Network safety protection method and system

A network security and protection system technology, applied in the field of network security protection, can solve the problem of time-consuming and laborious search, isolation, and repair, and achieve the effect of defending against network attacks

Active Publication Date: 2006-12-27
NEW H3C TECH CO LTD
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is a time-consuming and labor-intensive job for administrators to find, isolate, and repair these endpoints that do not comply with security policies, often resulting in a huge gap between enterprise security policies and endpoint security implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety protection method and system
  • Network safety protection method and system
  • Network safety protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The essence of the present invention is to provide security authentication for user terminals accessing the network. If the security status of the user terminal does not meet the security policy requirements of the network being accessed, the user terminal is temporarily isolated in an isolated network area with third-party network services. , and use the third-party network service to repair the corresponding security status for the user terminal, so that it meets the security policy requirements of the connected network, thereby ensuring that the entire network is always in an overall unified security protection policy state. In addition, it can also control the user terminal to be monitored all the time during the online process. Once there is a situation that does not comply with the security policy, security measures will be taken in time to control the entire network from damage, such as the above-mentioned isolation of the user terminal that does not comply with th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed network security protective method comprises: providing security strategy server and access device, for external device required access, first isolating into separation area for security certification; if failure, upgrading and repairing by the third server for certification again; after accessing into network, still monitoring user by former security strategy for processing illegal affair. This invention provides more safe and complete self protective function.

Description

technical field [0001] The invention relates to a network security protection method and system, in particular to a method and system for protecting the security status of user terminals in the network. Background technique [0002] After years of application and development, along with people's deepening understanding of network software and hardware technologies, network security has surpassed the requirements for network reliability, switching capabilities, and service quality, and has become the most concerned issue for enterprise users, and network security infrastructure is also increasingly Become the top priority of enterprise network construction. [0003] In the enterprise network, new security threats are constantly emerging, such as increasingly raging network attacks and computer network viruses. Among them, some network attacks are launched against certain loopholes in the operating system and application software, which are very harmful and may lead to the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/28
Inventor 陈有琨
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products