Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Terminal web protection system and method

A protection system and terminal technology, applied in the field of network security, can solve the problems of privacy security, cumbersome process, and limited attack type filtering, etc., and achieve the effect of local protection security and convenient operation

Inactive Publication Date: 2019-04-09
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of big data, the amount of data processed by the server every day is very huge, and various privacy and security issues exist, making the server very vulnerable to attack
Once the server is targeted by hackers or criminals, the consequences of these attacks will be immeasurable
[0003] For server attacks, the current use is to add protection systems and various anti-virus software; however, this type of technology has many defects, and in the actual application process, it cannot effectively solve the problem
[0004] Based on this, people have designed a solution to install protection software on the cloud or locally. This type of security protection solution does not filter many types of attacks, and lacks real-time statistical data on user servers being attacked. If users want to protect their own servers, they may Need to contact the manufacturer, the process is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal web protection system and method
  • Terminal web protection system and method
  • Terminal web protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0029] see figure 1 , which shows an example diagram of the system composition of the Nginx reverse proxy-based terminal web protection system given in this example.

[0030] The terminal web protection system based on Nginx reverse proxy mainly includes a terminal web protection software program, which is stored in a corresponding computer-readable medium, and can run in a corresponding computer device, and is processed by the computer device. When the server call is executed, it can quickly and efficiently add security protection to the server based on the Nginx reverse proxy.

[0031] The reverse proxy server can be used as a substitute for the content server, and can also be used as a load balancer for the content server cluster. The proxy ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal web protection system and method. The scheme is mainly realized based on an initialization module, a message analysis module, an attack detection module, a filteringprotection module and an attack log collection module. According to the scheme provided by the invention, a user can rapidly and efficiently add safety protection for the corresponding server, localprotection is safer, the version and time of protection software are freely selected, and operation is convenient.

Description

technical field [0001] The invention relates to network security technology, in particular to terminal web protection technology. Background technique [0002] With the development of big data, the amount of data processed by the server every day is very huge, and various privacy and security issues exist in it, making the server very vulnerable to attacks. Once the server is targeted by hackers or criminals, the consequences of these attacks will be immeasurable. [0003] For server attacks, the current use is to add protection systems and various anti-virus software; however, this type of technology has many defects, and it cannot effectively solve the problem in the actual application process. [0004] Based on this, people have designed a solution to install protection software on the cloud or locally. This type of security protection solution does not filter many types of attacks, and lacks real-time statistical data on user servers being attacked. If users want to pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F21/56
CPCG06F21/56H04L63/1416H04L63/1441H04L63/1466H04L67/02H04L69/22
Inventor 张镇吴松洋鲍亮陈俊宇俞少华
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products