Method and system of controlling access behaviors of client network

A technology for controlling client and network access, applied in the field of controlling client network access behavior, can solve problems such as low protection level, and achieve the effect of improving security protection level

Active Publication Date: 2013-06-12
SANGFOR TECH INC
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the commonly used client access network technology usually only uses single-end client sandbox technology or security gateway to protect the client's online behavior. Although the client sandbox can effectively isolate system damage and data leakage caused by viruses and Trojans and other risks, but there are still the following deficiencies: the client sandbox protects the client in a "passive defense" method, and lacks the functions of capturing, analyzing and feeding back to the security gateway for malicious behaviors
In addition, although there are currently solutions in the industry that combine client sandboxes and security gateways to protect clients from surfing the Internet, the client sandboxes and security gateways only provide security protection for clients' online behaviors alone, and cannot To communicate with each other between the client sandbox and the security gateway so as to realize the linkage security protection of the client's online behavior, the protection level is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of controlling access behaviors of client network
  • Method and system of controlling access behaviors of client network
  • Method and system of controlling access behaviors of client network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] In the method and system for controlling client network access behavior of the present invention, the client sandbox refers to a virtual operating environment; the sandbox has the function of isolating the user's real operating environment, and the user browses malicious webpages or runs virus Trojans The resulting abnormal system behaviors such as modifying the registry and deleting files will be redirected, and will not cause any loss to the user's real operating system. For example, secure desktop technology is a sandbox technology that is responsible for isolating users' real system files, registry, etc., and controlling access to data and networks to preve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system of controlling access behaviors of client network. The method comprises the following steps: a step of detecting client sandbox, capturing system abnormal behaviors caused by visiting malicious network done by the clients, analyzing the system abnormal behaviors, generating a corresponding analysis report and sending the analysis report to a security gateway; a step of receiving the analysis report by the security gateway, choosing a strategy used for dealing with the system abnormal behaviors; a step of controlling the network-visiting behaviors of the clients according to the dealing strategy. The method has the advantages of common protection to the network-visiting behaviors of the clients by the combination of the client sandbox and the security gateway so as to improve safety protection degree of client visiting the network, meanwhile, when the clients visit the network, transparency of network safety state is improved.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a method and system for controlling network access behavior of a client. Background technique [0002] At present, the commonly used client access network technology usually only uses single-end client sandbox technology or security gateway to protect the client's online behavior. Although the client sandbox can effectively isolate system damage and data leakage caused by viruses and Trojans and other risks, but there are still the following deficiencies: the client sandbox protects the client in a "passive defense" method, and lacks the functions of capturing, analyzing and feeding back to the security gateway for malicious behaviors. In addition, although there are currently solutions in the industry that combine client sandboxes and security gateways to protect clients from surfing the Internet, the client sandboxes and security gateways only provide security protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李龙
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products