Supercharge Your Innovation With Domain-Expert AI Agents!

Digital network access method based on security boundary

A security boundary and digital network technology, applied in electrical components, transmission systems, etc., can solve problems such as inability to access the network normally, poor boundary protection capabilities, and weak intrusion resistance capabilities, so as to provide boundary protection capabilities and avoid intrusion damage , Guarantee the effect of normal access

Inactive Publication Date: 2019-08-13
日海通信服务有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a digital network access method based on security boundaries, which has the ability to effectively provide digital network boundary protection, avoid network intrusion and damage, provide network security, and ensure normal access to the network, etc. Advantages, it solves the problem that many network products have poor boundary protection capabilities, resulting in weak intrusion resistance capabilities, resulting in low network security, and at the same time causing the problem that the network cannot be accessed normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital network access method based on security boundary

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] A digital network access method based on a security boundary, including a security boundary system and a digital network access system, the security boundary system is connected with a connection module through a signal, and the connection module is connected with a digital network access system through a signal, the security boundary system includes a server module, a server The module is connected to the gatekeeper unit, VPN unit and firewall unit through signals, and the gatekeeper unit, VPN unit and firewall unit are all c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of digital network access. The invention further discloses a digital network access method based on the security boundary. The system comprises a securityboundary system and a digital network access system, the safety boundary system is connected with a connection module through a signal; the connection module is in signal connection with a digital network access system, the security boundary system comprises a server module, the server module is in signal connection with a gatekeeper unit, a VPN unit and a firewall unit, and the gatekeeper unit, the VPN unit and the firewall unit are in signal connection with the connection module through signals. The digital network access method based on the security boundary has the advantages of effectively providing the boundary protection capability of the digital network, preventing the network from being invaded and damaged, providing the security of the network, guaranteeing the normal access of the network and the like.

Description

technical field [0001] The invention relates to the technical field of digital network access, in particular to a security boundary-based digital network access method. Background technique [0002] Introduction to network border, information, security concept of border protection, border protection technology, data exchange network technology, external interconnection of high-density network, etc. People have established networks to solve resource sharing, but computers all over the world are really connected. Network, security has become a problem. Because on the network, you don't know where the other party is, leaks, attacks, viruses, etc. More and more insecure factors make it difficult for network managers to be at peace. Therefore, it is necessary to separate the network with security requirements from the insecure network. There is no way to choose. Separation forms "islands" of the network, and without connectivity, security concerns naturally disappear. However,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/0272H04L63/08H04L63/101
Inventor 屠君红罗洪标廖秋月朱振生郭意聪吴志伟
Owner 日海通信服务有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More