Method for realizing security of network terminal equipment

A network terminal and network security technology, which is applied in the field of network terminal equipment security, can solve problems such as insufficient components, encroachment, and limited resources, and achieve the effect of reducing hardware equipment requirements, reducing hardware requirements, and expanding the scope of application

Inactive Publication Date: 2011-04-13
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has brought unprecedented pressure to network security, because the resources of these network terminal devices are very limited, it is impossible to maintain a large-scale traditional network security solution software, and there may not be enough space to store the huge feature library and numerous components
[0005] Some of the existing network security software for small smart devices still haven’t got rid of the traditional killing mode. In essence, they are miniature versions of computer network security software, which not only seriously affects the running speed of these small smart devices, but also invades more and more more and more system resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing security of network terminal equipment
  • Method for realizing security of network terminal equipment
  • Method for realizing security of network terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] With the continuous development of computer and network technology, various network terminal devices are connected to the network, ranging from huge servers to small or even micro embedded terminal systems such as mobile phones and netbooks. The addition of these devices facilitates and enriches people's lives, but it also makes network security increasingly severe. In the face of various network security issues, traditional antivirus software continuously releases update modules and anti-virus modules for these network security issues, which curbs the outbreak of network security issues to a certain extent. With the update and installation of the anti-kill module, the amount of data that needs to be stored and maintained by network terminal equipment is increasing, which seriously affects the operation speed of network equipment, and is not suitable for deployment on small equipment.

[0032] Through the analysis of the present invention, it is found that the operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing security of network terminal equipment. In the method, systems of the network terminal equipment are fully utilized, such as basic operations of a network security client and a host operation system, a network security layered structure based on client request-security service response, strong analysis and processing capabilities of a security centerand the like; in the security center, a solution is divided into basic operations, and encoding is carried out according to an operation encode table, then the encoded solution is packaged into a network security solution data packet, and finally the network security solution data packet is transmitted to the network terminal equipment; and the network terminal equipment combines the basic operations and relevant parameters according to the requirement of the security center, thus a complete solution is obtained so as to substitute for the functions of the traditional patch and Spant module, requirements of network security on hardware devices are lowered, and the network security application range is expanded.

Description

technical field [0001] The invention belongs to the field of network technology, and more specifically relates to a method for realizing security of network terminal equipment. Background technique [0002] With the continuous development of computer and network technology, people rely more and more on the network. However, with the expansion of network applications, the situation of network security is becoming more and more severe. How to ensure the security of equipment in the network has become an important issue. question. [0003] Traditional network security solutions mainly focus on detection. It will create signature databases and detection rules on network terminal devices. A variety of patch packages, adding a wide variety of new components. This method not only occupies more network traffic, but more importantly, puts forward higher requirements on the hardware of network terminal equipment. These ever-accumulating signature databases, patches, and function mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L1/00
CPCH04L29/06095H04L69/16H04L63/1416H04L63/166
Inventor 彭云峰隆克平刘菖陶旭卓越
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products