CN110278112B - Control method for receiving management after computer accessing local area network - Google Patents

Control method for receiving management after computer accessing local area network Download PDF

Info

Publication number
CN110278112B
CN110278112B CN201910489401.0A CN201910489401A CN110278112B CN 110278112 B CN110278112 B CN 110278112B CN 201910489401 A CN201910489401 A CN 201910489401A CN 110278112 B CN110278112 B CN 110278112B
Authority
CN
China
Prior art keywords
module
computer
management software
mobile phone
local area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910489401.0A
Other languages
Chinese (zh)
Other versions
CN110278112A (en
Inventor
钟少君
邓志娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi University of Science and Technology
Original Assignee
Jiangxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi University of Science and Technology filed Critical Jiangxi University of Science and Technology
Priority to CN201910489401.0A priority Critical patent/CN110278112B/en
Publication of CN110278112A publication Critical patent/CN110278112A/en
Application granted granted Critical
Publication of CN110278112B publication Critical patent/CN110278112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/20Network management software packages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Abstract

The invention discloses a control method for receiving management after a computer is accessed into a local area network, and particularly relates to the technical field of computers. The invention is favorable for verifying the computer through the mobile phone client by downloading and installing the mobile phone client on the mobile phone, can lock the mobile phone client and the computer unlocked through the mobile phone client one to one, and can contact the user through the information in the registration module in the corresponding mobile phone client when the central control holder detects that the computer has a problem or performs illegal actions, thereby improving the management efficiency after the computer is accessed into the local area network.

Description

Control method for receiving management after computer accessing local area network
Technical Field
The invention relates to the technical field of computers, in particular to a control method for receiving management after a computer is accessed to a local area network.
Background
A Local Area Network (LAN) refers to a group of computers that are interconnected by a plurality of computers in a certain Area. Generally within several kilometers of a square circle. Local area networks may implement file management, application sharing, printer sharing, scheduling within workgroups, email and fax communication services, etc. The LAN is closed and can be composed of two computers in office or thousands of computers in a company
Patent application publication No. CN 101917440B discloses a control method and system for receiving management after a computer is accessed to a local area network, wherein a management server and at least one computer in the same local area network are provided with client software; the management server configures communication rules and communication parameters, and synchronously sends the communication rules and the communication parameters to a computer with client software installed for storage; the computer newly connected to the network initiates a communication request to the local area network, and the computer with the installed client software monitors the communication request of the computer newly connected to the network; and the computer with the client software installed judges whether the computer newly connected to the network is provided with the client software or not according to the communication rule and the communication parameter.
However, when the above technical solutions are actually used, there still exist many disadvantages, such as low efficiency of installing client software on a computer in a local area network, and thus low management efficiency.
Disclosure of Invention
In order to overcome the above-mentioned defects in the prior art, embodiments of the present invention provide a control method for receiving management after a computer accesses a local area network, which is advantageous to verify the computer by a mobile client by downloading and installing the mobile client on a mobile phone, so that the mobile client and the computer unlocked by the mobile client can be locked one-to-one, and when a central control console detects that a problem occurs in the computer or illegal activities occur, the user can be contacted through information in a registration module in the corresponding mobile client, thereby improving the management efficiency after the computer accesses the local area network.
In order to achieve the purpose, the invention provides the following technical scheme: a control method for receiving management after a computer is accessed into a local area network comprises the local area network, a central control holder, management software and a mobile phone client, wherein the management software comprises a key generation module, a verification module and a screening module, the connecting end of the screening module is connected with a recording module and an automatic installation module, the connecting end of the recording module is connected with a backup module, and the specific operation steps are as follows:
the method comprises the following steps: preparing a local area network, a central control holder and at least one computer accessing the local area network;
step two: the newly-accessed computer initiates a communication request to the local area network;
step three: the central control cloud platform sends management software to the newly-accessed computer;
step four: the computer with the management software automatically generates a random key through the management software;
step five: a user downloads and installs a mobile phone client on a mobile phone, inputs a random key into the mobile phone client to obtain a pass verification code, and inputs the verification code into management software of a computer to ensure that the computer obtains a network access qualification;
step six: the computer with the installed management software initiates a communication request through a local area network;
step seven: the discrimination module on the computer with the installed management software discriminates whether the computer of the communication object is installed with the management software;
step eight: when the screening module screens, the recording module records the action and transmits the information to the backup module for backup;
step nine: and when the discrimination module discriminates that the communication object is not provided with the management software, locking the computer which is not provided with the management software, sending the computer to the automatic installation module, and installing the management software.
In a preferred embodiment, the key generation module is configured to randomly generate a key, the verification module is configured to verify the verification input by the user, and the screening module is connected to the end connection and has a recording module and an automatic installation module.
In a preferred embodiment, in the seventh step, the screening module is used for screening the computer performing communication to see whether management software is installed.
In a preferred embodiment, in the fifth step, the mobile phone client includes a registration module, a password generation module and a locking module, and the pass verification code is randomly generated according to the random key generated by the key generation module.
In a preferred embodiment, in the ninth step, the locking module is configured to lock the mobile phone client and the computer unlocked by the mobile phone client one to one, and when the central control console detects that a problem occurs in the computer, the user can be contacted through the corresponding mobile phone client.
In a preferred embodiment, the registration module is configured to perform authentication on a user and perform binding, and each mobile phone client only corresponds to one valid identity, and the authentication method includes facial recognition, mobile phone number registration, and identity card registration.
In a preferred embodiment, in the step eight, the connection end of the recording module is connected to the connection end of the backup module, the recording module is configured to record the screening information of the screening module and transmit the information to the backup module, and the backup module is configured to record the screening information and backup the information.
In a preferred embodiment, in the ninth step, the automatic installation module includes a pipeline software installation package for installing management software on the computer.
The invention has the technical effects and advantages that:
1. the central control cloud platform sends management software to a newly-accessed computer, the computer provided with the management software automatically generates a random secret key through a secret key generation module, a user downloads and installs a mobile phone client on a mobile phone and inputs the random secret key into a password generation module, a pass verification code is obtained through the password generation module and is input into a verification module, the computer obtains access qualification after passing the pass, the verification of the computer is facilitated through the mobile phone client, the locking module can lock the mobile phone client and the computer unlocked through the mobile phone client one to one, when the central control cloud platform detects that the computer has problems, the user can be contacted through the corresponding mobile phone client, the management efficiency of the computer after accessing a local area network is improved, and the registration module is used for carrying out identity verification and binding on the user, each mobile phone client can only correspond to one effective identity, the identity verification method comprises face identification, mobile phone number registration and identity card registration, and when the central control holder monitors that the computer performs illegal activities, an installer of the computer can be quickly found through information in the registration module in the corresponding mobile phone client, so that the management efficiency is improved;
2. the method is characterized in that a discrimination module on a computer with management software installed discriminates whether the management software is installed on the computer of a communication object, when the discrimination module discriminates that the communication object is not installed with the management software, the discrimination module locks the computer without the management software, sends an automatic installation module to the computer, and installs the management software, so that the discrimination module on the computer with the management software installed is favorable for discriminating whether the management software is installed on the computer of the communication object, and is matched with a central control cloud platform to detect a newly-connected computer, thereby effectively improving the popularization and installation efficiency of the management software;
3. when the screening module is used for screening, the recording module records the action and transmits the information to the backup module for backup, the backup module can backup the screening information, the later inquiry is facilitated, and the connection between two computers can be recorded.
Drawings
FIG. 1 is a schematic control flow diagram of the present invention.
Fig. 2 is a schematic structural diagram of the control system of the present invention.
Fig. 3 is a schematic flow chart of the mobile phone client system according to the present invention.
FIG. 4 is a flow chart of the management software system of the present invention.
The reference signs are: the system comprises a local area network 1, a central control holder 2, management software 3, a key 301 generating module, a verification module 302, a screening module 303, a mobile phone client 4, a registration module 401, a password 402 generating module, a locking module 403, an automatic installation module 5, a recording module 6 and a backup module 7.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The control method for receiving management after a computer is accessed to a local area network shown in fig. 1-4 comprises a local area network 1, a central control holder 2, management software 3 and a mobile phone client 4, wherein the management software 3 comprises a key generation module 301, a verification module 302 and a screening module 303, the connection end of the screening module 303 is connected with a recording module 6 and an automatic installation module 5, the connection end of the recording module 6 is connected with a backup module 7, and the specific operation steps are as follows:
the method comprises the following steps: preparing a local area network 1, a central control holder 2 and at least one computer accessing the local area network 1;
step two: a newly-accessed computer initiates a communication request to the local area network 1;
step three: the central control cloud deck 2 sends management software 3 to a newly-accessed computer;
step four: the computer provided with the management software 3 automatically generates a random key through the management software 3;
step five: a user downloads and installs a mobile phone client 4 on a mobile phone, inputs a random key into the mobile phone client to obtain a pass verification code, and inputs the verification code into management software 3 of a computer to ensure that the computer obtains a network access qualification;
step six: the computer with the management software 3 initiates a communication request through the local area network 1;
step seven: the discrimination module 303 on the computer with the management software 3 installed discriminates whether the computer of the communication object is provided with the management software 3;
step eight: when the screening module 303 is used for screening, the recording module 6 records the behavior and transmits information to the backup module 7 for backup;
step nine: when the discrimination module 303 discriminates that the communication object is not provided with the management software 3, the computer which is not provided with the management software 3 is locked, and the automatic installation module 5 is sent to install the management software 3.
Further, the key generation module 301 is configured to randomly generate a key, the verification module 302 is configured to verify the verification input by the user, and the connection end of the screening module 303 is connected to the recording module 6 and the automatic installation module 5.
Further, in the seventh step, the screening module 303 is configured to screen a computer performing communication to see whether the management software 3 is installed.
Further, in the fifth step, the mobile phone client 4 includes a registration module 401, a password generation module 402, and a locking module 403, and randomly generates the pass verification code according to the random key generated by the key generation module 301.
Further, in the ninth step, the locking module 403 is configured to lock the mobile phone client 4 and the computer unlocked by the mobile phone client 4 in a one-to-one manner, and when the central control console 2 detects that a problem occurs in the computer, the user can be contacted through the corresponding mobile phone client 4.
Further, the registration module 401 is configured to perform authentication on a user and bind the user, and each mobile phone client 4 can only correspond to one valid identity, where the authentication method includes facial recognition, mobile phone number registration, and identity card registration.
Further, in the eighth step, the connection end of the recording module 6 is connected to the connection end of the backup module 7, the recording module 6 is configured to record the screening information of the screening module 303 and transmit the information to the backup module 7, and the backup module 7 is configured to record the screening information and backup the screening information.
Further, in the ninth step, the automatic installation module 5 includes a pipeline software installation package, and is used for installing the management software 3 on the computer.
The working principle of the invention is as follows:
referring to the attached figures 1-4 of the specification, a computer newly accessing a network initiates a communication request to a local area network 1, the computer is monitored by a central control console 2 before accessing the network, the central control console 2 sends management software 3 to the computer newly accessing the network, when the central control console 2 monitors that the computer is newly accessing the network, the management software 3 is sent to the computer, the management software 3 comprises a key generation module 301, a verification module 302 and a discrimination module 303, the computer provided with the management software 3 automatically generates a random key by the key generation module 301 in the management software 3, a user downloads and installs a mobile phone client 4 on a mobile phone, the mobile phone client 4 comprises a registration module 401, a password generation module 402 and a locking module 403, the random key is input into the password generation module 402, a pass verification code is obtained by the password generation module 402, and the verification code is input into the verification module 302 in the management software 3 of the computer, after the computer passes the access qualification, the computer is favorably verified through the mobile phone client 4, the locking module 403 can lock the mobile phone client 4 and the computer unlocked through the mobile phone client 4 one to one, when the central control console 2 detects that a problem occurs in the computer, the user can be contacted through the corresponding mobile phone client 4, the management efficiency of the computer after accessing the local area network 1 is improved, the registration module 401 is used for verifying and binding the identity of the user, each mobile phone client 4 can only correspond to one effective identity, the identity verification method comprises facial recognition, mobile phone number registration and identity card registration, when the central control console 2 detects that the computer is illegal, the installer of the computer can be quickly found through the information in the registration module 401 in the corresponding mobile phone client 4, the management efficiency is improved;
referring to the attached figures 1-4 of the specification, a computer with management software 3 initiates a communication request through a local area network 1, a discrimination module 303 on the computer with the management software 3 discriminates whether the management software 3 is installed on the computer of a communication object, when the discrimination module 303 discriminates that the management software 3 is installed, a recording module 6 records the behavior and transmits information to a backup module 7 for backup, when the discrimination module 303 discriminates that the communication object is not installed with the management software 3, the computer without the management software 3 is locked and transmits an automatic installation module 5 to the computer, the automatic installation module 5 comprises a pipeline software installation package for installing the management software 3, which is beneficial to discriminate whether the management software 3 is installed on the computer of the communication object through the discrimination module 303 on the computer with the management software 3 installed, and is matched with a central control console 2 to detect the newly-connected computer, the popularization and installation efficiency of the management software 3 is effectively improved, the method does not depend on hardware or other network equipment, dependence on other equipment and complex environments is avoided, the screening information can be backed up by the backup module 7, later-stage query is facilitated, and contact between two computers can be recorded.
And finally: the above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit and principle of the present invention are intended to be included in the scope of the present invention.

Claims (8)

1. A control method for receiving management after a computer accesses a local area network is characterized in that: including local area network (1), central control cloud platform (2), management software (3) and mobile client (4), management software (3) include key generation module (301), verification module (302) and examine module (303), examine module (303) link and be connected with record module (6) and automatic installation module (5), record module (6) link is connected with backup module (7), and concrete operating procedure is as follows:
the method comprises the following steps: preparing a local area network (1), a central control holder (2) and at least one computer accessing the local area network (1);
step two: the newly-accessed computer initiates a communication request to the local area network (1);
step three: the central control cloud deck (2) sends management software (3) to a newly-accessed computer;
step four: the computer provided with the management software (3) automatically generates a random key through the management software (3);
step five: a user downloads and installs a mobile phone client (4) on a mobile phone, inputs a random key into the mobile phone to obtain a pass verification code, and inputs the verification code into management software (3) of a computer to ensure that the computer obtains a network access qualification;
step six: a computer with the installed management software (3) initiates a communication request through a local area network (1);
step seven: a discrimination module (303) on the computer with the installed management software (3) discriminates whether the computer of the communication object is installed with the management software (3);
step eight: when the screening module (303) screens, the recording module (6) records the behavior and transmits the information to the backup module (7) for backup;
step nine: when the discrimination module (303) discriminates that the communication object is not provided with the management software (3), the computer which is not provided with the management software (3) is locked, and the automatic installation module (5) is sent to install the management software (3).
2. The method as claimed in claim 1, wherein the method comprises the following steps: the key generation module (301) is used for randomly generating a key, and the verification module (302) is used for verifying the verification input by the user.
3. The method as claimed in claim 1, wherein the method comprises the following steps: and in the seventh step, a screening module (303) is used for screening the computer for communication to see whether the management software (3) is installed.
4. The method as claimed in claim 1, wherein the method comprises the following steps: in the fifth step, the mobile phone client (4) comprises a registration module (401), a password generation module (402) and a locking module (403), and randomly generates the pass verification code according to the random key generated by the key generation module (301).
5. The method as claimed in claim 4, wherein the method comprises the following steps: in the ninth step, the locking module (403) is used for one-to-one locking the mobile phone client (4) and the computer unlocked by the mobile phone client (4), and when the central control pan-tilt (2) detects that the computer has a problem, the user can be contacted through the corresponding mobile phone client (4).
6. The method as claimed in claim 4, wherein the method comprises the following steps: the registration module (401) is used for authenticating and binding the identity of a user, each mobile phone client (4) can only correspond to one valid identity, and the identity authentication method comprises face recognition, mobile phone number registration and identity card registration.
7. The method as claimed in claim 1, wherein the method comprises the following steps: in the eighth step, the connecting end of the recording module (6) is connected with the connecting end of the backup module (7), the recording module (6) is used for recording the screening information of the screening module (303) and transmitting the information to the backup module (7), and the backup module (7) is used for recording the screening information and backing up the screening information.
8. The method as claimed in claim 1, wherein the method comprises the following steps: in the ninth step, the automatic installation module (5) comprises a pipeline software installation package which is used for installing the management software (3) on the computer.
CN201910489401.0A 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network Active CN110278112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910489401.0A CN110278112B (en) 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910489401.0A CN110278112B (en) 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network

Publications (2)

Publication Number Publication Date
CN110278112A CN110278112A (en) 2019-09-24
CN110278112B true CN110278112B (en) 2022-03-29

Family

ID=67961935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910489401.0A Active CN110278112B (en) 2019-06-06 2019-06-06 Control method for receiving management after computer accessing local area network

Country Status (1)

Country Link
CN (1) CN110278112B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376074A (en) * 2015-12-14 2016-03-02 周海斌 Startup and timing control method and system of client computers in local area network
CN105592021A (en) * 2014-11-12 2016-05-18 成都安慧科技有限公司 Novel internal network security protection method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6907530B2 (en) * 2001-01-19 2005-06-14 V-One Corporation Secure internet applications with mobile code
US9612814B2 (en) * 2012-02-02 2017-04-04 Sungard Availability Services, Lp Network topology-aware recovery automation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592021A (en) * 2014-11-12 2016-05-18 成都安慧科技有限公司 Novel internal network security protection method
CN105376074A (en) * 2015-12-14 2016-03-02 周海斌 Startup and timing control method and system of client computers in local area network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
大中型企业内部局域网非法接入问题的研究;周霄红;《行业应用》;20070430;全文 *

Also Published As

Publication number Publication date
CN110278112A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
US7788366B2 (en) Centralized network control
CN100438421C (en) Method and system for conducting user verification to sub position of network position
CA2578186C (en) System and method for access control
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
CN105430000A (en) Cloud computing security management system
CN101183940A (en) Method for multi-application system to perform authentication to user identification
CN103455763A (en) Internet surfing log recording system and method capable of protecting personal privacies of users
US20100095366A1 (en) Enabling Network Communication From Role Based Authentication
CN101751712A (en) Centralized invoice authentification system and authentification method
CN103413083A (en) Security defending system for single host
US10637864B2 (en) Creation of fictitious identities to obfuscate hacking of internal networks
CN109936555A (en) A kind of date storage method based on cloud platform, apparatus and system
US20210297449A1 (en) Token node locking
CN1601954B (en) Moving principals across security boundaries without service interruption
CN102291239B (en) Remote authentication method, system, agent component and authentication servers
CN101854357B (en) Method and system for monitoring network authentication
CN100476841C (en) Method and system for centrally managing code to hard disk of enterprise
CN110278112B (en) Control method for receiving management after computer accessing local area network
CN109756899B (en) Network connection method, device, computer equipment and storage medium
JP2003258795A (en) Computer aggregate operating method, implementation system therefor, and processing program therefor
CN111556024B (en) Reverse access control system and method
CN109842600A (en) A kind of method that realizing mobile office, terminal device and MDM equipment
CN109547397B (en) Network security management system
CN111324872A (en) Method and system for redirected centralized audit of login records and operation records
CN108737359B (en) Resource safety protection system for fixed environment and resource safety protection method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant