Comprehensive safety protecting method based on integral network safety service framework

A security protection and network security technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of uncontrollable range and time of network resource usage, inability to provide stream-oriented fast and secure transmission, and indistinguishable network addresses from user addresses. Achieve the effects of preventing illegal data from entering the network, high network resource utilization and reliability, and improving network resource utilization

Active Publication Date: 2012-07-18
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to overcome the above-mentioned shortcomings of the prior art, the present invention provides a comprehensive security protection method based on an integrated network security service architecture, which organically integrates network communication and security, and builds a multi-level, all-round comprehensive security and security system. It solves the problems in the general IP network that the signaling, management, and service planes are not separated, the network address and the user address are not separated, and the scope and time of network resource use are not controlled, effectively avoiding the inefficiency of the superimposed security and confidentiality mechanism , Incomplete protection, unable to provide stream-oriented fast and secure transmission and other defects, can effectively resist counterfeiting, tampering, insertion, replay, denial of service and other network attacks, and protect business and network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0028] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0029]A comprehensive security protection method based on an integrated network security service architecture, which effectively integrates information classification and isolation, user security access, node security interconnection, application service access control and Various security and confidentiality measures such as data encryption protection.

[0030] Vertically, the system carries out security design on network-network interface (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a comprehensive safety protecting method based on an integral network safety service framework. The method comprises the following steps of: isolating information of service, control, management, and the like by adopting a classified isolation safety protection technique of network bear information; performing access certification on a terminal device by adopting a safety access protection technique of a user; certifying the validity of interconnected nodes by adopting a safety interconnection protection technique of the node; and certifying the user identity and the service authority by adopting an access control technique of the service. The invention has the advantages that the network communication and safety security are organically integrated to construct a multilevel and all-around comprehensive safety secrecy system, the problems that signaling, management and service plane are not distinguished in the general IP network, network address and user address are not distinguished, range of application and the time of the network resource are not controlled, and the like are solved, thereby effectively overcoming the detects that a superposition-type security secrecy mechanism has low efficiency and incomplete protection, and can not provide stream-oriented rapid safety transmission and the like.

Description

technical field [0001] The invention relates to a network security protection method, in particular to a comprehensive security protection method based on an integrated network security service architecture. Background technique [0002] With the rapid development of IP technology, it has been agreed in the industry to build an integrated network based on IP technology. However, the security problem of general IP network restricts the rapid development of integrated network. [0003] In traditional IP networks, various security and confidentiality devices are generally used to improve the security of the network and services. For example, security equipment such as network isolation, firewall, authentication service, intrusion detection, and vulnerability scanning, as well as security equipment such as link layer, network layer, and application layer. This kind of security protection system built by superimposition improves the security and confidentiality performance of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 王强周俊
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products