Local area network management system

A technology of management system and security management, applied in the field of LAN security management system, can solve the problems of lack, poor usability, lack of peripheral management mechanism, etc., and achieve the effect of normal operation and reliability

Inactive Publication Date: 2017-10-24
苏州宏璟创业咨询有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although all kinds of security measures as shown above have been implemented, many managers are still troubled by the frequent occurrence of leaks or other intranet security incidents, which fully demonstrates the complexity of intranet security maintenance
[0004] The existing intranet security management system mainly has the following deficiencies: 1. Incomplete security management: Although there are corresponding intranet security management systems, most of these systems do not provide the most complete management measures
As a result, in the face of some special situations, there is a lack of corresponding measures to deal with
And with the development and progress of Internet technology, the old intranet management system has been unable to meet today's needs
2. Inaccurate sensitive file matching algorithm: Most of the existing sensitive file detection systems are based on the AC multi-pattern matching algorithm. Although the algorithm is efficient, it is inevitable that many problems will arise due to the inaccurate algorithm when processing large documents.
3. Lack of peripheral management mechanism: Since one of the key points of intranet management is to prevent leaks, there must be a set of special management measures for peripheral connection devices in the intranet
However, most of the existing intranet management systems simply prohibit certain peripherals, and cannot allow connection settings for some special peripherals, resulting in extremely poor usability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Local area network management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described below in conjunction with the accompanying drawings.

[0019] Such as figure 1 As shown, a local area network security management system includes a front desk management system, a database, a service management system and a monitoring management system, and the front desk management system, the database and the monitoring management system are respectively connected to the service management system;

[0020] The foreground management system provides services for users in the form of WEB services, receives management requests sent by the management browser, and interacts with the application service system;

[0021] The database is used to store parameter information required for system operation, various index information and configuration information of network equipment, user management information, log information and other information related to system operation;

[0022] The service management system includes an uppe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A local area network management system comprises a foreground management system, a database, a service management system and a monitoring management system, wherein the foreground management system, the database and the monitoring management system are connected with the service management system. The foreground management system provides service for a user in the mode of WEB service, receives a management request sent by a management end browser, and interacts with an application service system. The database is used for storing parameter information needed by system operation. The service management system comprises an upper layer system and a lower layer system, the upper layer system can be the foreground management system or a third party management system, and the lower layer system is the application service system. The monitoring management system obtains the health state of a current overall local area network by various analyses from a bottom layer system.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a local area network security management system. Background technique [0002] When it comes to network security, people will naturally think of virus damage and hacker attacks, but this is not the case. Conventional security defense concepts are often limited to defenses at the gateway level and network boundaries (firewall, vulnerability scanning, anti-virus, IDS), etc. Important security facilities are generally concentrated in computer rooms or network entrances. Under the strict monitoring of these devices, from Security threats outside the network are greatly reduced. On the contrary, the security threat from the computer client inside the network is a problem commonly reported by many security managers. [0003] For domestic network managers, most of the existing network security protection methods emphasize the prevention, detection and processing of active att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 张晨
Owner 苏州宏璟创业咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products