Enterprise safety protection system and method based on white list mechanism

A security protection and whitelist technology, applied in the transmission system, electrical components, etc., can solve problems such as theft and destruction that are difficult to prevent hackers from infiltrating, low filtering standards, and whitelist login delays

Active Publication Date: 2021-03-09
北京哈工信息产业股份有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the existing technology, the filtering standard set by the whitelist structure is relatively low, and IP addresses are basically used as an effective means of managing network access control. The white list architecture design of firewalls generally has complex logic design,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise safety protection system and method based on white list mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Below, reference figure 1 As shown, a corporate security protection system and method based on whitelist mechanism, where:

[0074] A enterprise security system based on whitelist mechanism, including: fingerprint information detection module, logic alignment module 101, white list screening module 102, blacklist storage module 103, and priority determination module 104;

[0075] Further, the fingerprint information detecting module includes: the active detecting module 105 and the passive detection module 106, a proactive detection and passive detection for fingerprint information; the fingerprint information refers to the IP address of the terminal and MAC information, vendor information, and hardware. Host information such as serial number information;

[0076] One end of the active detecting module 105 is electrically connected to one end of the logic ratio module 101; one end of the passive detection module 106 is electrically connected to the other end of the logic al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise safety protection system based on a white list mechanism. The enterprise safety protection system comprises a fingerprint information detection module, a logic comparison module, a white list screening module, a black list storage module and a priority judgment module, aiming at the defects that an existing terminal white list protection system is low in recognition precision and is easily attacked, an active and passive dual detection technology is adopted and is matched with an active filtering logic design of a priority judgment module, so that the attack possibility is greatly reduced, the blocking and priority processing effects of a white list are improved, and the time delay condition of terminal login is reduced to a certain extent; the dual-detection data is identified under the synchronous clock through the terminal type dictionary, thereby achieving high-precision terminal identification protection; and through scientific lag time function design, the identification range and the identification precision of the method are greatly increased, and more realizable technical means are added for safe white list architecture design.

Description

Technical field [0001] The present invention relates to the technical field of protective systems, in particular, a corporate safety protection system and method based on white listing mechanism. Background technique [0002] With the continuous development of the network, network security cannot be protected by a single mode of the password. The attacker can easily crack the WiFi password, invading terminal equipment, and use IP access to realize network remote attacks; after the blacklist is enabled, Users (or IP addresses, IP packets, emails, viruses, etc.) that are listed to the blacklist cannot pass; if a white list is set, the user (or IP address, IP package, email, etc.) will be preferred. Through, it will not be treated as spam rejection, safety and fastness are greatly improved; the meaning of the meaning of the meaning, then the application with blacklist features will have a whitelist function and corresponding; [0003] For example: In the operation system, if a user'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/0876H04L63/10H04L63/20
Inventor 冷雪飞
Owner 北京哈工信息产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products