Network security system under mobile Internet environment

A network security system and mobile Internet technology, applied in transmission systems, safety devices, electrical components, etc., can solve problems such as platform crashes, reduce maintenance costs, and prevent internal damage and external attacks

Inactive Publication Date: 2016-12-14
北京近颐科技有限公司
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in fact, no matter how well the platform's network security measures are in place, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security system under mobile Internet environment
  • Network security system under mobile Internet environment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples are only used to explain the present invention, but not to limit the scope of the present invention.

[0034] like figure 1 As shown, a network security system in a mobile Internet environment includes a security isolation gatekeeper, an external network program server, a server outside the gatekeeper, a server in the gatekeeper, and an interface server that is connected to a specific application service system and provides interface services;

[0035] The security isolation gatekeeper is used to ensure that on the basis of the security isolation between the specific application service system and the external access network, the access request and the return data of the access request are realized in the external network program server and gatekeeper through the asynchronous file synchronization function. Transfer and share between exte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security system under a mobile Internet environment, comprising a security isolation gap, an extranet application server, a gap external server, a gap internal server, and an interface server which is connected with a specific application service system and provides interface service. The extranet application server receives an access request of a user, transmits the access request among the gap external server, the gap internal server and the interface server through an inter-gap asynchronization and synchronization function, and gets returned data through the interface server. The returned data is transmitted among the gap internal server, the gap external server and the extranet application server the inter-gap asynchronization and synchronization function, and is returned to the user. The application service system is deployed through the security isolation gap to establish a perfect access control mechanism, and cross-operation-platform, cross-platform and cross-service-platform security access management strategies can be provided.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security system under the mobile Internet environment. Background technique [0002] At present, although the vast majority of users have begun to raise the security protection work of the platform to a very high level and try their best to protect more resources, most users still only focus on the security protection of the platform network. Security measures such as firewalls and intrusion detection platforms have been added to the security design of the platform, and it is believed that this can be "safety". But in fact, no matter how well the platform's network security measures are in place, the loopholes in the platform host itself are still enough to cause the entire platform to crash. Host vulnerabilities are mainly manifested in: difficulty in multi-user management, weak ability to resist attacks, and passive security precautions. Therefore, a network system w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/02H04L63/0823H04L63/1433H04L63/145H04L63/1466H04W12/06
Inventor 王雪山
Owner 北京近颐科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products