Intranet penetration security management and control method, management and control system and intranet penetration system

A technology of intranet penetration and security control, applied in the field of communication security, can solve problems such as machine destruction, information leakage, and endangering user information security, and achieve the effect of improving security

Pending Publication Date: 2022-02-11
上海承蓝数据科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the server is brute force cracked and logged in, it will cause systemic security issues of the intranet to penetrate the entire intranet to penetrate the client, resulting in data loss, information leakage, machine damage and other vicious events, seriously endangering user information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intranet penetration security management and control method, management and control system and intranet penetration system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Next, the technical solutions in the embodiments of the present invention will be described in connection with the drawings of the embodiments of the present invention, and it is understood that the described embodiments are merely the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art are in the range of the present invention without making creative labor premise.

[0034] The embodiment of the present invention discloses an intranetary safety control method, characterized in that the steps of:

[0035] S1: Identify the external service port number to be connected to the internal node to determine the external port that penetrates the client to penetrate the network to be connected; if the firewall system is set, the external service port number to be connected through the firewall system is identified, determined to Waiting to connect the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intranet penetration security control method, a control system and an intranet penetration system, and the control method comprises the following steps: S1, identifying an external service port number of a to-be-connected internal node, and determining an external port bound with a to-be-connected intranet penetration client; S2, logging in an intranet penetration server; s3, opening an external port; s4, establishing communication with an intranet penetrating client through an external port; s5, after the preset time of successfully establishing the communication, closing the external port and keeping the current communication connection. The control system comprises a port number identification module, a login access module, an action module and a communication module. The intranet penetration system comprises an intranet, an external network and a security policy implementation system. The external port is opened and other ports are closed in a targeted manner by setting a firewall, and the defects that the intranet is exposed to the external network for a long time, and consequently the intranet is likely to be sniffed and cracked violently to log in are overcome.

Description

Technical field [0001] The present invention relates to the field of communication security, and more particularly to an intranetary safety control method, a control system and an intranet penetration system. Background technique [0002] Currently, in large data centers or corporate production environments, the internal network is often encountered. In order to solve the problem of remote operation and maintenance problems in these cases, the intranet penetration (NAT) technology is often used, that is, the internal network penetration client (Client) is installed in the public network, installing the intranetary server (Server). Client / Server architecture, user or engineer establishes communication with the client through the port mapping relationship, through the port mapping relationship, to perform the required operations. However, since the intake server end is exposed to a public network environment for a long time, it is easier to sniff. Secondly, he is subject to its s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/029H04L63/083
Inventor 姜意倪明麦树刘文华
Owner 上海承蓝数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products