Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system and method for preventing illegal outreach of local area network computers

A computer and local area network technology, applied in transmission systems, electrical components, etc., can solve problems such as cross-security domain damage, network structure, server deployment, and leakage of security protection measures, and achieve the effect of protecting information security confidentiality and computer security

Active Publication Date: 2020-10-16
SHANGQIU POWER SUPPLY CO OF STATE GRID HANAN ELECTRIC POWER CO
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Illegal outreach creates a hidden channel between the original closed system environment and the external network, and the internal network will face various security threats such as viruses, Trojan horses, unauthorized access, data eavesdropping, and brute-force cracking, resulting in information such as network structure, server deployment, and security protection measures. Leaked, even cross-security domain, cross-network damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for preventing illegal outreach of local area network computers
  • A system and method for preventing illegal outreach of local area network computers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments, but the protection scope of the present invention is not limited thereto.

[0038] At present, the commonly used security protection methods to control USB storage devices or mobile devices are often based on modifying the registry or USB drivers or hiding drive letters. This method is often powerless for controlling mobile phones, tablet computers, etc. to connect to the Internet , because although these devices use the USB interface for transmission, the communication protocols are completely different, and with the assistance of third-party software, it is difficult to effectively deal with such storage devices through the registry, modifying the USB drive or hiding the drive letter. It is extremely easy to be bypassed by someone with a little technical knowledge by reversely modifying the registry, repairing the USB drive, or redispl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of computer security, in particular to a method for preventing illegal outreach of a local area network computer. The method is as follows: a control unit sends an identity verification request to a server; the server configures a monitoring strategy and a protection strategy according to the identity verification request, and Send it to the control unit of the application program layer; the control unit of the application program layer sends the monitoring strategy and the protection strategy to the monitoring unit and the protection unit respectively; the monitoring center unit calls the monitoring strategy of the monitoring unit to load it into the target list. The target list is arranged in order according to the probability of triggering the protection unit; the file drive unit traverses according to the target list and intercepts the messages matching the target unit and the target list; the intercepted messages are processed by the protection unit as deadline. The invention utilizes the monitoring and protection strategy, utilizes the protection unit to intercept the system process and executes the corresponding protection strategy, so as to prevent the illegal outreach of the local area network computer.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a system and method for preventing illegal outreach of local area network computers. Background technique [0002] At present, some internal networks with high security, such as those of government departments and military departments, often adopt the method of implementing physical isolation from external networks, such as the Internet, to ensure the security of their networks. Physical isolation ensures that there is no possible physical link between the external network and the internal network, cutting off the channel for information leakage. But the fact is just the opposite. Due to the imperfect management system or the lack of effective terminal monitoring technology, individual users in the internal network use telephone dial-up, plug-and-play Internet access equipment, and connect to the Internet for private operations, and the physical isolation environment is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/205
Inventor 石军吴建辉刘伟匡琮
Owner SHANGQIU POWER SUPPLY CO OF STATE GRID HANAN ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products