Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Management system for integrated information security service and the protection method thereof

An information security and management system technology, which is applied in the management system and protection field of integrated information security services, can solve the problems of numerous and complicated information security event records, and it is difficult to prevent the decrease of bandwidth connected to external networks, so as to reduce manpower demand and reduce The effect of maintenance costs

Inactive Publication Date: 2012-07-04
CHUNGHWA TELECOM CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many types of malicious programs that pose a threat to information security, so network users must build various types of security protection equipment
However, the construction and maintenance of security protection equipment will cause a heavy cost burden for users, and may not be able to effectively prevent network viruses and hacker (software cracker, that is, software hacker) attacks, and even if malicious packets can be successfully blocked at the user end , it is also difficult to prevent a large number of malicious packets from reducing the bandwidth of the external network
What troubles users even more is that the information security event records generated by these information security devices are numerous and complicated. If the user does not have professional knowledge in network and information security, it is difficult to integrate, analyze and organize information security event records to instantly discover the shallow The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management system for integrated information security service and the protection method thereof
  • Management system for integrated information security service and the protection method thereof
  • Management system for integrated information security service and the protection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The embodiments of the present invention are described below through specific specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification. The present invention may also be practiced or applied through other and different specific embodiments.

[0047] see Figures 1A to 1D , which is the architecture diagram of the management system integrating information security services of the present invention. like Figure 1A As shown, the system includes the Internet 10 , a client device 11 , a routing device 12 and a protection device 13 .

[0048] The client device 11 is an electronic device that can access data and perform data processing, such as a desktop computer, a notebook computer, a digital television device, a personal digital assistant and / or a mobile phone.

[0049] The routing device 12 is used for providing the connection routing path of the client d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a management system for integrated information security service and the protection method thereof, which are characterized in that first the management system for integrated information security service enables a protection device to protect data packets on a device at the user end for security, generates a log event from the protection result and sends the log event to acentralized monitoring platform; then the centralized monitoring platform normalizes and relationally analyzes the log event and detects and transmits the exceptional information to a service platform; finally the service platform displays the exceptional information integrated with the information about the network status on the interface of a webpage and sends the information about the network status and exceptional information to the device at the user end. The management system for integrated information security service and the protection method thereof can directly provide a series of information about the network status and security information at the Internet service provider end to address the problem that a network subscriber usually needs to spend high equipment and (monitoring) labor costs in purchasing, establishing and maintaining an information security protection system on his own in the prior art.

Description

technical field [0001] The invention relates to a management system and a protection method for integrating information security services, more specifically, a management system and protection method for integrating information security services by analyzing the event records (Log) of information security equipment. Background technique [0002] Due to the development of network technology, the speed of network system construction is accelerated. With the increasing popularity of the Internet, it is an inevitable trend for users to conduct various human activities through the Internet, such as using the Internet to collect data, browse knowledge, buy goods or make friends. [0003] In order to connect to the Internet, a user generally has to connect through an Internet Service Provider (ISP). Internet service providers are companies or institutions that provide users with access to the Internet and network information services. These companies invest in the establishment of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 姚仁豪杜秉恒吴怡芳游峯鹏李威徐明山许渊珽余任
Owner CHUNGHWA TELECOM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products