CN109922058B - Intranet protection method for preventing illegal access to intranet - Google Patents

Intranet protection method for preventing illegal access to intranet Download PDF

Info

Publication number
CN109922058B
CN109922058B CN201910146962.0A CN201910146962A CN109922058B CN 109922058 B CN109922058 B CN 109922058B CN 201910146962 A CN201910146962 A CN 201910146962A CN 109922058 B CN109922058 B CN 109922058B
Authority
CN
China
Prior art keywords
intranet
equipment
network segment
access
terminal router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910146962.0A
Other languages
Chinese (zh)
Other versions
CN109922058A (en
Inventor
严俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi Wangshi Technology Co ltd
Original Assignee
Jiangxi Wangshi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Wangshi Technology Co ltd filed Critical Jiangxi Wangshi Technology Co ltd
Priority to CN201910146962.0A priority Critical patent/CN109922058B/en
Publication of CN109922058A publication Critical patent/CN109922058A/en
Application granted granted Critical
Publication of CN109922058B publication Critical patent/CN109922058B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an intranet protection method for preventing illegal access to an intranet, which comprises the steps of setting a terminal router, an intranet server and a switch, respectively connecting the intranet server and the switch with the terminal router, connecting employee equipment with the switch, and binding an MAC address of the employee equipment with an account number; the IP network segment accessed is divided into a server network segment, an employee network segment and a visitor network segment, so that illegal access is prevented, the IP and the network segment of the access equipment are classified and judged through a terminal router and an intranet server, corresponding access processing is carried out, a corresponding function switch is set, and when equipment which is not bound with an MAC address is manually set as the server network segment and the employee network segment address, an ARP deception protection mechanism is triggered to protect intranet safety. The invention prevents illegal access and protects the safety of the intranet.

Description

Intranet protection method for preventing illegal access to intranet
Technical Field
The invention relates to the technical field of network security, in particular to an intranet protection method for preventing illegal access to an intranet.
Background
The network security refers to that the hardware, software and data in the system of the network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates, and the network service is not interrupted. With the development of internet technology, a local area network, that is, an intranet is generally established in a large enterprise for network communication, the local area network basically adopts an ethernet based on broadcasting technology, and a communication data packet between any two nodes is not only received by network cards of the two nodes, but also intercepted by a network card of any one node on the same ethernet. Therefore, a hacker can capture all data packets on the Ethernet and unpack and analyze the data packets as long as the hacker accesses any node on the Ethernet to monitor, so that key information is stolen, enterprise information is leaked, and great loss is brought to enterprises; therefore, how to protect the security of the intranet and prevent the intrusion by illegal access is a problem that related personnel need to solve urgently.
Disclosure of Invention
The invention aims to provide an intranet protection method for preventing an intranet from being illegally accessed, so that the intranet is protected from being safely accessed and accessed illegally.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
an intranet protection method for preventing illegal access to an intranet comprises the following steps:
(S1) setting a terminal router, an intranet server and a switch, respectively connecting the intranet server and the switch with the terminal router, and connecting the employee equipment with the switch;
(S2) setting an intranet account and a password corresponding to the intranet account of the intranet network of each employee in the intranet server, setting an authentication form corresponding to the intranet account, adding the IP address and the MAC address of the employee equipment into the authentication form for binding, and establishing an authentication mechanism;
(S3) dividing an IP network segment into a server network segment, an employee network segment and a visitor network segment in a terminal router, correspondingly configuring an intranet server and an employee equipment IP in the server network segment and the employee network segment, and then setting an ARP spoofing protection mechanism for preventing ARP spoofing, a WiFi account and a password on the terminal router;
(S4) the device accesses the intranet network through the WiFi account and the password, the terminal router judges the IP attribute of the device, and if the device is a dynamic IP, the step (S5) is carried out; if the equipment is static IP, the terminal router judges that the equipment IP address network segment carries out corresponding access;
(S5) the intranet server judges whether the MAC address of the access equipment is bound with the account, if so, the terminal router allocates and binds the IP address of the employee network segment, and the step (S8) is entered; if not, the terminal router allocates the IP address of the visitor network segment and then enters the step (S6);
(S6) the terminal router judges the device access network segment, if the device access the intranet network, the step (S7) is carried out; (ii) a If the equipment accesses the external network, corresponding access is carried out according to the access authority set by the terminal router;
(S7) the authentication mechanism of the intranet server responds, the equipment authenticates through an intranet account and a corresponding password, after the authentication is passed, the equipment is temporarily released and temporary release time is set, if the equipment is still a visitor network segment IP address of a dynamic IP after the authentication is passed, the equipment sends a request continuous lease message to the terminal router in the temporary release time, the terminal router replies a NACK message of the equipment and reallocates an employee network segment IP address, and the MAC address of the equipment is bound with the IP address, and the step (S8) is entered; and if the device authentication is not passed, the access of the device is refused.
(S8) the equipment sends a self-checking ARP to the terminal router, the terminal router judges whether the MAC and the IP of the current equipment are consistent with the record of the terminal router, if not, the terminal router judges that the static IP of the equipment is manually set to be a server network segment or an employee network segment address to form conflict, and triggers an ARP deception protection mechanism to protect the safety of the intranet; if the device IP is consistent and the device IP is the employee network segment IP address, entering the step (S9);
(S9) the intranet server passes all access to the device.
In the step (S4), the terminal router determines the device IP attribute through a discover message sent when the device is accessed, and if the device IP attribute is a discover message without a dhcp message, the device IP attribute is a static IP, and if the device IP attribute is a discover message with a dhcp message, the device IP attribute is a dynamic IP.
In the step (S3), a first function switch for allowing the visitor segment device to access the external network and a second function switch for allowing the visitor segment device to access the internal network are also arranged on the terminal router; the opening or closing of the first function switch and the second function switch is set by an intranet administrator.
In the step (S4), the specific process of the terminal router accessing the static IP device to determine the IP address network segment is as follows:
(S41) the terminal router judges the IP address network segment of the equipment, if the network segment is a visitor network segment, the step is carried out (S6), and if the network segment is a server network segment or an employee network segment, the step is carried out (S42);
(S42) the intranet server judges whether the MAC address of the access equipment is bound with the account number, if so, the step is carried out (S8); if not, the process proceeds to step (S7).
In the step (S6), the specific process of accessing the external network by the device according to the access right set by the terminal router is as follows: if the first function switch is turned on, indicating that the visitor segment device is allowed to access the foreign network, the process proceeds to step (S8), and if the first function switch is turned off, indicating that the visitor segment device is not allowed to access the foreign network, the process proceeds to step (S7).
In the step (S7): if the IP address of the equipment passes the authentication and is the visitor network address of the static IP, after the temporary release time of the equipment expires, the authentication mechanism generates a response, and the equipment carries out authentication again in the authentication mechanism.
Specifically, in the step (S9), when the device accesses the inter-segment data, the access data is transmitted in three layers by the terminal router and controlled by the terminal router. The switch is a two-layer switch, and aiming at the transmission of two-layer data, namely intranet data, the two-layer switch is used for transmitting the data.
Specifically, the authentication method in the step (S7) includes WEB authentication, portal authentication, and wechat authentication. In the step (S2), MAC addresses and IP addresses of multiple devices may be added to an authentication form of an account for binding.
Compared with the prior art, the invention has the following beneficial effects:
(1) according to the invention, the account and the password corresponding to the account are firstly set in the intranet server, the equipment is connected through the WiFi password when the intranet is accessed, then the equipment of the unbound visitor network segment is authenticated through the account and the password, and the intranet access can be carried out through the authenticated equipment, so that illegal intranet intrusion is prevented preliminarily, and a first layer of protection is provided for the intranet.
(2) According to the invention, the MAC address of the equipment is bound with the account, and the unbound equipment can access the internal network only by performing function switch judgment or other operations; so get off, even staff's account number password reveals, because it does not bind the account number, still can not access the intranet, provide second floor safety guarantee for the intranet, and an account number can bind a plurality of equipment MAC addresses, provides convenience for daily staff's use.
(3) According to the invention, the first function switch and the second function switch are set, so that whether the switch allows unbound equipment to access correspondingly can be manually controlled, the operation is flexible, the access of staff equipment and the access of safe visitors to an intranet are facilitated, and convenience is provided.
(4) The invention divides the device IP into a server network segment, a staff network segment and a visitor network segment, and carries out corresponding processing when the device is accessed into the intranet, the device of the server network segment or the staff network segment bound with the account number can directly access, the device of the server network segment or the staff network segment not bound with the account number needs to be bound and accessed through authentication, the device of the visitor network segment not bound with the account number needs to be processed through a function switch and authenticated, and if the device which is judged to be not bound with the MAC address is manually set as the server network segment or the staff network segment address, an ARP deception protection mechanism can be triggered to protect the safety of the intranet.
(5) The invention transmits data by setting the switch and the terminal router, and transmits data of two-layer data, namely intranet data, by the two-layer switch, while data accessed by a cross-network section becomes three-layer transmission by the terminal router, so that an uncontrollable mode of direct communication of the two-layer data becomes a controllable mode of three layers, and the terminal router can control the data accessed by the cross-network section, thereby preventing illegal data access.
Drawings
FIG. 1 is a flow chart of an access method according to the present invention.
Detailed Description
The present invention will be further described with reference to the following description and examples, which include but are not limited to the following examples.
Examples
As shown in fig. 1, an intranet protection method for preventing illegal access to an intranet includes the following steps:
(S1) setting a terminal router, an intranet server and a switch, respectively connecting the intranet server and the switch with the terminal router, and connecting the employee equipment with the switch.
(S2) setting an intranet account and a password corresponding to the intranet account of the intranet network of each employee in the intranet server, setting an authentication form corresponding to the intranet account, adding the IP address and the MAC address of the employee equipment into the authentication form for binding, and establishing an authentication mechanism.
(S3) dividing an IP network segment into a server network segment, an employee network segment and a visitor network segment in a terminal router, correspondingly configuring an intranet server and an employee equipment IP in the server network segment and the employee network segment, then setting an ARP spoofing protection mechanism for preventing ARP spoofing, a WiFi account and a password on the terminal router, and setting a first function switch for allowing the visitor network segment equipment to access an extranet network or not and a second function switch for allowing the visitor network segment equipment to access the intranet network or not; the opening or closing of the first function switch and the second function switch is set in advance by an intranet administrator.
(S4) the device accesses the intranet network through the WiFi account and the password, the terminal router judges the IP attribute of the device through a discover message sent when the device accesses, if the device is the discover message without the dhcp message, the device is a static IP, the terminal router judges the IP address network segment of the device, if the device is the visitor network segment, the step (S6) is carried out, if the device is the server network segment or the staff network segment, the intranet server judges whether the MAC address of the access device is bound with the account, if the MAC address is bound, the step (S8) is carried out, and if the MAC address is not bound, the step (S7) is carried out; if the message is a discover message with a dhcp message, the message is a dynamic IP, and the step is entered (S5).
(S5) the intranet server judges whether the MAC address of the access equipment is bound with the account, if so, the terminal router allocates and binds the IP address of the employee network segment, and the step (S8) is entered; if not, the terminal router allocates the IP address of the visitor network segment and then enters the step (S6);
(S6) the terminal router judges the device access network segment, if the device access the intranet network, the step (S7) is carried out; if the device accesses the external network, the corresponding processing is carried out according to the first function switch, if the first function switch is turned on, the visitor segment device is allowed to access the external network, the step is entered (S8), and if the first function switch is turned off, the visitor segment device is not allowed to access the external network, the step is entered (S7).
(S7) the authentication mechanism of the intranet server responds, the equipment authenticates through an intranet account and a corresponding password, after the authentication is passed, the equipment is temporarily released and temporary release time is set, if the equipment is still a visitor network segment IP address of a dynamic IP after the authentication is passed, the equipment sends a request continuous lease message to the terminal router in the temporary release time, the terminal router replies a NACK message of the equipment and reallocates an employee network segment IP address, and the MAC address of the equipment is bound with the IP address, and the step (S8) is entered; if the IP address of the equipment passes the authentication is the visitor network address of the static IP, after the temporary release time of the equipment expires, the authentication mechanism generates correspondence, and the equipment carries out authentication again in the authentication mechanism; and if the device authentication is not passed, the access of the device is refused.
(S8) the equipment sends a self-checking ARP to the terminal router, the terminal router judges whether the MAC and the IP of the current equipment are consistent with the record of the terminal router, if not, the terminal router judges that the static IP of the malicious equipment is manually set to be a server network segment or an employee network segment address to form conflict, and an ARP deception protection mechanism is triggered to protect the safety of the intranet; if the device IP is consistent and the device IP is the employee network segment IP address, entering the step (S9);
(S9) the intranet server releases all the access of the device, and when the device accesses the inter-network data, the access data is transmitted in three layers by the terminal router and controlled by the terminal router.
In order to facilitate the management of the employees, when the equipment in the employee network segment is accessed, the intranet server records the MAC address login days of the equipment.
In the actual configuration of the intranet, the switch is a two-layer switch, and a corresponding authentication mechanism is set in an intranet server; the terminal router divides network segments, an intranet server and an employee device IP are correspondingly configured in the server network segment and the employee network segment, the IP address and the MAC address of the intranet server and the employee device IP are recorded and bound through an authentication form, and a function switch and an ARP spoofing protection mechanism are set; in order to protect the safety of the intranet, the lease renewal time of the visitor network is set to be short, the authenticated visitor network segment address equipment can be released for a short time within the lease renewal time, and corresponding authentication needs to be carried out again after the lease renewal time elapses. And all the devices connected with the intranet need to send a self-check ARP to the terminal router, the terminal router judges whether the MAC and the IP of the current device are consistent with the records of the terminal router, and if the MAC and the IP are inconsistent with the records of the terminal router, the terminal router triggers the ARP to deceive the intranet. Meanwhile, according to actual requirements, a corresponding network service platform can be set, employees can bind the intranet accounts in the network service platform, and when new equipment binds the intranet accounts, the intranet server feeds back the equipment information to the network service platform, so that convenience is provided for daily use, and invasion of malicious equipment is also prevented.
Through the design, the invention effectively prevents the situation of illegal invasion of the intranet and ensures the safety of the intranet.
The above-mentioned embodiment is only one of the preferred embodiments of the present invention, and should not be used to limit the scope of the present invention, but all the insubstantial modifications or changes made within the spirit and scope of the main design of the present invention, which still conform to the technical problems of the present invention, should be included in the scope of the present invention.

Claims (9)

1. An intranet protection method for preventing illegal access to an intranet is characterized by comprising the following steps:
(S1) setting a terminal router, an intranet server and a switch, respectively connecting the intranet server and the switch with the terminal router, and connecting the employee equipment with the switch;
(S2) setting an intranet account and a password corresponding to the intranet account of the intranet network of each employee in the intranet server, setting an authentication form corresponding to the intranet account, adding the IP address and the MAC address of the employee equipment into the authentication form for binding, and establishing an authentication mechanism;
(S3) dividing an IP network segment into a server network segment, an employee network segment and a visitor network segment in a terminal router, correspondingly configuring an intranet server and an employee equipment IP in the server network segment and the employee network segment, and then setting an ARP spoofing protection mechanism for preventing ARP spoofing, a WiFi account and a password on the terminal router;
(S4) the device accesses the intranet network through the WiFi account and the password, the terminal router judges the IP attribute of the device, and if the device is a dynamic IP, the step (S5) is carried out; if the equipment is static IP, the terminal router judges that the equipment IP address network segment carries out corresponding access;
(S5) the intranet server judges whether the MAC address of the access equipment is bound with the intranet account, if so, the terminal router allocates and binds an employee network segment IP address, and the step (S8) is entered; if not, the terminal router allocates the IP address of the visitor network segment and then enters the step (S6);
(S6) the terminal router judges the device access network segment, if the device access the intranet network, the step (S7) is carried out; if the equipment accesses the external network, corresponding access is carried out according to the access authority set by the terminal router;
(S7) the authentication mechanism of the intranet server responds, the equipment authenticates through an intranet account and a corresponding password, after the authentication is passed, the equipment is temporarily released and temporary release time is set, if the equipment is still a visitor network segment IP address of a dynamic IP after the authentication is passed, the equipment sends a request continuous lease message to the terminal router in the temporary release time, the terminal router replies a NACK message of the equipment and reallocates an employee network segment IP address, and the MAC address of the equipment is bound with the IP address, and the step (S8) is entered; if the equipment authentication is not passed, the access of the equipment is refused;
(S8) the equipment sends a self-checking ARP to the terminal router, the terminal router judges whether the MAC and the IP of the current equipment are consistent with the record of the terminal router, if not, the terminal router judges that the static IP of the equipment is manually set as a server network segment or an employee network segment address so as to form conflict, and triggers an ARP deception protection mechanism to protect the safety of the intranet; if the device IP is consistent and the device IP is the employee network segment IP address, entering the step (S9);
(S9) the intranet server passes all access to the device.
2. The intranet protection method according to claim 1, wherein in the step (S4), the terminal router determines the device IP attribute through a discover message sent when the device accesses, and if the device IP attribute is a discover message without a dhcp message, the device IP attribute is a static IP, and if the device IP attribute is a discover message with a dhcp message, the device IP attribute is a dynamic IP.
3. The intranet protection method according to claim 2, wherein in the step (S3), a first function switch for allowing the visitor network segment device to access the extranet network, a second function switch for allowing the visitor network segment device to access the intranet network, and a second function switch for allowing the visitor network segment device to access the intranet network are further provided at the terminal router; the opening or closing of the first function switch and the second function switch is set by an intranet administrator.
4. The intranet protection method according to claim 3, wherein in the step (S4), the specific process of the terminal router accessing the static IP device to determine the IP address network segment is as follows:
(S41) the terminal router judges the IP address network segment of the equipment, if the network segment is a visitor network segment, the step is carried out (S6), and if the network segment is a server network segment or an employee network segment, the step is carried out (S42);
(S42) the intranet server judges whether the MAC address of the access equipment is bound with the account number, if so, the step is carried out (S8); if not, the process proceeds to step (S7).
5. The intranet protection method according to claim 4, wherein in the step (S6), the specific process of accessing the extranet network by the device and performing corresponding access according to the access right set by the terminal router comprises: if the first function switch is turned on, indicating that the visitor segment device is allowed to access the foreign network, the process proceeds to step (S8), and if the first function switch is turned off, indicating that the visitor segment device is not allowed to access the foreign network, the process proceeds to step (S7).
6. The intranet protection method according to claim 5, wherein the step (S7) is: if the IP address of the equipment passes the authentication and is the visitor network address of the static IP, after the temporary release time of the equipment expires, the authentication mechanism generates a response, and the equipment carries out authentication again in the authentication mechanism.
7. The intranet protection method according to claim 6, wherein the authentication method in the step (S7) includes WEB authentication, portal authentication, and wechat authentication.
8. The intranet protection method according to claim 7, wherein when the device performs the inter-network data access in step (S9), the access data is transmitted in three layers by the terminal router and controlled by the terminal router.
9. The intranet protection method according to claim 8, wherein in the step (S2), MAC addresses and IP addresses of a plurality of devices may be added to an authentication form of an account for binding.
CN201910146962.0A 2019-02-27 2019-02-27 Intranet protection method for preventing illegal access to intranet Active CN109922058B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910146962.0A CN109922058B (en) 2019-02-27 2019-02-27 Intranet protection method for preventing illegal access to intranet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910146962.0A CN109922058B (en) 2019-02-27 2019-02-27 Intranet protection method for preventing illegal access to intranet

Publications (2)

Publication Number Publication Date
CN109922058A CN109922058A (en) 2019-06-21
CN109922058B true CN109922058B (en) 2021-01-05

Family

ID=66962690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910146962.0A Active CN109922058B (en) 2019-02-27 2019-02-27 Intranet protection method for preventing illegal access to intranet

Country Status (1)

Country Link
CN (1) CN109922058B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244570B (en) * 2021-11-18 2023-12-22 广东电网有限责任公司 Illegal external connection monitoring method and device for terminal, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238548A (en) * 2011-08-09 2011-11-09 陈佳阳 Wireless router with internal and external network separation architecture and method for sharing wireless network based on same
CN103269326A (en) * 2012-12-22 2013-08-28 潘铁军 Safety equipment, multi-application system and safety method for ubiquitous networks
CN104579626A (en) * 2014-08-13 2015-04-29 中铁信安(北京)信息安全技术有限公司 Unidirectional transmission based electronic document output management and control system and method
CN104618310A (en) * 2013-11-04 2015-05-13 国家电网公司 Intranet information protection method and system
EP2328319B1 (en) * 2008-09-19 2015-09-09 Huawei Digital Technologies (Cheng Du) Co. Limited Method, system and server for realizing the secure access control
CN106714176A (en) * 2017-01-04 2017-05-24 北京百度网讯科技有限公司 Access control method and device for intranet service

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2328319B1 (en) * 2008-09-19 2015-09-09 Huawei Digital Technologies (Cheng Du) Co. Limited Method, system and server for realizing the secure access control
CN102238548A (en) * 2011-08-09 2011-11-09 陈佳阳 Wireless router with internal and external network separation architecture and method for sharing wireless network based on same
CN103269326A (en) * 2012-12-22 2013-08-28 潘铁军 Safety equipment, multi-application system and safety method for ubiquitous networks
CN104618310A (en) * 2013-11-04 2015-05-13 国家电网公司 Intranet information protection method and system
CN104579626A (en) * 2014-08-13 2015-04-29 中铁信安(北京)信息安全技术有限公司 Unidirectional transmission based electronic document output management and control system and method
CN106714176A (en) * 2017-01-04 2017-05-24 北京百度网讯科技有限公司 Access control method and device for intranet service

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
孙晓峰,刘晓棠.动态智能IP地址管理模式分析.《网络天地》.2015,全文. *
赵颖.大数据时代计算机网络信息安全及防护策略研究.《信息与电脑》.2018,(第23期),全文. *

Also Published As

Publication number Publication date
CN109922058A (en) 2019-06-21

Similar Documents

Publication Publication Date Title
CN109729180B (en) Whole system intelligent community platform
KR101314445B1 (en) Unified network and physical premises access control server
US6745333B1 (en) Method for detecting unauthorized network access by having a NIC monitor for packets purporting to be from itself
KR101910605B1 (en) System and method for controlling network access of wireless terminal
CN101436934A (en) Method, system and equipment for controlling user upper wire
CN106792684B (en) Multi-protection wireless network safety protection system and protection method
CN105262738A (en) Router and method for preventing ARP attacks thereof
CN106992984A (en) A kind of method of the mobile terminal safety access information Intranet based on electric power acquisition net
CN104202338A (en) Secure access method applicable to enterprise-level mobile applications
CN109067937A (en) Terminal admittance control method, device, equipment, system and storage medium
CN101188557A (en) Method, client, server and system for managing user network access behavior
KR101252787B1 (en) Security management system with multiple gateway servers and method thereof
US20140150069A1 (en) Method for distinguishing and blocking off network node
CN113645213A (en) Multi-terminal network management monitoring system based on VPN technology
CN109995769A (en) A kind of trans-regional full actual time safety management-control method of multi-tier Heterogeneous
CN101599977A (en) The management method of Network and system
CN109150853A (en) The intruding detection system and method for role-base access control
CN102055748B (en) electronic bulletin board management method and system
CN109922058B (en) Intranet protection method for preventing illegal access to intranet
CN107360178A (en) A kind of method that network access is controlled using white list
KR102510093B1 (en) Acess control system and method in network system of apartment complex
CN105681352B (en) A kind of wireless network access safety management-control method and system
CN102316119B (en) Security control method and equipment
US10298588B2 (en) Secure communication system and method
EP3769554B1 (en) Method and system for authorising the communication of a network node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant