Internet-based company security network implementation system

A secure network and system implementation technology, applied in the field of secure network implementation, can solve problems such as unguaranteed information security, failure to discover system loopholes and insecure factors in time, and poor encryption and transmission of system information, so as to achieve protection security, The effect of convenient encrypted transmission and viewing

Inactive Publication Date: 2021-04-30
南京英诺森软件科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The implementation of the company's secure network is related to the survival of the company. The company's system information encryption transmission is poor, the information security in the system cannot be guaranteed, encrypted transmission and viewing across regions cannot be performed, and system loopholes and insecurity cannot be discovered in time. factors, so that effective protection cannot be carried out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-based company security network implementation system
  • Internet-based company security network implementation system
  • Internet-based company security network implementation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , 2 , 3, 4, an implementation system of an Internet-based company security network, including application client 1, application client 2, application client N, MPLS / VPN module, virtual private network module and unified application system, unified application system Including system security module, network security module, application client 1, application client 2, and application client N connected to MPLS / VPN module and virtual private network module through the network and connected in series in the system security module and network in the unified application system on the security module;

[0030] The MPLS / VPN module is used to realize the safe interconnection of multi-service systems. The company's unified planning of the MPLS / VPN network transformation is implemented, and the original WAN access method is transformed by using MPLS technology. The business system is divided into VPNs for security isolation and provides safe and effective informati...

Embodiment 2

[0036] see figure 1 , an Internet-based implementation system for a company's security network, including a unified application system, the unified application system includes a firewall adjustment module, an intrusion detection module, a vulnerability scanning module, a database security module, and an e-mail security module, and the unified application system is connected through the network. System security module, network security module, firewall adjustment module, intrusion detection module, vulnerability scanning module, database security module and email security module;

[0037] The firewall adjustment module is a security protection measure for the network. It analyzes and monitors traffic, and adjusts the firewall deployment to block illegal data transmission. At the same time, it can independently place servers that provide external services and are relatively easy to attack in a specific protected area;

[0038] The intrusion detection module is a technology desig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet-based company security network implementation system, which comprises an application client 1, an application client 2, an application client N, a virtual private network module and a unified application system, the unified application system comprises a system security module, a network security module, a firewall adjustment module, an intrusion detection module, a vulnerability scanning module, a database security module and an e-mail security module. The application client 1, the application client 2 and the application client N are connected to the MPLS/VPN module and the virtual private network module through a network and are connected to a system security module, a network security module, a firewall adjustment module, an intrusion detection module, a vulnerability scanning module, a database security module and an e-mail security module in the unified application system in series; the method has the advantages that the system information encryption transmission is high, the information security in the system is high, the cross-region encryption transmission and viewing are convenient, and the system loopholes and dangerous factors are discovered in time, so that the effective protection is carried out.

Description

technical field [0001] The invention relates to the technical field of safety network realization, in particular to a realization system of an Internet-based company safety network. Background technique [0002] The implementation of the company's secure network is related to the survival of the company. The company's system information encryption transmission is poor, the information security in the system cannot be guaranteed, encrypted transmission and viewing across regions cannot be performed, and system loopholes and insecurity cannot be discovered in time. factors, so that effective protection cannot be carried out. Contents of the invention [0003] The purpose of the present invention is to provide an Internet-based company security network implementation system, which has high encrypted transmission of system information, high security of information in the system, convenient cross-region encrypted transmission and viewing, and timely discovery of system loophole...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1408H04L63/1433H04L63/0272H04L63/20H04L63/083H04L63/101H04L63/0428
Inventor 李王斌
Owner 南京英诺森软件科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products