. not installing client, the terminal, the 4. legal visitor that have 3. installed legitimate client Five kinds of states are done different authentication processings by the unloaded terminal in family end, the terminal for 5. resetting client privately, realize state 3. terminal can be by certification, and state terminal 1. 2. 4. 5. can not be by checking.By the enforcement of the technical measures, Forced regime be 1. 2. 4. terminal computer 5. install legitimate client (client and management including the system require its Its client), access network is otherwise unable to, the purpose for finally making control measures cover all online terminal computers is reached, disappear Except management dead angle and blind area.
And existing all terminal management systems, including the terminal management system based on 802.1x technologies, all can only find State is terminal 3., it is impossible to find and resolution state is terminal 1. 2. 4. 5., thus cannot be to state 1. 2. 4. 5. end Effectively management is realized at end, leaves management dead angle and blind area.
The verification process of the terminal of different conditions is illustrated separately below.
1) verification process of illegal terminal
Never occurred in Home Network, the registered terminal device in MAC certifications storehouse, is not considered as illegal terminal, its MAC Not in MAC certifications storehouse.When illegal terminal connects switch, its MAC Address is obtained by switch, and switch is in the mac table MAC-PORT relations are set up, MAC authentication modules read the MAC-PORT using snmp protocol, specifically, MAC authentication modules lead to The MAC table information that switch is read in snmp polling is crossed, switch MAC-PORT is obtained, then MAC authentication modules are with MAC as major key Inquiry MAC certifications storehouse, MAC certifications storehouse only preserves the MAC of legal terminal, and Query Result is not to exist and returning, wherein exist returning Return " 1 ", there is no return " and 0 ", MAC authentication modules are judged as that illegal terminal is accessed, MAC certification moulds according to this returning result The MAC-PORT is given closing performing module by block, is closed performing module and is closed the MAC- to switch transmission using snmp protocol PORT port commands, switch close port, MAC is denied access, and specifically, closes performing module and sends to switch PORT in MAC-PORT is delivered as SNMP parameters and changed planes, and closes switch ports themselves.
In above procedure, the MAC is obtained by system, once Jing manual confirmations are legal terminal equipment, its MAC is chased after MAC certifications storehouse is added to, becomes legal terminal, be changed into the legal terminal for not installing client, i.e. state terminal 2..
2) verification process of the legal terminal of client is not installed
When the legal terminal connection switch of client is not installed, its verification process and 1) similar process, difference is, from The Query Result that MAC certifications storehouse returns to MAC authentication modules is different, and to exist, accordingly result judges MAC authentication modules its result For legal terminal, no longer to performing module transmission closing switch ports themselves instruction is closed, the opening of switch ports themselves is kept, Into authentication registration process.
After MAC certifications pass through, the MAC-PORT is given authentication registration module by MAC authentication modules, authentication registration module with MAC is search index endpoint registration storehouse, and endpoint registration storehouse only preserves the MAC of registration terminal, therefore the result for returning not exist , there is return in the client registers information of the terminal " 1 ", there is no return " and 0 ", authentication registration module is judged as accordingly unregistered Client, to performing module is closed MAC-PORT out codes are sent, and close switch ports themselves, and refusal is accessed.
The terminal is due to being fitted without client software, it is impossible to the subsequent process of renewal of registration certification.Once the terminal peace Filled client software, and unique mark (its registration process is completed in window phase) be assigned, then be changed into be mounted with it is legal The terminal of client, i.e. state are 3..
3) it is mounted with the terminal authentication procedure of client software
The terminal of client software is mounted with, Jing window phases complete registration process, after obtaining unique mark, becomes installation and close The terminal of method client, unique mark is to discriminate between the foundation of legitimate client and illegitimate client, and it is in client and agency PROXY two ends are used in client with agent communication with the preservation of fingerprint form as checking information.
State terminal connection network 3., verification process is similar to aforementioned process, and difference is to return to authentication registration mould The result of block is exist, and authentication registration module is judged as accordingly registered clients, no longer sends out to close to closing performing module and hands over Change planes port command, keep switch ports themselves opening, certification passes through, and send on-line authentication module by MAC-PORT, enter On-line authentication process.Specifically, endpoint registration storehouse returns " 1 ", and authentication registration module gives the MAC-PORT of the terminal online Authentication module;Return " 0 ", MAC-PORT is sent closing performing module by Registering modules.
Client software in terminal, MAC Address, IP address and unique mark OID are protected in the way of heartbeat PROXY communications are held and act on behalf of, the presence of all clients is recorded in real time at the online storehouse of terminal by agency.
On-line authentication module after the MAC-PORT that authentication registration module is sent is received, immediately with MAC as search index end Online storehouse, the online storehouse of terminal is held to maintain the client presence of legal terminal, " 1 " is masked as online, be masked as offline " 0 ". The online storehouse returning result of terminal is online, and on-line authentication module is judged as that accordingly legitimate client is online, does not perform mould to closing Block sends close port instruction, preserves switch ports themselves opening, by checking;If the result for returning is offline, prolong Late a period of time (starting up of terminal starting time), presence is inquired about again, returning result is online, then by checking.
4) the unloaded terminal authentication procedure of legitimate client
The unloaded terminal of legitimate client, its MAC and the client once installed are respectively present in MAC certifications storehouse and end End registry, and obtain legal unique mark OID.
After state terminal connection switch 4., 3. verification process is similar to state for its verification process, can be recognized by MAC Card and authentication registration, except for the difference that, it is impossible to by on-line authentication, because its client has been unloaded, agency does not receive the end The heartbeat message of end client, therefore the client can be in off-line state, the result of return is offline, on-line authentication module evidence This judges that client has been unloaded, and to performing module is closed MAC-PORT out codes are sent, and closes switch ports themselves, and refusal connects Enter.
5) terminal authentication procedure of client is reset privately
Client has to pass through registration process and could obtain unique mark OID, and a note is produced in registration database Volume record, the client-side program for resetting privately, without corresponding registration in not registered then endpoint registration storehouse, also without only One mark.Client because lacking unique mark, and endpoint registration storehouse in without corresponding record, it is impossible to and agent communication, agency Also the not no corresponding status data of the client in the online storehouse of terminal of maintenance.
State 5. terminal connection switch, its verification process and state 4. similar process, can be by MAC certifications and registration Certification, except for the difference that, it is impossible to by on-line authentication, because its client had been unloaded, the client heartbeat letter installed privately Cease and lack OID information, the proxied discarding of meeting, without its corresponding status information in the online storehouse of terminal, the result of return is not deposit , on-line authentication module judges that accordingly client resets privately, to close performing module send MAC-PORT out codes, close Switch ports themselves, refusal is accessed.
Three verification process that the present invention passes through MAC certifications, authentication registration and on-line authentication composition, to MAC, the note protected Volume information, presence are differentiated, find in real time terminal computer five kinds of states (1. illegal terminal, 2. client is not installed The legal terminal at end, the terminal for 3. having installed legitimate client, 4. the unloaded terminal of legitimate client, 5. reset client privately The terminal at end), different authentication processings are done to five kinds of states, realize state and 3. pass through, 1. discovery 2. 4. 5. can not lead to Cross checking.By the enforcement of the technical measures, 1. 2. 4. 5. the terminal computer of state installs legitimate client (including this for pressure Other clients that the client of system and management are required), access network is otherwise unable to, reach and finally make control measures covering institute There is the purpose of online terminal computer, eliminate management dead angle and blind area.
And existing all terminal management systems, including the terminal management system based on 802.1x technologies, all can only find State is 3., it is impossible to finds and differentiates state 1. 2. 4. 5., therefore cannot realize effectively management to state terminal 1. 2. 4. 5., Leave management dead angle and blind area.
Particular embodiments described above, has been carried out further in detail to the purpose of the present invention, technical scheme and beneficial effect Describe in detail bright, it should be understood that the foregoing is only the specific embodiment of the present invention, be not limited to the present invention, it is all Within the spirit and principles in the present invention, any modification, equivalent substitution and improvements done etc. should be included in the protection of the present invention Within the scope of.

Claims (7)

1. a kind of access management-control method of terminal computer, the terminal includes five kinds of states, and first state is illegal terminal, the Two-state is that not install the legal terminal of client, the third state be to have installed the terminal of legitimate client, the 4th state to close The unloaded terminal of method client, the 5th state are the terminal for resetting client privately, and the method includes following steps:If The terminal is the third state, then the terminal in access procedure by certification, if the terminal be the first, second, the 4th or 5th state, then the terminal can not be by certification in access procedure, can after forcing the terminal to install legitimate client Access network;
Wherein, the client-side program for resetting privately of the 5th state, without corresponding registration in not registered then endpoint registration storehouse Record, also without unique mark, client because lacking unique mark, and endpoint registration storehouse in not no corresponding registration, because This cannot and agent communication, the also not no corresponding status data of the client in the online storehouse of terminal of agent maintenance;When the terminal During connection switch, the MAC Address of the terminal is obtained by switch, and switch sets up in the mac table MAC-PORT relations, MAC Authentication module reads the MAC-PORT using snmp protocol, then inquires about MAC certifications storehouse, and Query Result is the presence of the terminal MAC Address, then MAC certifications storehouse to MAC authentication modules return Query Result, MAC authentication modules according to this return Query Result, The terminal is judged for legal terminal, after MAC certifications pass through, the MAC-PORT is sent to authentication registration module by MAC authentication modules, With MAC as search index endpoint registration storehouse, the result returned after inquiry is registered MAC to authentication registration module, afterwards by MAC- PORT is sent to on-line authentication module, and on-line authentication module is with MAC after the MAC-PORT that authentication registration module is sent is received The online storehouse of search index terminal, the client heartbeat message installed privately lacks OID information, and the proxied discarding of meeting, terminal is online Without its corresponding status information in storehouse, the result of return does not exist for the terminal, and on-line authentication module judges accordingly client Reset privately, to performing module is closed MAC-PORT out codes are sent, close switch ports themselves, refusal is accessed.
2. method according to claim 1, the method is further included:For the terminal of first state, the terminal is connecing Verification process during entering includes:When illegal terminal connects switch, the MAC Address of the terminal is obtained by switch, is handed over Changing planes MAC-PORT relations of set up in the mac table, MAC authentication modules read the MAC-PORT, Ran Houcha using snmp protocol MAC certifications storehouse is ask, Query Result is the MAC Address that there is no the terminal, then MAC certifications storehouse returns to MAC authentication modules and inquires about As a result, MAC authentication modules judge the terminal for illegal terminal access according to this return Query Result, and MAC authentication modules should MAC-PORT is sent to closing performing module, closes performing module and closes the MAC-PORT to switch transmission using snmp protocol Port command, switch close port, MAC is denied access.
3. method according to claim 2, it is characterised in that Jing is artificial after the MAC of the illegal terminal is obtained by system When confirming as legal terminal equipment, its MAC is appended to MAC certifications storehouse, becomes legal terminal, and the illegal terminal is changed into does not pacify The legal terminal of dress client.
4. method according to claim 1, it is characterised in that for the terminal of the second state, the terminal is in access procedure In verification process include:When the terminal connection switch, the MAC Address of the terminal is obtained by switch, and switch is in MAC MAC-PORT relations are set up in table, MAC authentication modules read the MAC-PORT using snmp protocol, then inquire about MAC certifications Storehouse, Query Result is the MAC Address that there is the terminal, then MAC certifications storehouse returns Query Result, MAC certifications to MAC authentication modules Module judges the terminal for legal terminal according to this return Query Result, and after MAC certifications pass through, MAC authentication modules should MAC-PORT is sent to authentication registration module, and authentication registration module is returned with MAC as search index endpoint registration storehouse after inquiry As a result it is the client registers information that there is no the terminal, authentication registration module judges that accordingly the terminal is unregistered client, MAC-PORT out codes are sent to performing module is closed, switch ports themselves are closed, refusal is accessed.
5. method according to claim 1, it is characterised in that for the terminal of the third state, the terminal is in access procedure In verification process include:When the terminal connection switch, the MAC Address of the terminal is obtained by switch, and switch is in MAC MAC-PORT relations are set up in table, MAC authentication modules read the MAC-PORT using snmp protocol, then inquire about MAC certifications Storehouse, Query Result is the MAC Address that there is the terminal, then MAC certifications storehouse returns Query Result, MAC certifications to MAC authentication modules Module judges the terminal for legal terminal according to this return Query Result, and after MAC certifications pass through, MAC authentication modules should MAC-PORT is sent to authentication registration module, and authentication registration module is returned with MAC as search index endpoint registration storehouse after inquiry As a result it is registered clients, afterwards MAC-PORT is sent to into on-line authentication module, on-line authentication module is recognized receiving registration After the MAC-PORT that card module is sent, with MAC as the online storehouse of search index terminal, returning result is that the terminal is online, is recognized online Card module is judged as that accordingly legitimate client is online, not to performing module transmission close port instruction is closed, preserves and exchanges generator terminal Mouth opening, by checking;If the result for returning is offline, postpone certain hour, presence is inquired about again, return As a result it is online, then by checking.
6. method according to claim 1, it is characterised in that for the terminal of the 4th state, the terminal is in access procedure In verification process include:When the terminal connection switch, the MAC Address of the terminal is obtained by switch, and switch is in MAC MAC-PORT relations are set up in table, MAC authentication modules read the MAC-PORT using snmp protocol, then inquire about MAC certifications Storehouse, Query Result is the MAC Address that there is the terminal, then MAC certifications storehouse returns Query Result, MAC certifications to MAC authentication modules Module judges the terminal for legal terminal according to this return Query Result, and after MAC certifications pass through, MAC authentication modules should MAC-PORT is sent to authentication registration module, and authentication registration module is returned with MAC as search index endpoint registration storehouse after inquiry As a result it is registered clients, afterwards MAC-PORT is sent to into on-line authentication module, on-line authentication module is recognized receiving registration After the MAC-PORT that card module is sent, with MAC as the online storehouse of search index terminal, returning result is that the terminal is offline, is recognized online Card module judges that accordingly client has been unloaded, and to performing module is closed MAC-PORT out codes are sent, and closes and exchanges generator terminal Mouthful, refusal is accessed.
7. method according to claim 6, it is characterised in that the unloaded terminal of legitimate client, its MAC and once pacified The client of dress is respectively present in MAC certifications storehouse and endpoint registration storehouse, and obtains legal unique mark OID, the terminal Because its client has been unloaded, agency does not receive the heartbeat message of the client terminals, thus the client can be in from Line states, the result of return is offline, and on-line authentication module judges that accordingly client has been unloaded, and is sent to performing module is closed MAC-PORT out codes, close switch ports themselves, and refusal is accessed.
CN201410175331.9A 2014-04-28 2014-04-28 Access control method for terminal computer Expired - Fee Related CN103973678B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410175331.9A CN103973678B (en) 2014-04-28 2014-04-28 Access control method for terminal computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410175331.9A CN103973678B (en) 2014-04-28 2014-04-28 Access control method for terminal computer

Publications (2)

Publication Number Publication Date
CN103973678A CN103973678A (en) 2014-08-06
CN103973678B true CN103973678B (en) 2017-04-26

Family

ID=51242724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410175331.9A Expired - Fee Related CN103973678B (en) 2014-04-28 2014-04-28 Access control method for terminal computer

Country Status (1)

Country Link
CN (1) CN103973678B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113453A (en) * 2014-08-08 2014-10-22 福建富士通信息软件有限公司 Method and system for monitoring and alarming abnormal parallel accessing of local area network
CN110505357B (en) * 2019-09-06 2021-04-02 上海航天测控通信研究所 Management method of aerospace VOIP voice terminal
CN114124900B (en) * 2021-11-03 2023-08-01 中盈优创资讯科技有限公司 Method and device for positioning private small-route equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1571799A1 (en) * 2004-03-02 2005-09-07 Alcatel A method to grant access to a data communication network and related devices
CN101714927A (en) * 2010-01-15 2010-05-26 福建伊时代信息科技股份有限公司 Network access control method for comprehensive safety management of inner network
CN101883090A (en) * 2010-04-29 2010-11-10 北京星网锐捷网络技术有限公司 Client access method, equipment and system
CN101909059A (en) * 2010-07-30 2010-12-08 北京星网锐捷网络技术有限公司 Method and system for deleting residual client information and authentication server
CN103078813A (en) * 2013-01-04 2013-05-01 西安交大捷普网络科技有限公司 Simple network management protocol (SNMP)-based terminal security access control method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1571799A1 (en) * 2004-03-02 2005-09-07 Alcatel A method to grant access to a data communication network and related devices
CN101714927A (en) * 2010-01-15 2010-05-26 福建伊时代信息科技股份有限公司 Network access control method for comprehensive safety management of inner network
CN101883090A (en) * 2010-04-29 2010-11-10 北京星网锐捷网络技术有限公司 Client access method, equipment and system
CN101909059A (en) * 2010-07-30 2010-12-08 北京星网锐捷网络技术有限公司 Method and system for deleting residual client information and authentication server
CN103078813A (en) * 2013-01-04 2013-05-01 西安交大捷普网络科技有限公司 Simple network management protocol (SNMP)-based terminal security access control method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
终端控制保护技术研究与系统设计;曹吉;《中国优秀硕士学位论文全文数据库 信息科技辑》;20120315(第3期);正文第6页第1段、第28页第2段、第51页第5.3小节 *

Also Published As

Publication number Publication date
CN103973678A (en) 2014-08-06

Similar Documents

Publication Publication Date Title
US20220104018A1 (en) Cross access login controller
CN100437550C (en) Ethernet confirming access method
CN104796969A (en) Network accessing method and system for equipment of internet of things on basis of recognition codes of internet of things
CN102438028B (en) A kind of prevent Dynamic Host Configuration Protocol server from cheating method, Apparatus and system
CN109862565A (en) A kind of WLAN unaware control method, system and readable storage medium storing program for executing
CN100546304C (en) A kind of method and system that improves network dynamic host configuration DHCP safety
CN103354550A (en) Authorization control method and device based on terminal information
CN104954508B (en) A kind of system and its auxiliary charging method for DHCP protocol auxiliary charging
CN103973678B (en) Access control method for terminal computer
CN101707587A (en) Method, device and Radius server used for detecting client connection status
CN102984031A (en) Method and device for allowing encoding equipment to be safely accessed to monitoring and control network
CN103825901A (en) Network access control method and equipment
CN111683162A (en) IP address management method and device based on flow identification
US20120209976A1 (en) Remote management and control using common internet protocols
CN101123559B (en) A green network access service deployment system and authorized access method for this service
CN100544348C (en) Act on behalf of detection method
CN100454825C (en) Static user access network control method based on MAC address
CN103338440B (en) Authentication method in Verification System and equipment end
CN109981462A (en) A kind of message processing method and device
CN1265579C (en) Method for network access user authentication
CN113556337A (en) Terminal address identification method, network system, electronic device and storage medium
CN113812125B (en) Verification method and device for login behavior, system, storage medium and electronic device
TWI628936B (en) Automatic control system for controlling the existence of internet protocol address device and control method thereof
CN1832491A (en) PnP network technology insertion method of network video product
CN103929726B (en) Wireless LAN accesses control correlation technique and system in interacting with fixed network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170426

Termination date: 20190428

CF01 Termination of patent right due to non-payment of annual fee