Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Local area network (LAN) security evaluation method and system

A security assessment and LAN technology, applied in the LAN security assessment system, in the field of LAN security assessment, can solve problems that are not comprehensive and cannot be used to judge the security status of the enterprise network

Active Publication Date: 2012-04-11
奇安信网神信息技术(北京)股份有限公司 +1
View PDF12 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the number of viruses and the degree of virus damage, although this method can reflect the security status of the enterprise network environment to a certain extent, it is extremely incomplete and cannot be used as a real benchmark for judging the security status of the enterprise network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Local area network (LAN) security evaluation method and system
  • Local area network (LAN) security evaluation method and system
  • Local area network (LAN) security evaluation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0087] refer to figure 1 , which shows a flow chart of the steps of a method embodiment of a local area network security assessment of the present application, where the terminals in the local area network include control terminals and user terminals, and this embodiment may specifically include the following steps:

[0088] Step 101, triggering security detection of user terminals in the local area network;

[0089] It should be noted that, in the embodiment of the application, the control terminal refers to the terminal used to control other user terminals to perform security detection in the local area network, and the user terminal refers to the terminal in the local area network that responds to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a local area network (LAN) security evaluation method and system. Terminals in an LAN comprise a control terminal and a user terminal, and the method comprises the steps of: triggering security detection on the user terminal in the LAN; reporting security detection data corresponding to the user terminal to the control terminal by the user terminal; and generating security evaluation information of the current LAN by the control terminal according to the received security detection data. The method and system provided by the invention can be used for completely and truly feeding back the security state of an enterprise network.

Description

technical field [0001] The application relates to the technical field of computer security, in particular to a method for evaluating local area network security and a system for evaluating local area network security. Background technique [0002] Antivirus software, also known as antivirus software or antivirus software, is a class of software used to eliminate computer viruses, Trojan horses, and malware. Anti-virus software usually integrates functions such as monitoring and identification, virus scanning and removal, and automatic upgrades. Some anti-virus software also has functions such as data recovery. , intrusion prevention system, etc.) is an important part. [0003] With the development of the network, anti-virus software not only provides services to individual device terminals (commonly known as "personal version"), but more and more anti-virus software manufacturers begin to provide overall services to local area networks (such as enterprise networks) (commonl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 邓振波孙小庆黄鉴廷于新卫赵化强王林
Owner 奇安信网神信息技术(北京)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products