Unlock instant, AI-driven research and patent intelligence for your innovation.

A security management and information feedback system based on gdoi protocol

A technology of security management and information feedback, applied in the field of security management and information feedback system based on GDOI protocol, can solve the problems of monitoring, IPSec tunnel solution cannot satisfy users, etc., and achieve the effect of clear function division and excellent service processing performance

Active Publication Date: 2022-03-25
北京数盾信息科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the famous "Prism Gate" incident in the field of network security in 2013, the existing network architecture with switches and routers as the core is very easy to be monitored
Among them, the security management device (security management center) centrally manages and controls the encryption device and the key management device globally, manages the configuration information of the key management device and the encryption device, and configures the group policy of the key management device and the encryption device. View The status information of key management equipment and encryption equipment, and timely detection of assets or encryption equipment and key management equipment that have problems, and alarm and correction, to ensure that in addition, various distributed computing, voice, video in the Internet and other services need to run between branches anytime and anywhere, the traditional Hub-Spoke and point-to-point IPSec tunnel solutions cannot meet the needs of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security management and information feedback system based on gdoi protocol
  • A security management and information feedback system based on gdoi protocol
  • A security management and information feedback system based on gdoi protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. On the contrary, the present invention covers any alternatives, modifications, equivalents and arrangements within the spirit and scope of the present invention as defined by the appended claims. Further, in order to give the public a better understanding of the present invention, some specific details are described in detail in the following detailed description of the present invention. The present invention can be fully understood by those skilled in the art without the description of these detailed parts.

[0049] The present invention will be further described below with reference to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a large-scale network security management system based on the GDOI protocol. The security management system is used to collect, classify and manage asset information, and manage and control encryption equipment and key management equipment associated with assets. The configuration information of the management device and the encryption device is managed, the group policy of the key management device and the encryption device is configured, and the status information of the key management device and the encryption device is checked. The encryption equipment and key management equipment associated with the assets are protected; the assets and their encryption equipment can be maintained and monitored at any time, and remedial measures can be taken as soon as any problem occurs. The key management server and group members ( GM)'s group encryption deployment model, the whole network negotiation mechanism (Group SA), uses Group SA to encrypt and decrypt the traffic between nodes, and provides secure communication for any node IP.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a security management and information feedback system based on the GDOI protocol. Background technique [0002] The global Internet has become indispensable in people's work and life, but the threat of network information security is increasing year by year. In the famous "Prism Gate" incident in the field of network security in 2013, the existing network architecture with switches and routers as the core is very easy to be monitored. The flood of information leaking through switches and routers is a wake-up call for all Internet users. [0003] For the Internet of large-scale enterprises or government departments around the world, it often adopts such as figure 1 The network topology shown. The entire network is divided into three layers. The group ring network platform consists of several data centers, and multiple 10G networks form a ring network between the da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/0631
CPCH04L41/0631H04L63/06H04L63/062H04L63/065H04L63/08H04L63/20
Inventor 朱云李元骅张晓囡
Owner 北京数盾信息科技有限公司