Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet data package protective system and method thereof

A protection system and Internet technology, applied in the field of data packet protection system, can solve problems such as management loopholes, theft, account password leakage, etc., to achieve the effect of reducing loopholes, increasing diversification, and avoiding data leakage

Inactive Publication Date: 2013-08-21
FINEART TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, there are often negligence in artificially setting loopholes in identity authentication permissions. Once an employee leaves the company, if the account password is not removed, management loopholes may occur, allowing the resigned employee to use an unauthorized computer system to enter the server terminal to steal important information from the company. information, or someone leaks or steals the account password, the above-mentioned lack will endanger the security of important information within the company

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet data package protective system and method thereof
  • Internet data package protective system and method thereof
  • Internet data package protective system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0076] The present invention uses the firewall technology to realize the data packet protection system of the Internet of the present invention. Generally speaking, a specific internal network (intranet) is isolated from other parts of the Internet, that is, all data packets entering and exiting must pass through the firewall. The firewall mainly enters the protection scope through some protocols or filters all the protocols not clearly listed, so as to protect the internal resources of the organization from the intrusion of the external Internet.

[0077] The present invention is a data packet protection system for the Internet using computer system equipment to implement the present invention. Such as image 3 As shown, the compute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet data package protective system. The system comprises a plurality of client-side computer systems and a servo terminal. The client sides can intercept a transmitted data package, and transmit the data package to the servo terminal after an identification sign is added to a blank of a TCP / IP file header of the data package. The servo terminal can filter and monitor that whether the identification sign is in blank of the TCP / IP file header of the received data package or not. The data package is passed if the identification sign is in the blank of the TCP / IP file header of the received data package, and the data package is stopped if the identification sign is not in the blank of the TCP / IP file header of the received data package.

Description

technical field [0001] The invention relates to an Internet data package protection system, in particular to a protection system and method for preventing unauthorized computer systems from connecting to a local area network. Background technique [0002] With the advancement of science and technology, enterprise management gradually develops and uses an enterprise resource planning system (Enterprise Resource Planning, hereinafter referred to as ERP system) for integrated management. Its main connotation is to apply information system technology to various resources of the enterprise, such as logistics, Capital flow, information flow, human resources, etc. are integrated and managed, and various resources are combined to form a supply and marketing chain management, that is, every link of enterprise operation is handed over to scientific management, so that enterprise resources can be optimally allocated. [0003] see figure 1 , is the architecture of the EPR system 10. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 蔡宜霖李日崎
Owner FINEART TECH CO LTD