Network area boundary security protection system, method and equipment

A network area and security protection technology, applied in the field of network security, can solve problems such as poor protection capabilities, and achieve the effects of improving security, avoiding network security incidents, and reducing network security incidents

Active Publication Date: 2020-09-25
蜘易唐平(北京)科技有限公司
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, a network area boundary security protection system, method and device are provided to solve the problem of poor protection capability in the network area boundary security protection in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network area boundary security protection system, method and equipment
  • Network area boundary security protection system, method and equipment
  • Network area boundary security protection system, method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0029] First, the technical terms in this application are explained. On-network devices refer to devices that can use the network to communicate normally, including but not limited to terminal computers, printers, IP phones, video conferencing systems, servers, access control systems, punch card systems, etc. Data traffic refers to the network data of all equipment and system business communications in the network, including bidirectional data traffic.

[0030...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network area boundary security protection system, method and device. The method comprises the steps that a server management module monitors the operation condition of the system, formulates a security management strategy, and carries out the collection, storage and calculation of associated data; a switch intelligent identification module identifies equipment information of the switch; the switch monitoring management module acquires corresponding information and generates alarm information when the protocol state information of the switch is abnormal; a port fingerprint analysis module performs unique fingerprint identity identification and calibration on physical ports of all switches; an equipment fingerprint analysis module acquires related information of the network access equipment and then calibrates the related information; a data fingerprint analysis module performs fingerprint calibration on all data streams in the network, and analyzes the source,destination, type and content of the data to release and block the data; and a port access control module is used for monitoring the operation state and the data throughput condition of the access port in the regional boundary so as to close or open the port. And basic guarantee and protection are provided for boundary protection of the network area.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network area border security protection system, method and equipment. Background technique [0002] With the continuous development of the information digital age, the scale of the network is gradually expanding, the number of network assets and the types of network equipment continue to increase, the types of equipment in the network are diversified, the access methods are diversified, the data communication interface methods are rich, and the communication protocols are complicated. Based on the limitations of passive defense, border security protection means can only provide security protection at important network exits, and cannot involve all border areas of the network area, resulting in frequent occurrence of network security incidents, which are difficult to locate and deal with. Bringing difficulties, the potential risks of data information security are gradua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/10H04L63/0428H04L63/0876H04L63/083
Inventor 张婉怡李坤玉
Owner 蜘易唐平(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products