Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety online detecting system facing to terminal computers

A terminal computer and inspection system technology, applied in computer security devices, computing, instruments, etc., can solve problems such as long management cycles, insufficient settings, and high internal complexity.

Active Publication Date: 2014-12-17
BEIJING INST OF SPACECRAFT SYST ENG +1
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The internal complexity of this large-scale network system makes management extremely difficult and the management cycle is lengthy, and with the expansion of the system scale, the management overhead also increases exponentially
[0003] The management of network security policies is an essential part of any network system management. Improper network security configuration may cause some users to have excessive privileges, while other users who need high privileges may not be able to obtain corresponding privileges. permissions, resulting in improper permission configuration; on the other hand, it may also bring a very large security risk to the network and reduce the security defense capability of the entire network
[0004] At present, the general operation is to use various functions provided by the computer to set and obtain these policies, but these functions are scattered, and the settings are not sufficient, and many important functions required by users cannot be achieved.
For the existing functions, users need certain computer expertise to use them, and the settings are cumbersome, which is not conducive to the user's operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety online detecting system facing to terminal computers
  • Safety online detecting system facing to terminal computers
  • Safety online detecting system facing to terminal computers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The implementation process of the system of the present invention will be described in detail below in conjunction with the accompanying drawings. Such as figure 1 As shown, the system conducts a centralized inspection of all terminal computers online on a central computer, and all computers are connected through a network; the system includes an online inspection tool and a packaging module, and the packaging module packages the online inspection tool into a CAB form and stored on the central computer, the central computer embeds the CAB into the IE browser (com technology can be used to realize embedding), and the terminal computer downloads the CAB from the central computer through the IE browser and automatically installs it; the online inspection tool includes unified Data interface module, security check unit and display module;

[0071] The user inputs the expected inspection item instruction and the input information of the corresponding inspection item through...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security online detecting system facing to terminal computers performs a centralized detection on all the terminal computers in network on a center computer on line. The system comprises a online detecting tool, a packaging module and the center computer, the online detecting tool is packed as CAB form and stored in the center computer by the packaging module, and the CAB is embedded into the IE browser by the center computer, the CAB is downloaded from the center computer to the terminal computer through the IE browser and automounted, a user can input a project command which expected to be detected and input information corresponding to the detected project by the IE browser on the center computer, the received project command and the input information corresponding to the detected project are send to a security detecting unit by a unified data interface module of every terminal computer, and the security detecting unit starts strategy security online detecting or patch security online detecting or hardware resource information security online detecting or software security online detecting according to the project command, and then the detecting results are displayed by a display module.

Description

technical field [0001] The invention belongs to the technical field of computer safety inspection. Background technique [0002] A large-scale network system usually includes a large number of different network devices, such as gateways, routers, servers and clients that provide services to users and run various applications. Devices, services, applications, servers, clients, and users, and even their relationships are all objects that need to be managed. The internal complexity of this large-scale network system makes management extremely difficult and the management cycle is lengthy, and with the expansion of the system scale, the management overhead also increases exponentially. [0003] The management of network security policies is an essential part of any network system management. Improper network security configuration may cause some users to have excessive privileges, while other users who need high privileges may not be able to obtain corresponding privileges. pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/57
Inventor 文梁韩磊陈燕军刘霞姜红星赵飞朱喜刚邓文浩张东山唐立才张敬鹏吴宏彬方超纪树峰杨景校吴晓明王旭石志勇陈佳纪曦赵卫灵陈楚平
Owner BEIJING INST OF SPACECRAFT SYST ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products