Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety isolation method based on firewall system

A security isolation and firewall technology, applied in the computer field, can solve problems such as increasing server security risks, and achieve the effect of improving privacy and security, and strong defense functions

Inactive Publication Date: 2018-09-14
GUANGDONG NENGLONG EDUCATION
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In traditional firewalls, external network users access operations on the server through real addresses. In this way, external network users will obtain many unnecessary permissions. For example, users can perform operations such as vulnerability scanning and database injection on the server, thereby increasing server security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety isolation method based on firewall system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Such as figure 1 As shown, a security isolation method based on a firewall system includes a user applying for access to a server, and the user is divided into an external network user and an internal network user;

[0018] Assign user agents, and assign user agents to external network users who apply for access to the server;

[0019] Judgment of application access behavior, conduct firewall security inspection on the user's application access behavior, and judge whether there are loopholes, viruses or malicious attacks in the access behavior, if so, isolate and reject the application access behavior, otherwise allow the application access behavior.

[0020] The invention distinguishes internal network users and external network users, and restricts external access by assigning user agents to external network users, so that the system is more secure and safe. At the same time, external network users and internal network users are isolated from each other. Network user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety isolation method based on a firewall system, which comprises the steps of: users apply to access a server, wherein the users are divided into internet users and intranet users; allocating user agents, i.e., carrying out allocation of the user agents on the internet users applying to access the server; and carrying out determination of application access behaviors,i.e., carrying out firewall safety detection on the application access behavior of each user, determining whether the access behavior has a bug, or carries viruses or is a malicious attack behavior, if yes, isolating and refusing the application access behavior, and if no, allowing the application access behavior. According to the invention, the intranet users and the internet users are distinguished, and external access is limited by carrying out allocation of the user agents on the internet users, so that the system has higher guarantee and is safer, meanwhile, privacy and safety of the intranet users are improved, and a defense function of the firewall system is better than that of a conventional firewall.

Description

technical field [0001] The invention relates to the computer field, in particular to a safety isolation method based on a firewall system. Background technique [0002] In traditional firewalls, external network users access operations on the server through real addresses. In this way, external network users will obtain many unnecessary permissions. For example, users can perform operations such as vulnerability scanning and database injection on the server, thereby increasing server security risks. Contents of the invention [0003] In order to solve the above technical problems, the object of the present invention is to provide a security isolation method based on a firewall system. [0004] The technical scheme adopted in the present invention is: [0005] A security isolation method based on a firewall system, comprising: [0006] The user applies for access to the server, and the user is divided into external network users and internal network users; [0007] Assi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/0227H04L63/0281H04L63/105H04L63/1425H04L63/1433H04L63/145
Inventor 余敬龙
Owner GUANGDONG NENGLONG EDUCATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products