Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for centralized operation and control of multiple network security devices

A centralized operation and network security technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of monitoring and auditing, inability to determine the responsible person for system accounts, difficult equipment and resource access control, etc., to avoid external problems. the effect of leaking

Active Publication Date: 2018-01-30
HUBEI INFOTECH SYST TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Deployment areas are scattered, relying on the remote management function management that comes with security devices, the operations of each security device are scattered on different devices, and the operations of operators cannot be audited based on the original instructions of the security system
Administrators have the following troubles in system resource operation control and system account management: in the face of a large number of system accounts, it is easy to forget the password and forget to update the password regularly; multiple accounts are used by multiple people, resulting in leakage of system accounts and passwords, and cross-use of system accounts leads to inability to Determine the responsible person; it is difficult to manage the access control of equipment and resources; it is impossible to centrally identify the identity of the operator and centralize the authorization, monitoring and auditing of the operation behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for centralized operation and control of multiple network security devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0017] Such as figure 1 As shown, a system for centralized operation and control of multiple network security devices includes an operation login interface 1 , an operation channel module 3 and a system resource agent operation module 5 connected in sequence.

[0018] The system also includes an access control module 2 , a resource account management module 4 , an online monitoring module 6 , and an operation content audit module 7 . The access control module 2 is connected to the operation login interface 1; the resource account management module 4 is connected to the operation channel module 3; the online monitoring module 6 and the operation content audit module 7 are connected to the system resource agent operation module 5.

[0019] Wherein: the access control module 2 adopts two control modes, which are multiple identification ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for centralized operation and control of multiple network security devices according to the present invention, the access control module is connected to the operation login interface; the resource account management module is connected to the operation channel module; the online monitoring module and the operation content audit module Connect with the system resource agent operation module. Start the remote operation security device request, and get the security device remote management password from the password library; the operation request is converted into the original device operation instruction, and the system agent logs in; by parsing the original operation data packet into the original instruction, and recording the original operation instruction, To achieve the audit function. The positive effect of the present invention: the system adopts safe operation control and auditing technology, establishes a centralized operation portal, realizes centralized multiple identity authentication, realizes authorized access control, realizes remote operation, and realizes operation behavior monitoring and recording for the operation of the heterogeneous network system, Implement illegal operations to block.

Description

technical field [0001] The invention relates to the field of operation behavior management and control, safety monitoring and auditing of network security equipment, and in particular to a method and device for centralized operation management and control of multiple network security equipment. Background technique [0002] Deployment areas are scattered, relying on the remote management function management of security devices, the operation of each security device is scattered on different devices, and the operation of operators cannot be audited based on the original instructions of the security system. Administrators have the following troubles in system resource operation control and system account management: in the face of a large number of system accounts, it is easy to forget the password and forget to update the password regularly; multiple accounts are used by multiple people, resulting in leakage of system accounts and passwords, and cross-use of system accounts le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L9/32
Inventor 易国华胡斌杨军徐辉
Owner HUBEI INFOTECH SYST TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products