Security control method, system and device based on network system and storage medium
A technology of security control and network system, applied in the field of security control method, device and storage medium, and system based on network system, can solve problems such as large cost and operation and maintenance problems, limited network access resources, and no solution proposed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] According to an embodiment of the present invention, a security control system is provided.
[0035] figure 1 is a schematic diagram of a safety control system according to an embodiment of the present invention. Such asfigure 1 As shown, the security control system 10 may include: a client device 11 , a processing device 12 and a control server 13 .
[0036] The client device 11 is used as an initiating device to send a connection request.
[0037] In this embodiment, the client device 11 may include a system upgrade management module, a system configuration management module, a network driver detection module, a user interaction module, a certificate management module, and a rights management module.
[0038] The processing device 12 is configured to receive and verify the connection request, or send the connection request as an initiating device.
[0039] In this embodiment, a plurality of processing devices 12 may be set. Among the plurality of processing devices...
Embodiment 2
[0052] According to an embodiment of the present invention, an embodiment of a security control method based on a network system is provided. It should be noted that the security control method based on a network system in this embodiment can be executed by the security control system in Embodiment 1 of the present invention. The steps shown in the flow diagrams of the figures may be implemented in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, may be executed in a manner different from that set forth herein. Perform the steps shown or described in the order shown or described.
[0053] figure 2 It is a flowchart of a security control method based on a network system according to an embodiment of the present invention. like figure 2 As shown, the method may include the following steps:
[0054] In step S202, any processing device receives a connection request, wherein the co...
Embodiment 3
[0087] The job task processing method of the computing system of the present invention will be further introduced through specific examples below.
[0088] In related technologies, the traditional security model is adopted for information security protection, which is gradually improved based on the boundary model. The traditional boundary-based network security architecture is implemented through firewalls, website application protection systems (Web Border security products / schemes such as Application Firewall (WAF for short), In Plane Switching (IPS for short), etc. provide heavy protection for the enterprise network border. Its core idea is partitioning and layering (strengthening defense in depth). The perimeter model focuses on defending the perimeter, keeping attackers out as much as possible, assuming that nothing already inside the perimeter poses no threat, so the interior of the perimeter is largely unimpeded.
[0089] However, this application uses a zero-trust net...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


