Network security method
A technology for network security and network security analysis, applied in the direction of security devices, network topology, electrical components, etc., to achieve the effect of improving performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0013] The present invention will be further described below in conjunction with specific examples.
[0014] Mobile terminal computers and wireless access points connected to the Internet constitute the basic WLAN environment. Firewall, antivirus wall and intrusion detection and prevention system constitute WLAN protection system. The integrated network safety management system adopts the method proposed by the invention to analyze the safety event information provided by the firewall, the antivirus wall and the intrusion detection and defense system.
[0015] The complete workflow of the cybersecurity approach is as follows:
[0016] Step 1: The firewall, antivirus wall and intrusion detection and defense system analyze the data packets transmitted by the mobile terminal computer through the wireless access point, and generate corresponding security event data;
[0017] Step 2: The integrated network security management system reads out the above security event data;
[00...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com