Implementation method for safely managing intranet terminal

A technology of terminal security and implementation method, applied in the direction of platform integrity maintenance, etc., to achieve the effect of easy promotion and strong practicability

Inactive Publication Date: 2015-12-09
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF1 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the contrary, the security threat from computer terminals inside the network is a thorny problem commonly faced by many security managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method for safely managing intranet terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0040] The present invention provides a method for implementing security management of intranet terminals, as shown in the attached figure 1 As shown, the specific implementation process is:

[0041] Design ten modules of terminal basic management, asset management, terminal desktop management, terminal security management, host operation and maintenance, patch distribution, security monitoring and auditing, report management, event alarm management, and third-party interface management to realize the controllable management of internal network terminals .

[0042] Furthermore, the structure and implementation process of the above ten modules are now described in detail:

[0043] 1. Terminal basic management module.

[0044]Terminal registration management. The system adopts the management method combining C / S and B / S modes, including clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementation method for safely managing an intranet terminal. Controllable management of the internet terminal is realized through ten modules including a design terminal basic management module, an asset management module, a terminal desktop management module, a terminal safety management module, a host operation and maintenance module, a patch distribution module, a safe monitoring and auditing module, a report management module, an event alarm management module and a third-party interface management modules. Compared with the prior art, the implementation method for safely managing the intranet terminal is capable of distributing safely tested patches to network users and installing in an automatic or manual manner, setting safety rules of the terminal through unified strategy management, being safely integrated and in alarm linkage with other safe equipment, and supporting a multi-stage cascade wide area network architecture; and thus, the optimal management effect is achieved.

Description

technical field [0001] The invention relates to the technical field of computer terminal security, in particular to a method for implementing security management of intranet terminals with strong practicability. Background technique [0002] When it comes to network security, people naturally think of network border security, but the reality is that most of the network security risks come from within. Conventional security defense concepts are often limited to the gateway level, network boundaries (firewall, IDS, vulnerability scanning), etc., and important security facilities are roughly concentrated in computer rooms or network entrances. Under the strict monitoring of these devices, security threats from outside the network greatly reduced. On the contrary, the security threat from the computer terminal inside the network is a thorny problem that many security managers generally face. [0003] The security defense survey in the past two years shows that more than 80% of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/55
CPCG06F21/57G06F21/55
Inventor 梁媛赵慧
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products