Cascading management system and method for secure network

A security network and management method technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as poor applicability, cumbersome deployment, and complicated management, improve security and compliance, and avoid network risks. , the effect of convenient and safe state

Inactive Publication Date: 2017-10-20
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For large-scale multiple local area networks, or cross-regional wide area networks, including network structures based on multi-level management models such as national, provincial, city, and county, due to the complexity of large-scale cascaded network management, traditional centralized management methods cannot implement unified management of the entire network. Monitoring and management, it is very likely to bring cyber risks to superiors
Moreover, some cascading architecture management methods have disadvantages such as cumbersome deployment, complex management, and poor applicability. System administrators cannot fully and timely understand the security status of lower-level networks, and the efficiency of network-wide monitoring and management is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cascading management system and method for secure network
  • Cascading management system and method for secure network
  • Cascading management system and method for secure network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] The cascading management system of the security network described in this embodiment is based on the cascading management framework, as shown in the attached figure 1 As shown, the cascaded management structure includes a superior data center and several subordinate data centers. The superior management center and terminals are set in the superior data center, and the subordinate management centers and terminals are set in the subordinate data centers. The cascaded management system can be managed centrally, showing The upper-level management center and the lower-level management center can manage the terminals in their data centers respectively; cascade management is also possible, which means that the upper-level management center can manage the lower-level data centers;

[0025] The upper-level management center can formulate mandatory policies or recommended policies to the lower-level management center according to the needs, and cascade and issue security policies;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cascading management system and method for a secure network and relates to the field of computer communication and operating system security. Through cascading setting, assert management, strategy management and global monitoring, uniform monitoring and management are carried out on whole network data centers. A superior management center of a superior data center manages subordinate management centers of subordinate data centers; moreover, the superior management center and the subordinate management centers manage terminals at the data centers; the superior management center formulates compulsive strategies or recommendation strategies to the subordinate management centers and issues the strategies in a cascading mode. The subordinate management centers reports statistics and alarm information to the superior management center in the cascading mode. A system manager grasps basic information and security states of the subordinate data centers in real time through the global monitoring of the superior management center. According to the system and the method, the network risk resulting from carrying out connection on all computers and the superior is avoided, the security and compliance of the computers are improved, and the system manager can know the security condition of the whole network computers very conveniently.

Description

technical field [0001] The invention relates to the field of computer communication and operating system safety, in particular to a safety network cascading management system and method. Background technique [0002] For large-scale multiple local area networks, or cross-regional wide area networks, including network structures based on multi-level management models such as national, provincial, city, and county, due to the complexity of large-scale cascaded network management, traditional centralized management methods cannot implement unified management of the entire network. Monitoring and management are likely to bring cyber risks to superiors. Moreover, some current cascading architecture management methods have disadvantages such as cumbersome deployment, complex management, and poor applicability. System administrators cannot fully and timely understand the security status of lower-level networks, and the efficiency of network-wide monitoring and management is low. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/0631H04L41/069H04L41/28
Inventor 梁媛
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products