Security auditing system and method for mobile internet

A mobile Internet and security audit technology, applied in the field of mobile Internet-oriented security audit systems, can solve problems such as difficult mobile Internet security audits, and achieve the effect of ensuring mobile interconnectivity information purification and information security

Inactive Publication Date: 2021-06-11
李爱莉
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the mobile Internet has new features such as cross-region and cross-network segments, and the mobile smart terminal based on the mobile Internet has flexible mobility and diversity of network access. Therefore, it is difficult for the existing network security audit system to effectively monitor mobile Internet Security Audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security auditing system and method for mobile internet
  • Security auditing system and method for mobile internet
  • Security auditing system and method for mobile internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] see Figure 1-5 , in an embodiment of the present invention, a mobile Internet-oriented security audit system includes:

[0039]Mobile intelligent terminal, used for users to access the mobile Internet; Internet, used for users to access; audit cloud platform, used to complete specific audit content; network visualization module, used to provide user-friendly interactive operation methods to facilitate network content Supervisors monitor; a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security auditing system and method for a mobile internet, and the system comprises a mobile intelligent terminal which is used for a user to access the mobile internet; the Internet which is used for users to access; an auditing cloud platform which is used for completing specific auditing content; and a network visualization module which is used for providing an operation mode for friendly interaction with a user, so a network content supervisor can conveniently carry out monitoring, wherein the mobile intelligent terminals are connected to the Internet through the mobile network management unit, and the mobile intelligent terminals connected to the Internet are authenticated and authorized to be connected with the auditing cloud platform. The access behavior of the mobile equipment is authenticated and the network behavior of the equipment is subjected to real-time security auditing through the intelligent probe technology; when the probe finds that the mobile device transfers the taint data to other unauthenticated network segments, measures are taken to prevent data transmission or directly destroy the taint data.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a mobile Internet-oriented security audit system and method. Background technique [0002] At present, many domestic operators have formulated their own wireless city plans and vigorously built mobile networks. For this reason, 2G, 3G, WLAN, and LTE networks have been successively built and optimized, and the coverage of wireless networks is rapidly expanding. [0003] The mobile Internet is a new type of integrated network. In this environment, users can use mobile phones, PDAs or other handheld (vehicle) terminals to access the Internet through the mobile network and enjoy public Internet services anytime, anywhere. At present, in addition to basic applications such as text browsing and picture ring downloading, applications such as music, mobile TV, video, games, instant messaging, location services, and mobile advertisements provided by the mobile Internet a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/68H04W12/80
Inventor 李爱莉
Owner 李爱莉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products