CN114338100A - Access control method of switch - Google Patents
Access control method of switch Download PDFInfo
- Publication number
- CN114338100A CN114338100A CN202111528191.5A CN202111528191A CN114338100A CN 114338100 A CN114338100 A CN 114338100A CN 202111528191 A CN202111528191 A CN 202111528191A CN 114338100 A CN114338100 A CN 114338100A
- Authority
- CN
- China
- Prior art keywords
- switch
- mobile terminal
- information
- dynamic verification
- control method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000012795 verification Methods 0.000 claims abstract description 26
- 238000012545 processing Methods 0.000 claims description 2
- 238000011161 development Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an access control method of a switch, which comprises the following steps: a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal; the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information; and the mobile terminal accesses the switch according to the dynamic verification information and switches the state of the port of the switch access front-end equipment between forbidden or enabled states. The invention can effectively strengthen the safety management of the network and save the invaded network to the maximum extent.
Description
Technical Field
The invention relates to the technical field of switches, in particular to an access control method of a switch.
Background
With the rapid development of computer technology, information networks have become an important guarantee for social development. Many of the information are sensitive information and even are confidential in China, so that various human attacks (such as information leakage, information stealing, data tampering, data deletion and addition, computer viruses and the like) from all over the world are inevitably attracted.
Along with the rampant of these artificial attacks, the switch not only satisfies the network equipment that acts on an electricity (light) signal to forward, how to promote the manageability and the controllable of switch operational environment, realizes the safe operation of enterprise's network, is the problem that awaits a urgent need to be solved.
Disclosure of Invention
In order to solve the technical problem, the invention provides an access control method of a switch, which can effectively strengthen the security management of a network and greatly strengthen the protection and rescue measures for an intruder.
In order to achieve the purpose, the technical scheme of the invention is as follows:
an access control method of a switch, comprising the steps of:
a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal;
the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information;
and the mobile terminal accesses the switch according to the dynamic verification information and switches the state of the port of the switch access front-end equipment between forbidden or enabled states.
Preferably, the method further comprises the following steps: and when the switch is switched to the forbidden state, performing network disconnection processing on the switch visitor and triggering an alarm.
Preferably, the method further comprises the following steps: the IP of the switch visitor is recorded.
Preferably, the triggering alarm is a local alarm generated by a switch with a relay.
Preferably, the mobile terminal is a mobile phone.
Preferably, the sending the dynamic verification information to the mobile terminal according to the registration information includes the following steps:
acquiring a mobile phone number applying a dynamic verification code in registration information, wherein the mobile phone number is bound with a corresponding switch;
and sending the dynamic verification code to the mobile phone in a form of short message according to the mobile phone number.
Preferably, the mobile terminal accesses the switch according to the dynamic authentication information, including the following steps:
judging whether the dynamic verification information is in accordance with the dynamic verification information, and if the dynamic verification information is in accordance with the dynamic verification information, executing port state switching operation through a webpage or a mobile phone APP; and if the two are not in accordance, sending prompt information.
Based on the technical scheme, the invention has the beneficial effects that: the switch can refuse the access of all IP according to the remote setting, and then any access is not accessible to the user through the switch, namely, the phenomenon of network disconnection occurs to the visitor, and meanwhile, a local alarm is generated through the self-carried relay of the switch, and the IP of the user can be recorded. The invention can effectively strengthen the safety management of the network, and greatly strengthen the protection and rescue measures for the invader.
Drawings
Fig. 1 is a flow diagram of a method for access control of a switch in one embodiment.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
As shown in fig. 1, this embodiment provides an access control method for a switch, including the following steps:
step S110, a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal;
step S120, the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information;
in the embodiment, a mobile phone number applying a dynamic verification code in registration information is acquired, and the mobile phone number is bound with a corresponding switch; and sending the dynamic verification code to the mobile phone in a form of short message according to the mobile phone number.
Step S130, the mobile terminal accesses the switch according to the dynamic verification information, and switches the state of the port of the switch accessing the front-end device between disabled state and enabled state.
In this embodiment, when the switch is switched to the disabled state, the switch can deny access to all IPs, and then any access is not accessible to the user through the switch, that is, the visitor has a network disconnection phenomenon, and meanwhile, the switch is provided with a relay to generate a local alarm, and the IP of the enabler at this time is recorded. The safety management of the network can be effectively enhanced, and the invaded network can be rescued afterwards to the greatest extent.
In one embodiment, the method further includes the mobile terminal accessing the switch according to the dynamic authentication information, and includes the following specific implementation steps:
judging whether the dynamic verification information is in accordance with the property information, if the dynamic verification information is in accordance with the property information and the manager cannot directly process the dynamic verification information on site, directly and remotely disconnecting the network through a webpage or a mobile phone APP, and ensuring the safety of the property; and if the two are not in accordance, sending prompt information.
The above description is only a preferred embodiment of the access control method of the switch disclosed in the present invention, and is not intended to limit the scope of the embodiments of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the embodiments of the present disclosure should be included in the protection scope of the embodiments of the present disclosure.
Claims (7)
1. An access control method of a switch, characterized by comprising the steps of:
a mobile terminal sends an access request to a switch, wherein the access request comprises registration information of the mobile terminal;
the switch receives the access request, and sends dynamic verification information to the mobile terminal according to the registration information;
and the mobile terminal accesses the switch according to the dynamic verification information and switches the state of the port of the switch access front-end equipment between forbidden or enabled states.
2. The access control method of a switch according to claim 1, further comprising the steps of: and when the switch is switched to the forbidden state, performing network disconnection processing on the switch visitor and triggering an alarm.
3. The access control method of a switch according to claim 2, further comprising the steps of: the IP of the switch visitor is recorded.
4. The access control method of the switch according to claim 2 or 3, wherein the triggering alarm is a local alarm generated by a relay of the switch.
5. The method according to claim 1, wherein the mobile terminal is a mobile phone.
6. The access control method of the switch according to claim 5, wherein the sending the dynamic authentication information to the mobile terminal according to the registration information comprises the following steps:
acquiring a mobile phone number applying a dynamic verification code in registration information, wherein the mobile phone number is bound with a corresponding switch;
and sending the dynamic verification code to the mobile phone in a form of short message according to the mobile phone number.
7. The method of claim 1, wherein the mobile terminal accesses the switch according to the dynamic authentication information, comprising the steps of:
judging whether the dynamic verification information is in accordance with the dynamic verification information, and if the dynamic verification information is in accordance with the dynamic verification information, executing port state switching operation through a webpage or a mobile phone APP; and if the two are not in accordance, sending prompt information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111528191.5A CN114338100A (en) | 2021-12-14 | 2021-12-14 | Access control method of switch |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111528191.5A CN114338100A (en) | 2021-12-14 | 2021-12-14 | Access control method of switch |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114338100A true CN114338100A (en) | 2022-04-12 |
Family
ID=81051431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111528191.5A Pending CN114338100A (en) | 2021-12-14 | 2021-12-14 | Access control method of switch |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114338100A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107770117A (en) * | 2016-08-15 | 2018-03-06 | 台山市金讯互联网络科技有限公司 | A kind of safe network access control method |
WO2020010776A1 (en) * | 2018-07-09 | 2020-01-16 | 深圳市商汤科技有限公司 | Access control method, access control device, system and storage medium |
CN111327577A (en) * | 2018-12-17 | 2020-06-23 | 浙江宇视科技有限公司 | Switch-based security access method and device |
-
2021
- 2021-12-14 CN CN202111528191.5A patent/CN114338100A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107770117A (en) * | 2016-08-15 | 2018-03-06 | 台山市金讯互联网络科技有限公司 | A kind of safe network access control method |
WO2020010776A1 (en) * | 2018-07-09 | 2020-01-16 | 深圳市商汤科技有限公司 | Access control method, access control device, system and storage medium |
CN111327577A (en) * | 2018-12-17 | 2020-06-23 | 浙江宇视科技有限公司 | Switch-based security access method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103716785B (en) | A kind of mobile Internet safety service system | |
CN113783871B (en) | Micro-isolation protection system adopting zero trust architecture and protection method thereof | |
CN104618369A (en) | Method, device and system for unique authorization of Internet-of-Things equipment based on OAuth | |
CN106789982B (en) | Safety protection method and system applied to industrial control system | |
CN105791047A (en) | Method for controlling management system of secure video private network | |
CN113408006B (en) | Monitoring data access method and device, indoor monitoring system and storage medium | |
CN102184371B (en) | Detecting method and system for database operation authority of SQL (Structured Query Language) | |
CN108183901A (en) | Host security defense physical card and its data processing method based on FPGA | |
EP2009865A1 (en) | Method of providing an access control system | |
CN112350858A (en) | Cloud intelligent home data security management system | |
US10826944B1 (en) | Systems and methods for network security | |
CN109063494A (en) | A kind of information of mobile terminal security protection system and means of defence | |
CN116032629A (en) | Classification treatment method, system electronic equipment and storage medium for alarm traffic | |
KR102381150B1 (en) | Security management system and method for remote working environment | |
CN108270798B (en) | Mobile terminal equipment safety management system | |
CN106357785A (en) | Message pushing method and device | |
Alsunaidi et al. | Security methods against potential physical attacks on smartphones | |
CN101621427B (en) | Anti-intrusion method and system for a communication network | |
CN114338100A (en) | Access control method of switch | |
KR102145421B1 (en) | Digital substation with smart gateway | |
CN106778231A (en) | A kind of application security management method realized in Android system | |
CN205179095U (en) | Computer network safety control system | |
CN107153790A (en) | Mobile terminal safety means of defence, device and mobile terminal | |
CN115913642B (en) | Network threat protection method and device for power transformer substation | |
KR20200054495A (en) | Method for security operation service and apparatus therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220412 |
|
RJ01 | Rejection of invention patent application after publication |