Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data safety defense system and method based on cloud terminal, and cloud terminal safety system

A data security and defense system technology, applied in transmission systems, electrical components, etc., can solve problems such as cloud terminals not operating normally, and achieve the effect of improving defense efficiency and preventing attacks.

Active Publication Date: 2016-03-23
SHANGHAI TAIYU INFORMATION TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a cloud terminal-based data security defense system, method and cloud terminal security system, which are used to solve the problem that the cloud terminal cannot problems with normal operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data safety defense system and method based on cloud terminal, and cloud terminal safety system
  • Data safety defense system and method based on cloud terminal, and cloud terminal safety system
  • Data safety defense system and method based on cloud terminal, and cloud terminal safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] see figure 1, is a structural diagram of a cloud terminal-based data security defense system of the present invention, the system includes: a network detection management module 1, an anti-transfer module 2, and a forward transfer module 3, the network detection management module 1 and the anti-transfer module Both the module 2 and the forward transfer module 3 are connected, and the reverse transfer module 2 is connected to the forward transfer module 3 .

[0047] The network monitoring and management module 1 is used to monitor the network status of the cloud terminal in real time. When it is monitored that the cloud terminal is under attack, restrict the client's access to the cloud terminal, start the anti-transfer module, and guide the current access data packet to the anti-transit module 2;

[0048] The anti-transfer module 2 is used to intercept the current access data packet, and send the legal access data packet in the intercepted current access data packet to...

Embodiment 2

[0090] Based on the above embodiments, the present invention also provides a security defense method based on cloud terminals, such as Figure 6 As shown, it is a flowchart of a cloud terminal-based security defense method of the present invention, wherein the method includes steps:

[0091] Step S1, real-time monitoring of the network status of the cloud terminal;

[0092] Step S2, when it is monitored that the cloud terminal is under attack, restricting access to the cloud terminal;

[0093] Step S3, intercepting the current access data packet;

[0094] Step S4, storing legal access data packets in the intercepted current data packets, the current access data packets including legal access data packets and illegal access data packets.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data safety defense system and method based on a cloud terminal, and a cloud terminal safety system. The data safety defense system comprises a network monitoring management module which is used for monitoring the network condition of the cloud terminal, limiting the access of the cloud terminal, starting a negative-transfer module, and guiding a current access data packet to the negative-transfer module, the negative-transfer module which is used for intercepting the current access data packet, sending the legitimate access data packet in the intercepted current access data packet to a positive-transfer module, and the positive-transfer module which is used for receiving and storing the legitimate access data packet. Since the network condition of the cloud terminal is monitored in real time, when the cloud terminal is attacked, the access data packet is timely intercepted, the operation of a router is controlled, and the unlawful attack to the cloud terminal is effectively prevented.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to a cloud terminal-based data security defense system, method and cloud terminal security system. Background technique [0002] Cloud computing is a network technology developed in recent years. It distributes computing tasks on a resource pool composed of a large number of computers, enabling various application systems to obtain computing power, storage space, and various software services according to their own needs. [0003] While cloud computing provides great convenience for human beings, it also brings some security risks. In addition to traditional network attacks, such as hacker attacks, vulnerability scanning, intrusion and other means, the biggest threat to cloud platforms is DDos (Distributed Denial of Service, Distributed Denial of Service). DDos attack, DDos is a kind of Dos, when multiple attack sources in different locations attack one or more targets ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1458H04L63/1466
Inventor 余启轩
Owner SHANGHAI TAIYU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products