Hierarchical type mobile internet security monitoring and protecting system

A mobile Internet and security monitoring technology, applied in the field of layered mobile Internet security monitoring and protection system, can solve problems such as unsatisfactory solutions, no end-to-end security countermeasures, and lack of overall solutions, so as to ensure business Safety and information security, and the effect of improving safe operation and management capabilities

Active Publication Date: 2010-07-28
INSPUR TIANYUAN COMM INFORMATION SYST CO LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, even in the ordinary Internet, most of the network security and information security issues are far from being satisfactorily resolved—there is no complete security monitoring and protection system/no real-time effective end-to...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical type mobile internet security monitoring and protecting system
  • Hierarchical type mobile internet security monitoring and protecting system
  • Hierarchical type mobile internet security monitoring and protecting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The layered mobile Internet security monitoring and protection system of the present invention will be described in detail below with reference to the accompanying drawings.

[0021] The layered mobile Internet security monitoring and protection system of the present invention includes a modular system structure of three levels and four basic functional groups, so that the entire monitoring and protection system has flexible deployment, strong scalability, convenient upgrade, and complete end-to-end Features such as deep protection. It can be adapted to all levels of mobile Internet from terminal, access network, core network to service network, and can be used to build a complete security monitoring and protection system;

[0022] The intelligent performance of each module ensures that it has a strong security monitoring autonomy function, and can monitor and protect the operating process and resource objects within its jurisdiction according to its own configuration. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hierarchical type mobile internet security monitoring and protecting system. A set of complete mobile internet security monitoring and protecting system is provided by adopting an active security monitoring and protecting technology, an intelligent detecting and analyzing technology and a customer service-oriented quality assurance policy on the basis of the further research on the characteristics of performability and maintainability of the mobile internet. The system comprises three layers of functional groups including a security operation center (SOC), a security gateway (SGW), a security access entity (SAE), and defines the basic attribute of each functional entity and the interoperability relation among the functional entities. The SOC is in charge of overall security operation monitoring management, the SGW is in charge of the flux security detection from common internet to the mobile internet, a security agent (SA) is in charge of the security monitor of in-out flux of network nodes or domestic area networks, and the SAE is in charge of monitoring the safe access and the safe operation of various types of terminals.

Description

technical field [0001] The present invention relates to a mobile Internet security field, and specifically adopts a multi-dimensional three-dimensional protection strategy and an intelligent security monitoring technology to innovatively design a layered mobile Internet security monitoring and protection system. Background technique [0002] Mobile communications are entering the mobile Internet era on a large scale, and smart terminals such as mobile phones are increasingly becoming the most important communication and information bearing platforms, and the main access subjects for information exchange, e-commerce, mobile office, consumer payment, and entertainment. However, due to the direct interconnection between the mobile Internet and the ordinary Internet, malicious attacks such as viruses, Trojan horses, hackers, and illegal intrusions that originally raged on the Internet also flooded in. Currently, viruses, Trojan horses, and malicious attacks targeting mobile Inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24H04W12/08H04W12/37
Inventor 苗再良
Owner INSPUR TIANYUAN COMM INFORMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products