Unlock instant, AI-driven research and patent intelligence for your innovation.

Security control method, system and device based on network system and storage medium

A technology of security control and network system, applied in the field of security control method, device and storage medium, and system based on network system, can solve problems such as large cost and operation and maintenance problems, limited network access resources, and no solution proposed

Pending Publication Date: 2021-03-12
北京明朝万达科技股份有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are mainly two existing methods to realize information security protection through a zero-trust network. One method is based on the proxy system. After the device passes the authentication of the certification center, it accesses the application and interface resources on the server side through a proxy system. The technical implementation of the method is relatively simple, but the product network access bottleneck is prone to occur in the proxy system, and the proxy system can only support standard network protocols, and cannot support applications using private protocols. At the same time, this method also violates the zero trust network. The concept of centralization; another method is based on external physical devices, using external physical devices for authentication to achieve network information security protection, but because this method requires external physical devices, there will be large problems in actual deployment. cost and maintenance issues
Therefore, the above two methods all have the problem of limited network access resources
[0003] For the above-mentioned problem of limited network access resources, no effective solution has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method, system and device based on network system and storage medium
  • Security control method, system and device based on network system and storage medium
  • Security control method, system and device based on network system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] According to an embodiment of the present invention, a security control system is provided.

[0035] figure 1 is a schematic diagram of a safety control system according to an embodiment of the present invention. Such asfigure 1 As shown, the security control system 10 may include: a client device 11 , a processing device 12 and a control server 13 .

[0036] The client device 11 is used as an initiating device to send a connection request.

[0037] In this embodiment, the client device 11 may include a system upgrade management module, a system configuration management module, a network driver detection module, a user interaction module, a certificate management module, and a rights management module.

[0038] The processing device 12 is configured to receive and verify the connection request, or send the connection request as an initiating device.

[0039] In this embodiment, a plurality of processing devices 12 may be set. Among the plurality of processing devices...

Embodiment 2

[0052] According to an embodiment of the present invention, an embodiment of a security control method based on a network system is provided. It should be noted that the security control method based on a network system in this embodiment can be executed by the security control system in Embodiment 1 of the present invention. The steps shown in the flow diagrams of the figures may be implemented in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, may be executed in a manner different from that set forth herein. Perform the steps shown or described in the order shown or described.

[0053] figure 2 It is a flowchart of a security control method based on a network system according to an embodiment of the present invention. like figure 2 As shown, the method may include the following steps:

[0054] In step S202, any processing device receives a connection request, wherein the co...

Embodiment 3

[0087] The job task processing method of the computing system of the present invention will be further introduced through specific examples below.

[0088] In related technologies, the traditional security model is adopted for information security protection, which is gradually improved based on the boundary model. The traditional boundary-based network security architecture is implemented through firewalls, website application protection systems (Web Border security products / schemes such as Application Firewall (WAF for short), In Plane Switching (IPS for short), etc. provide heavy protection for the enterprise network border. Its core idea is partitioning and layering (strengthening defense in depth). The perimeter model focuses on defending the perimeter, keeping attackers out as much as possible, assuming that nothing already inside the perimeter poses no threat, so the interior of the perimeter is largely unimpeded.

[0089] However, this application uses a zero-trust net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security control method, system and device based on a network system and a storage medium. The method comprises the steps that any processing device receives a connection request, and the connection request is sent by other processing devices or client devices as initiating devices; any one processing device verifies the certificate carried in the connection request; andbased on whether the verification certificate is passed or not, any processing device confirms whether to have permission to establish connection with the initiating device or not. The technical problem that network access resources are limited is solved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a security control method, system, device and storage medium based on a network system. Background technique [0002] At present, with the development of information technology, most enterprises have built a large number of IT systems. In order to protect the information security of these IT systems, the information security protection scheme usually adopted is realized by using a zero trust network. There are mainly two existing methods to realize information security protection through a zero-trust network. One method is based on the proxy system. After the device passes the authentication of the certification center, it accesses the application and interface resources on the server side through a proxy system. The technical implementation of the method is relatively simple, but the product network access bottleneck is prone to occur in the proxy system, and the prox...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/60G06F21/64
CPCH04L63/0823H04L63/10G06F21/604G06F21/64
Inventor 王志华王志海喻波安鹏
Owner 北京明朝万达科技股份有限公司