Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Intelligent supervision method, device and system for network security equipment

A network security and equipment management technology, applied in the field of network information security, can solve the problems of lack of interest, uneven personnel quality and professional level, and inability to set up test services and management, so as to improve the efficiency of test services and reduce equipment management. Difficulty and the effect of automated testing

Active Publication Date: 2020-12-29
SHANGHAI NEWDON TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the diversity of network equipment models and brands purchased by enterprises in different industries, as well as the uneven quality and professional level of evaluation technicians, the above-mentioned evaluation process has great limitations. The main defects are as follows: 1) The inspection method is too simple, and the standardization of operation is difficult to guarantee, resulting in incomplete evaluation results; 2) It takes a long time and the evaluation efficiency is low; 3) Human evaluation errors easily bring the risk of evaluation errors
However, the existing automatic testing schemes for network security equipment have the following defects: 1) The communication efficiency between the server that provides automatic testing services and the client that needs to perform equipment testing is low, and the docking process is cumbersome and time-sensitive; 2) Computer information The system security protection level is divided into five levels. Generally, the second and third level protection related items are common. The third level system requires an evaluation inspection (annual inspection) every year, and the second level system requires an evaluation inspection every two years. The service provider If you want to provide follow-up service to the customer, you need to manage and track the service of the customer of the evaluation party
However, the commonly used communication tools cannot set up testing services and management based on network security equipment, the service efficiency is low, and management is difficult
On the other hand, the existing evaluation reports are usually described based on text, which is not intuitive enough and lacks interest.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent supervision method, device and system for network security equipment
  • Intelligent supervision method, device and system for network security equipment
  • Intelligent supervision method, device and system for network security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] see figure 1 As shown, it is an intelligent supervision method for a network security device provided by an embodiment of the present invention. Described method comprises the steps:

[0052] S100. Establish a device management group corresponding to the network security device in the user's instant messaging tool, and add the network security device as a contact object to the device management group to form a group member; and, in the user's instant messaging tool A contact object corresponding to an equipment inspector is established, and the equipment inspector is an automatic test robot provided with an evaluation script database.

[0053] The instant messaging tool may also be referred to as an instant messaging tool, and generally refers to a client with an instant messaging function in the field. As an example and not a limitation, the instant messaging tool may be a network version application, a PC version application or a handheld terminal APP application. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent supervision method, device and system for network security equipment, and relates to the technical field of network information security. The method comprises the following steps: establishing an equipment management group corresponding to network security equipment, and adding the network security equipment as a contact object into the equipment management group to form group members; establishing a contact object corresponding to the equipment detector, wherein the equipment detector is an automatic test robot; triggering the automatic test robot to test the network security equipment according to the equipment test instruction; analyzing the test data of the network security equipment, and outputting equipment fault information through the ITEM items of the group members corresponding to the network security equipment under the condition that the network security equipment fails. According to the invention, the automatic test of the network security equipment and the visual display of the test result are realized, the test is more vivid and intuitive, the test service efficiency is improved, and the equipment management difficulty is reduced.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to an intelligent supervision method, device and system for network security equipment. Background technique [0002] Network security equipment usually includes IP protocol encryption machines, security routers, line encryption machines, firewalls, etc. In addition to the above equipment, network security equipment in a broad sense can also include encryption chips, encryption cards, identification cards, telephone encryption machines, and fax passwords. machine, asynchronous data encryption machine, security server, security encryption suite, financial encryption machine / card, security middleware, public key infrastructure (PKI) system, certificate of authority (CA) system, security operating system, anti-virus software, network / System scanning system, intrusion detection system, network security early warning and auditing system, etc. [0003] Traditional t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/58H04L29/06
CPCH04L41/0631H04L51/04H04L63/20
Inventor 杨腾霄马宇尘
Owner SHANGHAI NEWDON TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products