An administration portal

A technology for managing portals and administrators, applied in the field of management portals of network security systems, and can solve problems such as inefficiency and disadvantage

Active Publication Date: 2009-10-28
NETWORK BOX CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, for some networks, being under the complete control of an MSSP may be contrary to corporate security policies, inefficient, or detrimental, for example, if a security server is forming false positives—that is, incorrectly identifying valid email as Threat interception - the situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An administration portal
  • An administration portal
  • An administration portal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Such as figure 1 As shown, security server 100 provides Internet threat protection facilities to protect an enterprise's local area network (LAN) 102 from many types of Internet threats. These threats include viruses, worms, Trojan horses, phishing, spyware, spam, unwanted content, and hacking, as well as any other form of unwanted code, traffic, or activity related to LAN 102 . A security server or box 100 is directly connected to an external communication network 104 , such as the Internet, via a router 106 , thereby being located between a LAN 102 and the Internet 104 . LAN 102 connects a plurality of terminals 110 on network 102 . Terminals 110 are computer devices, such as personal computers or telephones, that are capable of handling network traffic and messages, such as email and HTTP requests and responses. A security server or box 100 may also provide support for a demilitarized zone (DMZ) 108, which in an alternative embodiment, server 100 may comprise sever...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An administration portal for a network security server, including: (i) control elements allowing a user of a network to access respective services, such as email, spam filter, malware filter, and web browser control services, performed by the security server; and (ii) an administration module for maintaining permission attributes for users of the network, the attributes defining access to the control elements. The permission attributes have a delegation hierarchy so a managed security service provider can set a permission attribute for a user to administrator, and the user with an administrator permission attribute can set another user to have a user permission attribute. The permission attributes can also be set on a group basis for a group of said users. The attributes each have associated capability levels defining a level of access for the respective services.

Description

technical field [0001] The invention relates to a management entrance of a network security system. Background technique [0002] Perimeter security systems are installed at the edge of corporate LANs and WANs to protect these networks from the outside world. For example, a connection to the Internet may be secured by machines including machines directly connected to the Internet to protect it from, for example, viruses, worms, Trojan horses, phishing, spyware, spam, unwanted content, and hacking A secure server for many types of Internet threats. A security server's configuration files include signature or pattern files that serve as the basis for detecting threats and are updated on a regular basis. Given the frequency with which Internet threats change and arise, security servers are generally updated in a regular and timely manner by a managed security service provider (MSSP) using remote devices from a central network operations center (NOC). [0003] In addition to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L63/1441H04L12/585H04L63/105H04L51/12H04L63/20H04L51/212
Inventor M·C·韦布-约翰逊
Owner NETWORK BOX CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products