A processing device security setting configuration system and user interface
A processing equipment and security technology, applied in transmission systems, digital transmission systems, electrical digital data processing and other directions, can solve the problems of time-consuming setup, error-prone, and difficult to troubleshoot operations.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] figure 1 A block diagram of a computer information system ("system") 100 is shown. The system 100 includes a computer 101 , a firewall 102 , a redundant terminal server 103 , a redundant file server 104 , a network access security system 105 , and a shared network server 106 . Network Access Security System 105 (“Security System”) is a public application that further includes Network Access Security Manager 107, Network Access Internet Protocol (IP) Security Tool 108, and Network Access Remote Secure Access (RSA) Security Tool 109 . Exposing these applications advantageously allows for centralized management of the code used to perform security management functions. The shared web server 106 also includes a production server 110 and a test server 111 .
[0047] Firewall 102 provides security between workstation 101 and redundant terminal server 103 . Redundant Terminal Server 103 stores and retrieves client information from and to Redundant File Server 104, which st...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 