Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network user group security management technology based on proprietary algorithm

A technology for network user and security management, applied in the fields of management, industrial Internet network security, and network security, it can solve problems such as loss of firewall meaning, performance degradation, and complicated configuration, so as to achieve no impact on network communication efficiency, overcome inefficiency, and network environment. clean effect

Inactive Publication Date: 2020-07-10
上海自恒信息科技有限公司
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are serious problems with the current firewall application
For example: At present, many firewalls support content filtering, anti-virus and IDS, etc., but the actual application effect is not good.
Because when these functions are supported, filtering will involve application layer packet analysis, which consumes a lot of CPU
The activation of these functions will lead to a sharp drop in performance. The original 100M processing capacity may drop to a few megabytes, resulting in serious congestion or even paralysis of the network, which loses the meaning of the existence of the firewall.
[0004] In addition, many traditional network security configurations are implemented based on the command line, which has the disadvantages of cumbersome configuration, too many commands, difficult to master, difficult to operate, and even for some complex networks, difficult to implement and difficult to maintain.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user group security management technology based on proprietary algorithm
  • Network user group security management technology based on proprietary algorithm
  • Network user group security management technology based on proprietary algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to describe the technical content of the present invention more clearly, further description will be made below in conjunction with specific implementation cases.

[0021] Such as figure 1 , figure 2 As shown, the network user group security management technology based on the proprietary algorithm of the present invention achieves the purpose of maintaining network security by realizing multiple isolations of the network. The firewall can only isolate the boundary between the internal network and the external network. Illegal communication and malicious attacks in the internal network cannot be monitored and stopped on the network. Moreover, personal firewalls or anti-virus software only check themselves, and cannot do anything about the malicious spread of viruses, worms, etc. in the intranet.

[0022] Such as image 3 As shown, the network user group safety management technology realized based on proprietary algorithm of the present invention reduces the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network user group security management technology realized based on a proprietary algorithm, which can realize multiple isolation of a network, isolate the network into a plurality of communication user groups according to specific requirements, and effectively reduce the communication action domain of network users. Illegal communication is isolated. And the method canbe applied to development of upper computer application management software according to specific requirements, so that unified configuration and unified monitoring management of a plurality of isolated user groups are realized.

Description

technical field [0001] The present invention relates to the field of network security, in particular to the field of industrial Internet network security and management, and specifically refers to a network user group security management technology based on a proprietary algorithm. Background technique [0002] With the development of computer and network technology, especially the deep integration of informatization and industrialization and the rapid development of the Internet of Things, threats such as viruses and Trojan horses are spreading to industrial control systems, and information security issues in industrial control systems have become increasingly prominent. However, the current network grouping technology has many defects, such as: complex grouping operation, high technical difficulty, and high requirements on the ability of construction personnel; the realized grouping topology is simple, which cannot meet the increasingly complex industrial Internet networkin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 陈晓伟江万春徐晓磊
Owner 上海自恒信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products