Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for local area network security assessment

A security assessment, local area network technology, applied in the system of local area network security assessment, the field of local area network security assessment, can solve the problem of inability to judge the security status of the enterprise network, incomplete and other problems

Active Publication Date: 2015-09-30
QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC +1
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the number of viruses and the degree of virus damage, although this method can reflect the security status of the enterprise network environment to a certain extent, it is extremely incomplete and cannot be used as a real benchmark for judging the security status of the enterprise network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for local area network security assessment
  • Method and system for local area network security assessment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0087] refer to figure 1 , which shows a flow chart of the steps of a method embodiment of a local area network security assessment of the present application, where the terminals in the local area network include control terminals and user terminals, and this embodiment may specifically include the following steps:

[0088] Step 101, triggering security detection of user terminals in the local area network;

[0089] It should be noted that, in the embodiment of the application, the control terminal refers to the terminal used to control other user terminals to perform security detection in the local area network, and the user terminal refers to the terminal in the local area network that responds to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a local area network (LAN) security evaluation method and system. Terminals in an LAN comprise a control terminal and a user terminal, and the method comprises the steps of: triggering security detection on the user terminal in the LAN; reporting security detection data corresponding to the user terminal to the control terminal by the user terminal; and generating security evaluation information of the current LAN by the control terminal according to the received security detection data. The method and system provided by the invention can be used for completely and truly feeding back the security state of an enterprise network.

Description

technical field [0001] The application relates to the technical field of computer security, in particular to a method for evaluating local area network security and a system for evaluating local area network security. Background technique [0002] Antivirus software, also known as antivirus software or antivirus software, is a class of software used to eliminate computer viruses, Trojan horses, and malware. Anti-virus software usually integrates functions such as monitoring and identification, virus scanning and removal, and automatic upgrades. Some anti-virus software also has functions such as data recovery. , intrusion prevention system, etc.) is an important part. [0003] With the development of the network, anti-virus software not only provides services to individual device terminals (commonly known as "personal version"), but more and more anti-virus software manufacturers begin to provide overall services to local area networks (such as enterprise networks) (commonl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 邓振波孙小庆黄鉴廷于新卫赵化强王林
Owner QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products