CN114338100A - Access control method of switch - Google Patents

Access control method of switch Download PDF

Info

Publication number
CN114338100A
CN114338100A CN202111528191.5A CN202111528191A CN114338100A CN 114338100 A CN114338100 A CN 114338100A CN 202111528191 A CN202111528191 A CN 202111528191A CN 114338100 A CN114338100 A CN 114338100A
Authority
CN
China
Prior art keywords
switch
mobile terminal
information
dynamic verification
control method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111528191.5A
Other languages
Chinese (zh)
Inventor
汪晨
戴汝秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiayuan Technology Co Ltd
Original Assignee
Jiayuan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiayuan Technology Co Ltd filed Critical Jiayuan Technology Co Ltd
Priority to CN202111528191.5A priority Critical patent/CN114338100A/en
Publication of CN114338100A publication Critical patent/CN114338100A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an access control method of a switch, which comprises the following steps: a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal; the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information; and the mobile terminal accesses the switch according to the dynamic verification information and switches the state of the port of the switch access front-end equipment between forbidden or enabled states. The invention can effectively strengthen the safety management of the network and save the invaded network to the maximum extent.

Description

Access control method of switch
Technical Field
The invention relates to the technical field of switches, in particular to an access control method of a switch.
Background
With the rapid development of computer technology, information networks have become an important guarantee for social development. Many of the information are sensitive information and even are confidential in China, so that various human attacks (such as information leakage, information stealing, data tampering, data deletion and addition, computer viruses and the like) from all over the world are inevitably attracted.
Along with the rampant of these artificial attacks, the switch not only satisfies the network equipment that acts on an electricity (light) signal to forward, how to promote the manageability and the controllable of switch operational environment, realizes the safe operation of enterprise's network, is the problem that awaits a urgent need to be solved.
Disclosure of Invention
In order to solve the technical problem, the invention provides an access control method of a switch, which can effectively strengthen the security management of a network and greatly strengthen the protection and rescue measures for an intruder.
In order to achieve the purpose, the technical scheme of the invention is as follows:
an access control method of a switch, comprising the steps of:
a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal;
the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information;
and the mobile terminal accesses the switch according to the dynamic verification information and switches the state of the port of the switch access front-end equipment between forbidden or enabled states.
Preferably, the method further comprises the following steps: and when the switch is switched to the forbidden state, performing network disconnection processing on the switch visitor and triggering an alarm.
Preferably, the method further comprises the following steps: the IP of the switch visitor is recorded.
Preferably, the triggering alarm is a local alarm generated by a switch with a relay.
Preferably, the mobile terminal is a mobile phone.
Preferably, the sending the dynamic verification information to the mobile terminal according to the registration information includes the following steps:
acquiring a mobile phone number applying a dynamic verification code in registration information, wherein the mobile phone number is bound with a corresponding switch;
and sending the dynamic verification code to the mobile phone in a form of short message according to the mobile phone number.
Preferably, the mobile terminal accesses the switch according to the dynamic authentication information, including the following steps:
judging whether the dynamic verification information is in accordance with the dynamic verification information, and if the dynamic verification information is in accordance with the dynamic verification information, executing port state switching operation through a webpage or a mobile phone APP; and if the two are not in accordance, sending prompt information.
Based on the technical scheme, the invention has the beneficial effects that: the switch can refuse the access of all IP according to the remote setting, and then any access is not accessible to the user through the switch, namely, the phenomenon of network disconnection occurs to the visitor, and meanwhile, a local alarm is generated through the self-carried relay of the switch, and the IP of the user can be recorded. The invention can effectively strengthen the safety management of the network, and greatly strengthen the protection and rescue measures for the invader.
Drawings
Fig. 1 is a flow diagram of a method for access control of a switch in one embodiment.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
As shown in fig. 1, this embodiment provides an access control method for a switch, including the following steps:
step S110, a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal;
step S120, the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information;
in the embodiment, a mobile phone number applying a dynamic verification code in registration information is acquired, and the mobile phone number is bound with a corresponding switch; and sending the dynamic verification code to the mobile phone in a form of short message according to the mobile phone number.
Step S130, the mobile terminal accesses the switch according to the dynamic verification information, and switches the state of the port of the switch accessing the front-end device between disabled state and enabled state.
In this embodiment, when the switch is switched to the disabled state, the switch can deny access to all IPs, and then any access is not accessible to the user through the switch, that is, the visitor has a network disconnection phenomenon, and meanwhile, the switch is provided with a relay to generate a local alarm, and the IP of the enabler at this time is recorded. The safety management of the network can be effectively enhanced, and the invaded network can be rescued afterwards to the greatest extent.
In one embodiment, the method further includes the mobile terminal accessing the switch according to the dynamic authentication information, and includes the following specific implementation steps:
judging whether the dynamic verification information is in accordance with the property information, if the dynamic verification information is in accordance with the property information and the manager cannot directly process the dynamic verification information on site, directly and remotely disconnecting the network through a webpage or a mobile phone APP, and ensuring the safety of the property; and if the two are not in accordance, sending prompt information.
The above description is only a preferred embodiment of the access control method of the switch disclosed in the present invention, and is not intended to limit the scope of the embodiments of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the embodiments of the present disclosure should be included in the protection scope of the embodiments of the present disclosure.

Claims (7)

1. An access control method of a switch, characterized by comprising the steps of:
a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal;
the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information;
and the mobile terminal accesses the switch according to the dynamic verification information and switches the state of the port of the switch access front-end equipment between forbidden or enabled states.
2. The access control method of a switch according to claim 1, further comprising the steps of: and when the switch is switched to the forbidden state, performing network disconnection processing on the switch visitor and triggering an alarm.
3. The access control method of a switch according to claim 2, further comprising the steps of: the IP of the switch visitor is recorded.
4. The access control method of the switch according to claim 2 or 3, wherein the triggering alarm is a local alarm generated by a relay of the switch.
5. The method according to claim 1, wherein the mobile terminal is a mobile phone.
6. The access control method of the switch according to claim 5, wherein the sending the dynamic authentication information to the mobile terminal according to the registration information comprises the following steps:
acquiring a mobile phone number applying a dynamic verification code in registration information, wherein the mobile phone number is bound with a corresponding switch;
and sending the dynamic verification code to the mobile phone in a form of short message according to the mobile phone number.
7. The method of claim 1, wherein the mobile terminal accesses the switch according to the dynamic authentication information, comprising the steps of:
judging whether the dynamic verification information is in accordance with the dynamic verification information, and if the dynamic verification information is in accordance with the dynamic verification information, executing port state switching operation through a webpage or a mobile phone APP; and if the two are not in accordance, sending prompt information.
CN202111528191.5A 2021-12-14 2021-12-14 Access control method of switch Pending CN114338100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111528191.5A CN114338100A (en) 2021-12-14 2021-12-14 Access control method of switch

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111528191.5A CN114338100A (en) 2021-12-14 2021-12-14 Access control method of switch

Publications (1)

Publication Number Publication Date
CN114338100A true CN114338100A (en) 2022-04-12

Family

ID=81051431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111528191.5A Pending CN114338100A (en) 2021-12-14 2021-12-14 Access control method of switch

Country Status (1)

Country Link
CN (1) CN114338100A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770117A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of safe network access control method
WO2020010776A1 (en) * 2018-07-09 2020-01-16 深圳市商汤科技有限公司 Access control method, access control device, system and storage medium
CN111327577A (en) * 2018-12-17 2020-06-23 浙江宇视科技有限公司 Switch-based security access method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770117A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of safe network access control method
WO2020010776A1 (en) * 2018-07-09 2020-01-16 深圳市商汤科技有限公司 Access control method, access control device, system and storage medium
CN111327577A (en) * 2018-12-17 2020-06-23 浙江宇视科技有限公司 Switch-based security access method and device

Similar Documents

Publication Publication Date Title
CN103716785B (en) A kind of mobile Internet safety service system
CN113783871B (en) Micro-isolation protection system adopting zero trust architecture and protection method thereof
CN104618369A (en) Method, device and system for unique authorization of Internet-of-Things equipment based on OAuth
CN106789982B (en) Safety protection method and system applied to industrial control system
CN105791047A (en) Method for controlling management system of secure video private network
CN113408006B (en) Monitoring data access method and device, indoor monitoring system and storage medium
CN102184371B (en) Detecting method and system for database operation authority of SQL (Structured Query Language)
CN108183901A (en) Host security defense physical card and its data processing method based on FPGA
EP2009865A1 (en) Method of providing an access control system
CN112350858A (en) Cloud intelligent home data security management system
US10826944B1 (en) Systems and methods for network security
CN109063494A (en) A kind of information of mobile terminal security protection system and means of defence
CN116032629A (en) Classification treatment method, system electronic equipment and storage medium for alarm traffic
KR102381150B1 (en) Security management system and method for remote working environment
CN108270798B (en) Mobile terminal equipment safety management system
CN106357785A (en) Message pushing method and device
Alsunaidi et al. Security methods against potential physical attacks on smartphones
CN101621427B (en) Anti-intrusion method and system for a communication network
CN114338100A (en) Access control method of switch
KR102145421B1 (en) Digital substation with smart gateway
CN106778231A (en) A kind of application security management method realized in Android system
CN205179095U (en) Computer network safety control system
CN107153790A (en) Mobile terminal safety means of defence, device and mobile terminal
CN115913642B (en) Network threat protection method and device for power transformer substation
KR20200054495A (en) Method for security operation service and apparatus therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220412

RJ01 Rejection of invention patent application after publication