Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Associated equipment and method for internal network security management

A security management and internal network technology, applied in the field of internal network security management related equipment, can solve problems such as increasing administrator burden, increasing operational complexity, and unable to prevent information leakage, to prevent network resource abuse and ensure integrity.

Inactive Publication Date: 2009-11-25
SHENZHEN CITY ANLUODACHENG TECH
View PDF2 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These solutions, either from the security point of view, or from the management point of view, or a combination of the two, more or less solve some problems, such as some systems focus on the security protection of intranet computers, effectively detect and Eliminate viruses and Trojan horses to ensure that intranet information is not maliciously stolen, and at the same time locate the source of harm to prevent the spread of viruses. However, this often ignores factors such as information system damage caused by legitimate operators through personal computers; some systems emphasize border networks Security protection prevents internal sensitive information from flowing out through the network, but cannot prevent information leakage caused by operators copying and printing files through mobile devices; some systems can fully protect computers in the network, and prevent information In order to prevent leaking incidents and implement an effective intranet security management system, it increases the burden on administrators to a certain extent, reduces the operating efficiency of computer users, and increases the complexity of their operations.
[0004] Therefore, it is imminent to find a more secure and reliable solution to solve the problems of network security and management in the existing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Associated equipment and method for internal network security management
  • Associated equipment and method for internal network security management
  • Associated equipment and method for internal network security management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0027] Embodiments of the present invention provide related equipment and methods for internal network security management, which are based on the assumption that internal network equipment is untrustworthy and insecure, not only protecting internal network computers from external hidden dangers, but also Active prevention of internal network computers breaks through the traditional idea that the network security model is based on the assumption that internal networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides associated equipment and method for internal network security management, wherein, through generating and maintaining a security management strategy and an audit strategy; the invention ensures that all the terminals accessible to internal network submit to the strategies; with respect to an piece of equipment unqualified to the strategies, the system processes the equipment as follows: providing a network isolation and locking device, and sending an warning, with the purpose of ensuring that the equipment does not bring the whole network with bad influence on the security and management. The invention not only implements an active defense mechanism of the system, but also effectively prevents some malicious acts of validated user, such as misapplication of network resource, information theft, and active attack by means of internal computers.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to equipment and methods related to internal network security management. Background technique [0002] With the continuous development of the information industry, computer networks have been widely used in office, command and control and other aspects. However, the ensuing computer network security and management issues have become increasingly prominent, especially internal network security management issues, such as resource abuse, mobile device management, unauthorized access, information leakage, etc. perspective for security management. [0003] In response to the above problems, many industry experts, IT manufacturers or integrators have proposed their own different solutions and related products. These solutions, either from the security point of view, or from the management point of view, or a combination of the two, more or less solve some problems, such as so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24H04L12/26H04L12/28
Inventor 徐亮
Owner SHENZHEN CITY ANLUODACHENG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products