Internal control bastion host and security access method of internal network resources

A bastion host and resource access technology, applied in the field of network security, can solve problems such as resource access monitoring, auditing is not perfect, inconvenient, forgotten passwords, etc., to achieve the effect of preventing illegal acquisition and use, protecting confidentiality, and ensuring operation and behavior

Inactive Publication Date: 2012-01-25
LIAONING GOETHINK TECH
View PDF0 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows an administrator's computer (host) connected to one company’s website to monitor its activities inside it without having them physically visit each site individually. It also has several technical benefits: Firstly, this helps administrators better track their actions over time; secondly, allowing multiple computers at different locations to be managed separately while still being able to communicate effectively with each other. Thirdly, these systems provide remote authentication capabilities where only approved ones allow certain types of requests based upon what they have been granted. These technologies help maintain secure data storage environments and reduce potential damage caused during physical activity such as hackings or sabotage attempts.

Problems solved by technology

This patented technical problem addressed by the present patents relates to improving the administration levels of IT infrastructure (Infrastructures) like data centers and web sites while ensuring their proper functioning within an organization's operating boundaries. Current methods involve manually accessing sensitive components inside each machine with multiple account numbers and passwords, making it difficult if necessary due to lack of strong authenticity measures provided by these interfaces.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internal control bastion host and security access method of internal network resources
  • Internal control bastion host and security access method of internal network resources
  • Internal control bastion host and security access method of internal network resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] The internal control bastion host in the embodiment of the present invention adopts a series of advanced technologies to protect the internal network equipment and servers of the enterprise, monitor and audit the common access methods of such assets, such as character terminal, graphic terminal and other access methods Carry out monitoring and auditing, realize the control, tracking, and judgment of user behavior, and meet the security requirements of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an internal control bastion host and a security access method of internal network resources. The security access method comprises the following steps: an administrator carries out correlation management on natural person account numbers and resource account numbers by the internal control bastion host; the administrator authorizes the accessible resources to a user by the internal control bastion host and sets a user access policy for the internal control bastion host and the internal network resources; the user accesses the internal network resources by logging in the internal control bastion host; the internal control bastion host captures commands input in a user command line and carries out corresponding control according to the preset policy; and the internal control bastion host carries out log record on the commands generated in a server so as to facilitate inquiry management. By adopting the security access method, resource access can be perfectly audited and monitored and a perfect access control policy and centralized single sign-on (SSO) can be provided, thus improving the access security for the internal network equipment and the server in an enterprise and facilitating the user to access the internal network resources by the bastion host.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner LIAONING GOETHINK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products