A method and device for outreach monitoring

A technology for outreach and extranet servers, applied in the Internet field, can solve problems such as weak controllability, resource consumption, and inability to block illegal outreach of intranet terminals in time, so as to achieve strong controllability, prevent resource leakage, and reduce The effect of resource consumption

Active Publication Date: 2022-06-28
HANGZHOU DPTECH TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned technical solution, the "external network detection server" deployed in a complex external network environment is weak in controllability and consumes more resources; after detecting illegal outreach of an intranet terminal, it needs to wait for personnel to deal with it, and cannot block the internal network in time. Illegal outreach of network terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for outreach monitoring
  • A method and device for outreach monitoring
  • A method and device for outreach monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of this specification as recited in the appended claims.

[0039] The terms used in this specification are for the purpose of describing particular embodiments only and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a," "the," and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and / or" as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This manual provides an outreach monitoring method and device, wherein the method includes: sending an intranet access request to an intranet detection device; receiving the access request result and detection script returned by the intranet detection device, and the access request result is the After the intranet detection device forwards the intranet access request to the intranet server, the request result returned by the intranet server; displays the access request result, and according to the external network server preset in the detection script address, sending an external network access request to the external network server; if the external network access request responds successfully, sending a blocking request to the internal network detection device, so that the internal network detection device blocks the internal network The connection between the terminal and the intranet server. To promptly block the connection between the offending intranet terminal and the intranet server.

Description

technical field [0001] This specification relates to the field of Internet technologies, and in particular, to an external monitoring method and device. Background technique [0002] With the rapid development of the Internet and the continuous updating of network attack technologies, the form of network security is becoming more and more severe. In order to ensure the safe operation of secret-related networks, each unit has established an intranet isolated from the Internet to store and exchange secret-related information. At the same time, security equipment and systems such as intrusion inspection and network anti-virus have been deployed to ensure intranet information to a certain extent. Safety. But in reality, security threats from inside the network are the real problems that most network managers need to face. Once the intranet user connects the intranet computer to the Internet online, exposing the originally closed system environment to the Internet, the intranet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/02H04L63/14
Inventor 于婉雨魏方征汪庆权
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products