Network security protecting system and method

A network security and protection system technology, applied in the direction of user identity/authority verification, etc., can solve the problems of telecom operators, the impact of broadband access servers, and the impact on the network, so as to reduce the risk of virus infection and reduce the risk of virus knowledge Requirements, the effect of solving the waste of system resources

Inactive Publication Date: 2005-12-07
HUAWEI TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In addition, there are more and more network attacks on the network, which have a great impact on broadband access servers. Often, an attack by one user will cause other users in the same area to be unable to access the network normally, which will bring great harm to telecom operators. troubled
[0004] The existing method of killing viruses is still to download patches and antivirus software. However, there are thousands of machines in a broadband

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protecting system and method
  • Network security protecting system and method
  • Network security protecting system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The network security protection system and method of the present invention are implemented based on the existing network system, and the existing network system generally includes:

[0032] Broadband Access Server (BAS, Broadband Access Server): It mainly completes the user's access, and usually has access methods such as xDSL / / LAN / HFC (x digital subscriber line / local area network / optical fiber / coaxial hybrid network).

[0033] Authentication server: AAA is the abbreviation of Authentication, Authorization and Accounting (Authentication, Authorization and Accounting), which provides a consistent framework for configuring the three security functions of authentication, authorization and accounting. AAA is usually accomplished by using a remote authentication (verification) dial-in user service protocol (Radius, Remote Authentication Dial-In User Service). The authentication server is a PC or network device that implements the Radius protocol. It cooperates with the broad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network safety protection system and method, which contains attestation server for network accessing attestation and determining whether user accessing, security policy server for configuring and transmitting security policy, judging whether user is safety user or not and sending judgment result to attestation server, broadband access server for user network accessing, receiving security policy and monitoring message accessing user network, sending monitoring information to security policy server to judge user security, said invention can refuse non safety user to access network. Said invention also discloses network safety protection method.

Description

technical field [0001] The invention relates to security technology in the field of computer or communication, in particular to a network security protection system and method. Background technique [0002] With the popularization and deepening of computer networks, especially the Internet (INTERNET) in the world, the vigorous promotion and application of enterprise networks in securities departments, banking systems, enterprises and institutions has made more and more people contact and use the Internet. Trade activities can be carried out through the network, and mail transmission can also be carried out, but at the same time, the number of viruses is also rapidly doubling along with the network, and many viruses that are almost extinct also occur from time to time. It's super fast. While vigorously developing the network, viruses have also been greatly developed. Some viruses in the network are benign, do not do any damage, and only affect the normal operation of the sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 肖钧肖平
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products