Supercharge Your Innovation With Domain-Expert AI Agents!

Computer access control system of centralized management

An access control and centralized management technology, applied in computer security devices, computing, transmission systems, etc., can solve problems such as slow operation, large space occupied by client hardware, and low efficiency, and achieve fast operation, simplified hardware, and prevention of leakage Effect

Inactive Publication Date: 2018-09-18
北京东港嘉华安全信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing computer access control system is easy to crack through software, occupies the resources of the target computer system, runs slowly and has low efficiency, and cannot prevent the user from cracking the target computer system at the hardware level. The hardware takes up a lot of space, which is not conducive to monitoring all operations of the user on the target computer, cannot block the illegal operation of the computer by the user in real time, and leave a complete operation log of the user on the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer access control system of centralized management
  • Computer access control system of centralized management
  • Computer access control system of centralized management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0019] see Figure 1~4 , in an embodiment of the present invention, a centralized management computer access control system includes a centralized computer room (for placing target computers, either virtualized or real), and a device for converting computer peripheral ports into network data streams Gateways, network switches, content inspection and authentication systems for auditing network packets, and gateways that convert network traffic into computer per...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer access control system of centralized management. The system includes: a centralized computer machine room; a local-end gateway, which converts computer peripheral ports to network data stream; a network switch; a content reviewing and authentication system, which is used for auditing network data packets; and a user gateway, which converts network data stream tothe computer peripheral ports. The local-end gateway can carry out network accesses, port conversion, video encoding and system management. The user gateway can carry out network accesses, port conversion, video decoding and system management. The content reviewing and authentication system can carry out network monitoring, authentication and log storage. According to the system, the problem thatexisting access control and reviewing systems cannot perfectly and effectively manage and control users is solved, and promotion and application are facilitated.

Description

technical field [0001] The invention relates to the fields of electronic technology, communication technology and computer, in particular to a centralized management computer access control system. Background technique [0002] With the rapid development of today's computer technology, all walks of life use tens of thousands of computers for calculation and processing, and enjoy the informationization convenience provided by application software and data processing. However, information security issues follow, such as illegal use, virus Security risks such as malicious attacks and malicious attacks have always threatened the information security of governments, enterprises and institutions, especially related organizations with confidentiality needs. User data urgently needs security protection, and users urgently require comprehensive access control security policies. [0003] The research of access control system is how to construct a system that reasonably assigns rights ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L12/24H04L29/06
CPCG06F21/604H04L41/069H04L63/10
Inventor 刘宏钱刚万瑞罡张峰玮
Owner 北京东港嘉华安全信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More