Method for realizing network security and star network

A star-shaped network and network security technology, applied in the field of network communication, can solve the problems that the security of the star-shaped network needs to be improved, cannot be monitored in real time and block the leakage of internal confidential data, etc., and achieve the effect of improving security.

Inactive Publication Date: 2011-09-14
苏州九州安华信息安全技术有限公司
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because most of these information security technologies are developed for hacking, they cannot monitor and block the leakage of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network security and star network
  • Method for realizing network security and star network
  • Method for realizing network security and star network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0023] figure 2 It is a schematic diagram of a method for realizing network security in an embodiment of the present invention. This method is applicable to a star network in which a plurality of terminals communicate through a switch, and the multiple terminals access a security server through the switch, and a controller is also arranged in the star network, then as figure 2 As shown, the method includes:

[0024] 201. A connection is established between the security server and the controller through authentication; after the connection is successfully established, the security server regularly sends a detection message to the controller, and the controller feeds back a response message to the security server after receiving the detection mes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing network security and a star network. In the scheme of the invention, a controller is added to the start network; the controller and a security server are connected in an authentication manner; the security server confirms the communication security between the security server and the controller by periodically sending a detection message; every time after receiving an access request from a server, the security server sends the security level of the file requested by the terminal and the IP (Internet protocol) address of the terminal to the controller; and the controller determines the confidential level of the terminal according to the security level of the file, stores the IP address and confidential level of the terminal in a security level mapping table, generates a communication rule of the terminal according to the security level and sends the communication rule to a switch so as to control communication between terminals. Through the technical scheme of the invention, the security of the star network is greatly improved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for realizing network security and a star network. Background technique [0002] Star network is the most common way of LAN connection in practice. figure 1 It is a schematic diagram of an existing star network. Such as figure 1 As shown in , the communication between terminals must pass through the switch, and the access of each terminal to the security server also needs to pass through the switch. [0003] The openness of the LAN makes it possible to figure 1 Important information resources in each terminal in the shown star network are in a high-risk state, and possible security problems include illegal intrusion of viruses and Trojan horses spread through the network, and information theft based on the network. [0004] In response to the above problems, traditional information security technologies, such as firewalls, intrusion detection systems, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/44
Inventor 戴瑞
Owner 苏州九州安华信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products