Network system for realizing integrated security services

A network system and security service technology, applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problems of limited network performance, difficult effective implementation of QoS technology, low packet forwarding rate, etc., and achieve the goal of improving security performance Effect

Active Publication Date: 2010-07-07
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, issues such as security and QoS of general IP networks restrict the rapid development of integrated networks
[0003] The following security problems exist in the IP network: the original intention of the IP protocol design is to follow the principles of openness and equality, and there are not too many considerations in network security, so that there are many security risks in the current IP protocol architecture
[0004] 2) There is no distinction between user IP address and network IP address
Make it possible for user terminals to attack network devices
[0005] 3) Users freely access the network, and there is no effective source address verification
User terminals can forge source addresses to launch traffic impact or spoofing attacks on the network, but cannot be traced
[0006] 4) User business lacks control and cannot be supervised, leading to out-of-control and flooding of illegal applications
[0007] 5) IP packets are transmitted in plain text, and the information is easily eavesdropped, tampered with, counterfeited, and the IP header has complete source and destination address information, which is easily used and analyzed illegally
This security protection system built by superimposition improves the security and confidentiality performance of the network and business to a certain extent, but there are also some problems: limited network performance: superimposed security and confidentiality devices generate additional transmission and management overhead in the network, Occupies part of the bandwidth resources, increases the forwarding delay of business data, and has a great impact on communication performance; and compared with network switching equipment, the packet forwarding rate of security equipment is generally lower, and lacks a corresponding queue scheduling mechanism, making network switching The forwarding pe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] All features disclosed in this specification, or all disclosed steps in a method or process, may be combined in any way except mutually exclusive features and / or steps.

[0023] Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), unless expressly stated otherwise, may be replaced by other equivalent or alternative features serving a similar purpose. That is, unless expressly stated otherwise, each feature is but one example of a series of equivalent or similar features.

[0024] An integrated network security service system should meet the user's needs for application services and security and confidentiality, ensure the service quality of communication services, and ensure the security and confidentiality performance of the network system. It includes five basic technical systems: classified and isolated networks, integrated business services, service quality assurance, integrated security protection and integrated ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network system for realizing integrated security services, which comprises the classification separation of data transmission, the security, confidentiality and the QoS (quality of service) guarantee of application services, the integrated security protection of the network system and network management. The network system has the advantage of integrated design of the data transmission, the security protection and application services, thereby constructing a high-efficient security network platform with the QoS guarantee capable of bearing various types of services. Integrated network security is to apply security protective measures in all aspects of network communication and make the security protective measures mutually cooperate and support to guarantee security performance and communication efficiency; and the integrated network services support integrated services such as voice, video, data and the like and guarantee security and QoS of various types of services.

Description

technical field [0001] The invention relates to a network system for realizing integrated security service. Background technique [0002] With the continuous development and evolution of the information society, people's communication needs have developed from a single voice or data communication to interactive multimedia information communication, and the network system has changed from an independent system with separate services to an integrated network with unified services for voice, video and data. develop. In recent years, IP technology has developed rapidly, and the construction of an integrated network with IP technology as the core has gained the consensus of the industry. However, issues such as security and QoS of common IP networks restrict the rapid development of integrated networks. [0003] The following security problems exist in the IP network: the original intention of the IP protocol design is to follow the principles of openness and equality, and ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/06H04L29/12
Inventor 王文胜周俊王强
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products