Intranet security unified management platform and management method of management platform

A management platform and information system technology, which is applied in the field of integrated network security system, can solve problems such as access equipment cannot access the network, heavy workload, lack of guidance to access the network, etc., and achieve the effect of access control

Active Publication Date: 2013-06-26
HANGZHOU INFOGO TECH
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Step3: If the authentication is passed, the controlled logical port of the access switch is opened; otherwise, the port remains closed, and the access device cannot access the network
[0010] The admission control scheme based on the 802.1x protocol has three major disadvantages: the inability to push the access page, extensive authority control, and insufficient support for the hub environment
[0011] First of all, all the current 802.1x platforms require network users to install a network client for authentication. Network access, this process is equally effective for visitors and regular employees. Due to the lack of support for guiding network access, even legitimate users cannot be assisted to access the network and cannot perform normal work. If the administrator manually installs the network access client end, and there is a heavy workload in the case of a large number of devices and scattered; second, many non-desktop ip devices (such as network p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intranet security unified management platform and management method of management platform
  • Intranet security unified management platform and management method of management platform
  • Intranet security unified management platform and management method of management platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0041] An information system intranet security unified management platform, including such figure 1 The network access standard management system S1, the network intelligent management system S2, and the multi-dimensional terminal security management platform S3 are shown. The network access standard management system S1 performs access control on network access equipment and personnel security, and the network intelligent management system S2 is aimed at The device network flow and network access behaviors are controlled and audited, and the multi-dimensional terminal security management platform S3 performs real-time monitoring and management response for terminal configuration and application management.

[0042] see figure 2 , the network access specification management system S1 includes a network access identity authentication module S11, a network access security inspection module S12, a vulnerability repair module S13, an authority control module S14, a BI report anal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intranet security unified management platform and a management method of the management platform. The intranet security unified management platform comprises an admission standard management system, an intelligent network management system and a multi-dimensional terminal security management platform. The management method comprises the steps of: carrying out feature identification on a terminal accessing to a network; carrying out query according to a feature of the terminal, taking an admission role; carrying out standard examination on the role to access the network according to the role authority; carrying out monitoring and irregularity response on security configuration and operation behaviors after the terminal accesses the network; carrying out monitoring and irregularity response on flow condition of the network; and carrying out statistics and BI (Business Intelligence) analysis on various kinds of events. According to the intranet security unified management platform and the management method of the management platform, admission control is realized through switching of an isolation region, the transmission of all data of a device in the isolation region is controlled through the management platform, the standard restriction is realized through a WEB authentication page on which the an access device is forced to access the management platform, and thus the non-client end admission control is realized, and the defect that a plurality of devices under a single port are simultaneously accessed to the network or simultaneously isolated is avoided.

Description

technical field [0001] The present invention relates to network security technology, in particular to an information system intranet security unified management platform and management method, which is an integration of identification, security inspection and security policy enforcement for users and terminals accessing the information system intranet Network security system. Background technique [0002] Admission Control is short for Network Access Control (NAC). Access control refers to the protection of the network boundary, and the compliance check of the terminals connected to the network and the users of the terminals. In the admission control industry, the most traditional technology is the international standard IEEE802.1x technology. 802.1x protocol—port-based network access control protocol (port-based network access control protocol), is an access control and authentication protocol for Client / Server. It can restrict unauthorized users / equipment from accessing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/46H04L12/24
Inventor 韩金龙罗治华何俊
Owner HANGZHOU INFOGO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products