Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for intensively operating and controlling several network security devices

A centralized operation and network security technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of monitoring and auditing, difficult equipment and resource access control, system account and password leakage, etc., to avoid external problems. the effect of leaking

Active Publication Date:
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Deployment areas are scattered, relying on the remote management function management that comes with security devices, the operations of each security device are scattered on different devices, and the operations of operators cannot be audited based on the original instructions of the security system
Administrators have the following troubles in system resource operation control and system account management: in the face of a large number of system accounts, it is easy to forget the password and forget to update the password regularly; multiple accounts are used by multiple people, resulting in leakage of system accounts and passwords, and cross-use of system accounts leads to inability to Determine the responsible person; it is difficult to manage the access control of equipment and resources; it is impossible to centrally identify the identity of the operator and centralize the authorization, monitoring and auditing of the operation behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for intensively operating and controlling several network security devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0017] Such as figure 1 As shown, a system for centralized operation and control of multiple network security devices includes an operation login interface 1 , an operation channel module 3 and a system resource agent operation module 5 connected in sequence.

[0018] The system also includes an access control module 2 , a resource account management module 4 , an online monitoring module 6 , and an operation content audit module 7 . The access control module 2 is connected to the operation login interface 1; the resource account management module 4 is connected to the operation channel module 3; the online monitoring module 6 and the operation content audit module 7 are connected to the system resource agent operation module 5.

[0019] Wherein: the access control module 2 adopts two control modes, which are multiple identification ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for intensively operating and controlling several network security devices. An access control module is connected with an operation login interface, a resource account management module is connected with an operation channel module, and an online monitoring module and an operation content audit module are connected with a system resource agency operation module. The method includes starting remote operation security device requests, and acquiring remote management passwords of the security devices from a password bank; converting the operation requests into original device operation commands, and letting system agencies log in; analyzing original data packets of operation into original commands, recording the original commands of the operation to realize audit. The method and the system for intensively operating and controlling the network security devices have the advantages that the system adopts the security operation control and audit technology to set up a centralized operation portal, for operation of the heterogeneous network system, intensive multi-identity verification, authorized access control, remote control, monitoring and recording of operation behaviors are realized, and rule-breaking operations are stopped.

Description

technical field [0001] The invention relates to the field of operation behavior management and control, safety monitoring and auditing of network security equipment, and in particular to a method and device for centralized operation management and control of multiple network security equipment. Background technique [0002] Deployment areas are scattered, relying on the remote management function management of security devices, the operation of each security device is scattered on different devices, and the operation of operators cannot be audited based on the original instructions of the security system. Administrators have the following troubles in system resource operation control and system account management: in the face of a large number of system accounts, it is easy to forget the password and forget to update the password regularly; multiple accounts are used by multiple people, resulting in leakage of system accounts and passwords, and cross-use of system accounts le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L9/32
Inventor 易国华胡斌杨军徐辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products