Safety protection method of network feedback host computer
A security protection and network technology, applied in the field of network information security, can solve problems such as ineffective detection of viruses and ineffective monitoring of host firewalls, achieving efficient and flexible policy configuration and auditing, and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The content of the invention will now be further explained in conjunction with the description of the drawings.
[0043] The system is composed of hardware equipment and PC terminal software, and can be applied in various network environments such as individuals or units. The main content is that the host monitoring software monitors various resources such as system processes, files, application software, and network connections, and the network hardware equipment detects and controls the connection between the internal and external networks. Effectively protect the security of information on computer terminals.
[0044] The overall structure of the computer network security protection system consists of three parts: network security protection hardware equipment, user PCs, management and audit servers. The network protection system is located between the PC and the Internet, isolates the internal and external networks, and realizes the access control of the network co...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap