Security management and information feedback system based on GDOI protocol

A technology of security management and information feedback, applied in the field of security management and information feedback system based on GDOI protocol, can solve the problems of monitoring, IPSec tunnel solution cannot satisfy users, etc., and achieve the effect of clear function division and excellent service processing performance

Active Publication Date: 2016-09-14
北京数盾信息科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the famous "Prism Gate" incident in the field of network security in 2013, the existing network architecture with switches and routers as the core is very easy to be monitored
Among them, the security management device (security management center) centrally manages and controls the encryption device and the key management device globally, manages the configuration information of the key management device and the encryption device, and configures the group policy of the key management device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management and information feedback system based on GDOI protocol
  • Security management and information feedback system based on GDOI protocol
  • Security management and information feedback system based on GDOI protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. On the contrary, the present invention covers any alternatives, modifications, equivalent methods and schemes defined by the claims in the spirit and scope of the present invention. Further, in order to enable the public to have a better understanding of the present invention, some specific details are described in detail in the detailed description of the present invention below. Those skilled in the art can fully understand the present invention without the description of these details.

[0049] The present invention will be further described below in conjunction with the drawings and specific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a large-scale network security management system based on a GDOI protocol. The security management system is used for managing and controlling information acquisition, classification and management of properties and encryption equipment and key management equipment associated with the properties, managing configuration information of the key management equipment and the encryption equipment, configuring group policies of the key management equipment and the encryption equipment, and checking state information of the key management equipment and the encryption equipment. According to the large-scale network security management system disclosed by the invention, security protection of the properties and the encryption equipment and the key management equipment associated with the properties is carried out through a property management module and a configuration management module; therefore, the properties and the encryption equipment thereof can be maintained, monitored and checked at any time; if there is a problem, a remedial measure can be taken at first time; a group encryption and deployment model of a key management server and a group member (GM) and a whole network consultation mechanism (Group SA) are provided; the flow among nodes is encrypted and decrypted by using the Group SA; and security communication is provided for the IP of any node.

Description

Technical field [0001] The invention belongs to the technical field of information security, and particularly relates to a security management and information feedback system based on the GDOI protocol. Background technique [0002] The global Internet has been indispensable in people's work and life, but the threat of network information security is increasing year by year. In the famous "Prism Gate" incident in the field of network security in 2013, the existing network architecture with switches and routers as the core is very easy to be monitored. A large amount of information leaked through switches and routers, sounding a wake-up call for all network users. [0003] For the Internet of large-scale enterprises or government departments around the world, it often uses such as figure 1 The network topology shown. The entire network is divided into three layers. The group ring network platform is composed of several data centers. Between the data centers, multiple 10G networks ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0631H04L63/06H04L63/062H04L63/065H04L63/08H04L63/20
Inventor 朱云李元骅张晓囡
Owner 北京数盾信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products