Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security management method, computing device and readable storage medium

A technology for security management and computing equipment, applied in the field of network security, which can solve problems such as the lack of office network data, the inability to achieve enterprise data leakage prevention, and the destruction or deletion of DLP clients.

Active Publication Date: 2020-11-10
海南车智易通信息技术有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the data security of the enterprise office network has been promoted to a very important position. The existing office network access is basically based on domain authentication (AD) and certificate authentication (CA) for user identity verification. OA) account password, after identity authentication, after the company's internal CA system issues a certificate, the user can access the company's internal network and perform data access. This kind of simple user identity authentication cannot achieve enterprise data leakage prevention. Target
Therefore, Data Leakage Protection (DLP) has gradually become one of the most important security technologies in the market. However, after an enterprise implements the DLP technology solution, because the terminal computer is in the hands of the employee, the employee may not start DLP or Do not use the company computer, or even modify the computer arbitrarily, destroy or delete the DLP client by deleting the process or reinstalling the operating system, etc., resulting in the DLP client not running normally, which is completely out of the company's control, causing the company to access The restrictions on network terminal equipment are useless, and office network data is still not effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security management method, computing device and readable storage medium
  • Network security management method, computing device and readable storage medium
  • Network security management method, computing device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] figure 1 Shows a schematic diagram of a network security management system 100 according to an embodiment of the present invention, including a security management server 110, a data storage device 120, an authentication management server 130, and an address management server 140, which are connected by communication with each other to jointly manage pre-access targets The user terminal 150 access problem of the network, to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security management method which is suitable for being executed in a computing device, the computing device is connected with a data storage device and a security management server and manages a mobile terminal accessed to a target network, and the security management server acquires network access information of a user terminal accessed to the target network at intervals of first preset time. The network security management method comprises the following steps: authenticating the network access information of a user terminal in the data storage equipment; ifthe authentication of the network access information fails, sending an authentication failure message to the user terminal, and deleting a physical address corresponding to the user terminal from an allowed list of an address management server; and if the authentication succeeds, maintaining the state of the physical address corresponding to the user terminal in the permission list so as to maintain the communication connection between the user terminal and the target network. The invention also discloses corresponding computing equipment and a readable storage medium.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security management method, computing equipment and a readable storage medium. Background technique [0002] At present, the data security of the enterprise office network has been promoted to a very important position. The existing office network access is basically based on domain authentication (AD) and certificate authentication (CA) for user identity verification. OA) account password, after identity authentication, after the company's internal CA system issues a certificate, the user can access the company's internal network and perform data access. This kind of simple user identity authentication cannot achieve enterprise data leakage prevention. Target. Therefore, Data Leakage Protection (DLP) has gradually become one of the most important security technologies in the market. However, after an enterprise implements the DLP technology solution, because the termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/08H04L63/101H04L63/20H04L61/5014
Inventor 肖受华杜树人
Owner 海南车智易通信息技术有限公司