Safety management method and safety management system of virtual safety management center

A technology of security management and central server, which is applied in the field of intranet security management, can solve the problem of not analyzing and processing information, and achieve the effect of flexible formulation, security guarantee, and solution to the burden of management equipment

Inactive Publication Date: 2010-01-06
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
0 Cites 4 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0009] In order to overcome the shortcomings of the existing intranet security management methods that need to occupy enterprise hardware resources or a large amount of capital investment, hidden dangers in the intranet itself, one-way management, and no analysis and processing of informat...
View more

Method used

Simultaneously, the data analysis module also collects all the information collected from the client, and draws the security event category through analysis, such as suspicious files, virus files, network intrusion, phishing sites, etc., and quickly locates the node where the security event occurs , reminding to take corresponding measures to prevent its s...
View more

Abstract

The invention relates to a safety management method and a safety management system of a virtual safety management center. The virtual safety management center is accessed into the Internet, and a terminal in the Internet is used for managing the Internet by a server of an Internet access virtual safety management center. The safety management system comprises a display module, a data input module, a data analysis module and a databank module, the display module and the data input module are used for recording information submitted by the Internet terminal into the data analysis module, the data analysis module stores a result into the databank module after analysis, and the needed information is returned to the Internet terminal. The safety management method solves the problem that the safety management only can be carried out in the Internet, saves cost, and can analyze and process data.

Application Domain

Data switching networks

Technology Topic

Safety management systemsLibrary science +4

Image

  • Safety management method and safety management system of virtual safety management center
  • Safety management method and safety management system of virtual safety management center

Examples

  • Experimental program(1)

Example Embodiment

[0024] in figure 1 In the virtual security management center, all or part of the terminals in the intranet can access the Internet, and one or more of them are connected to the virtual security management center through the Internet.
[0025] in figure 2 In, a terminal in the intranet sends virus data to the virtual security management center, and the data entry module is used to receive the data sent by the intranet terminal. These data information are entered from the data entry module to the virtual security management center and then sent to the data analysis module for processing Analysis: After the data analysis module obtains the data information of the intranet terminal, it will perform statistics, analysis and judgment and classification processing, and store the final complete information in the database module.
[0026] When you need to view and manage security information and terminals, log in to the virtual security management center from any terminal connected to the Internet in the intranet, enter the display module and select the content you want to display. For example, you want to query the IP of the terminal where the above virus event occurred , The display module sends the display request to the data analysis module. The data analysis module passes the conditions to the database module after analysis, and requests information output. After the database receives the request, it searches for relevant information and returns it to the data analysis module. The module sends to the display module, and finally displays the request of the intranet terminal, that is, the IP address of the host where the virus event occurred.
[0027] At the same time, the data analysis module also summarizes all the information collected from the client, and analyzes the security event categories, such as suspicious files, virus files, network intrusions, phishing websites, etc., and quickly locates the node where the security event occurred, and reminds you to take Corresponding measures are taken to prevent it from spreading in the intranet. And the data analysis module will analyze the security trends in the network based on the current data, and then combine the current security situation of the Internet to send security warnings to each intranet terminal to remind each terminal to focus on protection in advance to avoid or reduce the occurrence of such security incidents.
[0028] The above are only specific embodiments of the present invention, but the scope of protection of the present invention is not limited thereto. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be applicable. It is included in the protection scope of the present invention.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Marine bearing swing test device

PendingCN111337253AflexibleEasy to detect
Owner:GUANGZHOU MARITIME INST

Data blood relationship analysis method and device and server

Owner:BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD

Adhesive for industrial-washing-resistant bright silver reflective fabric and preparation method thereof

PendingCN111253899AGood bonding strengthFlexible
Owner:泰安聚仁新材料有限公司

Polyolefin thermal shrinkage film and preparation method thereof

ActiveCN110341273AGood heat shrinkabilityFlexible
Owner:GUANGDONG ANDELI NEW MATERIALS CO LTD +1

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products