Network security management method and system thereof

A network security and management method technology, applied in the management system field based on local data encryption and transmission encryption to realize a secure network, can solve problems such as imperfect security functions and low security levels, and achieve perfect security functions, high security levels, and ensure safe effect

Inactive Publication Date: 2008-10-22
SHENZHEN VINCIN UNITED TECH
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the deficiencies of the existing network information security management system, which have imperfect security functions and a low security level, the present invention provides a network security management method, which has the characteristics of anti-leakage and high security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security management method and system thereof
  • Network security management method and system thereof
  • Network security management method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The principle of the network security management method and system of the present invention can be found in figure 1 . It mainly embodies the multiple network security defense mechanism of the three-level defense of information source defense, information transmitter defense and information user defense, truly providing a safe information exchange environment for network users and ensuring the security of network data transmission and local data.

[0027] The network security management method of the present invention comprises the following steps:

[0028] Step 1: the secure network card 11 and the secure switch 20 use the certificate to create an encrypted tunnel;

[0029] Step 2: the security network card 11 requests identity verification from the security switch 20;

[0030] Step 3: When the security switch 20 has passed the identity authentication of the security network card 11, generate the communication key of the security network card 11, and notify the secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security management method and a system thereof. The method comprises the following steps that: encrypted tunnels are established in a safe network card and a safe switch use certificate; the safe network card requires the identity authentication of the safe switch; if the identity is qualified, the safe switch distributes a communication key to the safe network card; otherwise, the failed authentication information is sent back; after the safe network card acquires the key, the local data is started to be encrypted and decrypted; and the generation of the IP protocol communication is realized. The system has a structure which is as follows: a controlled host computer is connected with the safe network card for realizing the function of the identity authentication, the key management, the communication and encryption and the local data encryption; and the safe network card is connected with the safe switch for the strategy management, the configuration management, the user identity authentication of the safe network card and the distribution of the communication key. The method and the system can realize the three-level defense of the information source defense, the information transmitter defense and the information user defense with perfect safety functions and have the characteristics of disclosure prevention and high safety degree.

Description

technical field [0001] The invention relates to a network security management method and system thereof, in particular to a management system and method for realizing a secure network based on local data encryption and transmission encryption. Background technique [0002] With the development of science and technology, network technology is changing with each passing day, and the application of office automation and Internet is becoming more and more popular. Enterprises or units transmit information to each other through the Internet, and enterprises or units transmit information to each other through local area networks. Therefore, network information security Questions matter. [0003] At present, widely used firewalls, IDS, internal and external network isolation, and other access control systems for external networks can effectively prevent attacks from outside the network, but there has been no good prevention method for the confidentiality of information inside the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L9/00H04L9/08H04L29/06H04L12/46H04L9/32H04L12/28
Inventor 王银珠
Owner SHENZHEN VINCIN UNITED TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products