Method for managing intranet security based on cooperative mode

A security management and intranet technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as large network traffic usage, impact on normal business systems, and restrictions on security management efficiency, so as to improve performance and efficiency. Avoid single point of failure and reduce network traffic

Active Publication Date: 2012-01-11
FUJIAN ETIM INFORMATION & TECH
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) The distribution of patches and software is downloaded from one or a few servers. The server load is heavy, repeated downloads are serious, occupying a large amount of network traffic, and seriously affecting the normal business system;
[0005] 2) The performance of the server is the bottleneck, which limits the efficiency of security management;
[0006] 3) Poor system scalability;
[0007] 4) The server has a single point of failure problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for managing intranet security based on cooperative mode
  • Method for managing intranet security based on cooperative mode
  • Method for managing intranet security based on cooperative mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] figure 1 It is a schematic diagram of the deployment of the intranet security management system, such as figure 1 As shown, the collaboration-based intranet security management system involved in the present invention includes: multiple terminal devices 100 , a management server 200 and a console 300 .

[0028] An agent program is installed on each terminal device 100 of multiple terminal devices, which can accept the security policy from the management server 200, and implement functions such as document security management, mobile media management, user behavior supervision, and data encryption and decryption according to the security policy. The security information is reported to the management server 200 . Specifically, the terminal device 100 has functions such as information collection, security policy execution, data encryption and decryption, document security management, mobile media supervision, and user behavior supervision by executing an agent program.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for managing intranet security based on a cooperative mode. The method comprises the following steps that: terminal equipment periodically checks the consistence of a security policy with a management server; when the security policy of the terminal equipment is inconsistent with the management server, the terminal equipment requests for a specified security policy from the management server; when the request for the specified security policy from the terminal equipment is received, the management server inquiries configuration information of terminal equipment which owns the specified security policy, and returns a currently-available minimum-load security policy for quoting according to the load state information of the terminal equipment which owns the specified security policy; the terminal equipment accesses the terminal equipment which owns the specified security policy, and requests and acquires the specified security policy; and after acquiring the specified security policy, the terminal equipment updates security policy information, the current load state information and the configuration information to the management server.

Description

technical field [0001] The invention relates to an intranet security management method based on a collaborative mode. Background technique [0002] With the development of computer technology and the advent of the paperless office era, people are facing more and more serious threats and challenges while enjoying the convenience brought by informatization. According to the statistics of the international security community, more than 70% of the attacks and damages suffered by global computer networks every year are caused by insiders. The damage caused by internal data theft and destruction is much higher than that of external hackers. Judging from the network security situation in recent years, traditional border network security products (such as firewalls, etc.) are powerless against internal attacks, unable to solve the active information leakage of internal personnel, passive leakage of classified information, and illegal host access to the internal network. Security m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 许元进曾勇
Owner FUJIAN ETIM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products