Safety protection method of network feedback host computer

A security protection and network technology, applied in the field of network information security, can solve problems such as ineffective detection of viruses and ineffective monitoring of host firewalls, achieving efficient and flexible policy configuration and auditing, and ensuring security

Inactive Publication Date: 2009-10-28
郭世泽 +1
View PDF0 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is that if malicious codes such as viruses use a deeper operating system kernel mechanism than the host firewall monitoring technology, the host firewall cannot achieve a good monitoring effect
Network firewalls can interce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method of network feedback host computer
  • Safety protection method of network feedback host computer
  • Safety protection method of network feedback host computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The content of the invention will now be further explained in conjunction with the description of the drawings.

[0043] The system is composed of hardware equipment and PC terminal software, and can be applied in various network environments such as individuals or units. The main content is that the host monitoring software monitors various resources such as system processes, files, application software, and network connections, and the network hardware equipment detects and controls the connection between the internal and external networks. Effectively protect the security of information on computer terminals.

[0044] The overall structure of the computer network security protection system consists of three parts: network security protection hardware equipment, user PCs, management and audit servers. The network protection system is located between the PC and the Internet, isolates the internal and external networks, and realizes the access control of the network co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a safety protection method of network feedback host computer, wherein the host computer is mainly composed of a hardware device and PC terminal software. The method of the invention comprises the following steps: firstly executing strategy configuration and transmission, then initializing the network protection hardware for obtaining the trustable IP corresponding with the trustable domain name; then actualizing monitoring network connection based on the configuration file formed by the former two steps for realizing accessing control; than detecting all data packages flowing over the system and the trustable address, executing deep analysis to the data packages, executing package filtering based on a preset regulation; afterwards, auditing the network behavior; and finally perfecting the strategy configuration and updating the configuration file. The method can ensure the safety of computer terminal information to a certain extent at a state that the computer terminal encounters the hostile attack of Trojan, virus, etc. Furthermore the method has high-effective strategy and auditing functions for causing that the user can timely and comprehensively manage and configure a network safety protection system and master all network connection and behavior of the computer terminal.

Description

Technical field [0001] The invention relates to a security protection method for a network feedback host, belonging to the technical field of network information security. Background technique [0002] While the rapid development of the Internet has improved work efficiency, it has also brought about an increasingly serious problem - network security. People study various network security protection methods to protect computers and information resources on the network and resist various attacks by hackers. Firewall technology is an applied security protection technology based on modern communication network technology and information security technology. It is more and more used in the interconnection environment of private network and public network, especially Internet network. With the rapid development of the Internet, firewall products have sprung up in just a few years, forming an industry soon. [0003] A firewall refers to a combination of a series of components se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12H04L12/26H04L12/24
Inventor 郭世泽郑康锋
Owner 郭世泽
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products