Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security policy online detection system facing to terminal computers

A terminal computer and inspection system technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as high internal complexity, reduced network security defense capabilities, and lengthy management cycles, so as to reduce professional technical knowledge requirements and reduce The effect of inputting unique commands and improving the overall safety performance

Active Publication Date: 2012-08-22
BEIJING INST OF SPACECRAFT SYST ENG +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The internal complexity of this large-scale network system makes management extremely difficult and the management cycle is lengthy, and with the expansion of the system scale, the management overhead also increases exponentially
[0003] The management of network security policies is an essential part of any network system management. Improper network security configuration may cause some users to have excessive privileges, while other users who need high privileges may not be able to obtain corresponding privileges. permissions, resulting in improper permission configuration; on the other hand, it may also bring a very large security risk to the network and reduce the security defense capability of the entire network
[0004] At present, the general operation is to use various functions provided by the computer to set and obtain these policies, but these functions are scattered, and the settings are not sufficient, and many important functions required by users cannot be achieved.
For the existing functions, users need certain computer expertise to use them, and the settings are cumbersome, which is not conducive to the user's operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy online detection system facing to terminal computers
  • Security policy online detection system facing to terminal computers
  • Security policy online detection system facing to terminal computers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The implementation process of the system of the present invention will be described in detail below in conjunction with the accompanying drawings. This system conducts centralized inspection on all terminal computers online on a central computer, and all computers are connected through a network; the system includes an online inspection tool and a packaging module, and the packaging module packs the online inspection tool into a CAB form and Stored on the central computer, the central computer embeds the CAB into the IE browser (can adopt com technology to realize embedding), and the terminal computer downloads the CAB from the central computer through the IE browser and automatically installs it; the online inspection tool includes a policy definition module, Unified data interface module, query analysis module, strategy internal comparison module and display module;

[0027] The system of the present invention can realize two situations of online centralized inspectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security policy online detection system facing to terminal computers. All the terminal computers are intensively detected on line on a central computer; all the computers are connected through a network; the system comprises an online detection tool, a packaging module and the central computer, wherein the packaging module is used for packaging the online detection tool into a CAB form to be stored on the central computer; the central computer is used for embedding the CAB into an IE (Internet Explorer) browser; the terminal computers download the CAB from the central computer through the IE browser and automatically install the CAB; and the online detection tool comprises a policy defining module, a uniform data interface module, a checking analyzing module, a policy internal ratio module and a display module. The system has the advantages of short development period, good maintainability, flexibility of opening an interface, complete debugging function and easiness for use and management.

Description

technical field [0001] The invention relates to a terminal computer-oriented strategy, security management and control, and belongs to the technical field of computer security inspection. Background technique [0002] A large-scale network system usually includes a large number of different network devices, such as gateways, routers, servers and clients that provide services to users and run various applications. Devices, services, applications, servers, clients, and users, and even their relationships are all objects that need to be managed. The internal complexity of this large-scale network system makes management extremely difficult and the management cycle is lengthy, and with the expansion of the system scale, the management overhead also increases exponentially. [0003] The management of network security policies is an essential part of any network system management. Improper network security configuration may cause some users to have excessive privileges, while oth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 文梁韩磊陈燕军刘霞姜红星赵飞朱喜刚邓文浩张东山唐立才张敬鹏吴宏彬方超纪树峰杨景校吴晓明王旭石志勇陈佳纪曦赵卫灵陈楚平
Owner BEIJING INST OF SPACECRAFT SYST ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products