A network protection method, device and system

A network and network access technology, applied in the transmission system, electrical components, etc., can solve problems such as not being able to meet the pace of rapid business development

Active Publication Date: 2018-07-06
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of deploying security devices such as firewalls, VPNs (Virtual Private Networks, virtual private networks), intrusion prevention systems, anti-viruses, flow control, and URL (Uniform Resource Locator, Uniform Resource Locator) filtering according to requirements has become impossible in the Internet age. Meet the pace of rapid business development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network protection method, device and system
  • A network protection method, device and system
  • A network protection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] Such as Figure 1a As shown, it is a schematic diagram of the implementation flow of the network protection method provided by Embodiment 1 of the present invention, which may include the following steps:

[0090] S11. Receive a network access request packet sent by the terminal, where the network access request packet carries basic information required for this network access.

[0091] Specifically, when a user logs in to a browser in a terminal to access any website, the access process in the prior art is to directly send the network access request to the web server, while the embodiment of the present invention sends the network access request data The packet is sent to the network protection server, and the network protection server verifies and processes the network access request data packet. After the verification is passed, the data packet is processed and sent to the web server, which provides active security protection for various services and protects the term...

Embodiment 2

[0155] Based on the same inventive concept, the embodiment of the present invention also provides a network protection device. Since the problem-solving principle of the above-mentioned device is similar to the network protection method, the implementation of the above-mentioned device can refer to the implementation of the method, and the repetition will not be repeated.

[0156] Such as Figure 6 As shown, it is a schematic structural diagram of a network protection device provided in Embodiment 2 of the present invention, including a receiving unit 61, a judging unit 62, and a data obfuscation unit 63, wherein:

[0157] The receiving unit 61 is configured to receive a network access request packet sent by the terminal, the network access request packet carrying basic information required for this network access;

[0158] A judging unit 62, configured to judge whether the basic information satisfies a preset detection condition;

[0159] A data obfuscation unit 63, configured...

Embodiment 3

[0185] Such as Figure 7 As shown, it is a schematic structural diagram of the network protection system provided by Embodiment 3 of the present invention, including at least one terminal 71, a network protection server 72 and a webpage Web server 73, wherein the network protection server is provided with the Network guard. For each terminal, the active defense process is as follows:

[0186] The terminal 71 is used to send the network access request data packet to the network protection server 72. Prior to this, in order to ensure the security of the data packet, the intelligent password key 74 is used to encrypt the network access request data packet. After the encryption is completed, , sending a network access request packet to the network protection server 72.

[0187] The network protection server 72, after receiving the network access request data packet sent by the terminal 71, judges whether the basic information carried in the network access request data packet sat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network protection method, device and system. The method comprises that a network access request data packet with basic information needed by present network access is received from a terminal; whether the basic information satisfies a detection condition is determined; and if YES, data in the network access request data packet is confused to obtain a confused data packet, and the confused data packet is sent to a Web server. The method provided by the invention can be used to protect the data packet form the terminal actively, reduce the attacked frequency of the Web server, and ensure the security of user information.

Description

technical field [0001] The invention relates to the technical field of computers and networks, in particular to a network protection method, device and system. Background technique [0002] With the rapid development of high-tech technologies such as the Internet, cloud computing, and big data, information is becoming more open, more mobile, and the amount of information is increasing, which brings a very large attack to the entire hacker attack. The scope, especially the development of automation tools, makes the means of attack intensified and poses a great threat to the security of the network. [0003] Most of the traditional information security methods are passive and solid "walled" defense methods, and every security policy adjustment must involve every security node. This method of deploying security devices such as firewalls, VPNs (Virtual Private Networks, virtual private networks), intrusion prevention systems, anti-viruses, flow control, and URL (Uniform Resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1441H04L63/1466
Inventor 姜海舟王烨张俊贤
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products