CN102006186B - System for monitoring illegal external connection of intranet equipment and method thereof - Google Patents

System for monitoring illegal external connection of intranet equipment and method thereof Download PDF

Info

Publication number
CN102006186B
CN102006186B CN201010548279A CN201010548279A CN102006186B CN 102006186 B CN102006186 B CN 102006186B CN 201010548279 A CN201010548279 A CN 201010548279A CN 201010548279 A CN201010548279 A CN 201010548279A CN 102006186 B CN102006186 B CN 102006186B
Authority
CN
China
Prior art keywords
service end
client
warning information
module
intranet equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201010548279A
Other languages
Chinese (zh)
Other versions
CN102006186A (en
Inventor
姚国祥
官全龙
张焕明
梁德恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN201010548279A priority Critical patent/CN102006186B/en
Publication of CN102006186A publication Critical patent/CN102006186A/en
Application granted granted Critical
Publication of CN102006186B publication Critical patent/CN102006186B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a system for monitoring illegal external connection of intranet equipment and a method thereof. The system comprises an intranet equipment client and a monitoring center server. The method comprises the steps of: when the intranet equipment tries to connect the internet through illegal ways, obtaining equipment information and user information by the client through an information collection module; carrying out information bundling to generate alarm information; transferring the alarm information to an encryption module; encapsulating the encrypted alarm information by an encapsulation module; sending the encapsulated alarm information to the monitoring center server connected with the internet; judging whether the equipment permits external connection or not by the server according to an established policy and the received alarm information; and carrying out corresponding operation. In the invention, the internal equipment directly sends the alarm information to the server, then the internal monitored host is monitored by the server no matter how the internal monitored host is connected to the external network; meanwhile, the condition that the internal monitored mobile storage equipment is connected to the external network unknowingly is prevented.

Description

A kind of Intranet equipment illegal external connection supervisory control system and method thereof
Technical field
The present invention relates to computer and mobile device information security field, particularly a kind of Intranet equipment illegal external connection supervisory control system and method thereof.
Background technology
Along with the deep propelling of social informatization, and the continuous development of network, computer and mobile device are universal day by day in each field of society.It has been a kind of universal phenomenon that computer uses at internal institution, and because mobile device has advantages such as easy to carry, that use is flexible, makes it in information-based process, obtain developing rapidly.Therefore, mobile device obtains using at internal institution also becomes a trend.
Internal institution work regular meeting often relates to secret information, and the leakage of these confidential information may be given the consequence of unit or bringing on a disaster property of enterprise.At present, for the confidential information in the unit of preventing or the enterprises computer is revealed, more existing prevention inner computers and inner mobile device insert the method for the Internet.Like the Chinese patent publication number is that the invention of CN200920222401.6 has just proposed the method to the main frame external connection monitoring; When computer occurs connecting the Internet in violation of rules and regulations; The illegal external connection supervising device is the forbidding network interface card automatically, and transmits the warning message that pre-sets to Surveillance center.
But; Above method and existing certain methods all are only to inner computer or inner move media, lack the effective ways that inner computer and inner move media unified monitoring are outreached, Intranet equipment illegal external connection; With the possibility that increases information leakage greatly; Maybe be like internal host through the network insertion the Internet beyond the unit, inner mobile disk possibly inserted has inserted the external host of the Internet, thereby lets confidential information be exposed under the Internet; Like this, confidential information has just been revealed under the situation of knowing nothing probably.
Therefore; For the unit's of letting Intranet equipment obtains safe handling; People are badly in need of a kind of more reliable, more effective method that Intranet equipment illegal external connection is monitored; Guarantee accuracy and real-time, and guarantee Intranet equipment illegal external connection is made emergency operation accurately, thereby guaranteed the fail safe and the confidentiality of internal information in the Intranet equipment the monitoring of Intranet equipment illegal external connection.
Summary of the invention
First goal of the invention of the present invention is to provide a kind of Intranet equipment illegal external connection supervisory control system, to solve the technical problem that prior art can not effective monitoring Intranet equipment illegal external connection.
In order to realize first goal of the invention of the present invention, the technical scheme of employing is following:
A kind of Intranet equipment illegal external connection supervisory control system, said system comprises:
Be arranged on the client of Intranet equipment, comprise:
The client data acquisition module is used to gather the client-side information of Intranet equipment, generates warning information;
The long-range link block of client is used for when the Intranet device start, setting up long-range the connection with service end, and the warning information that generates the client data acquisition module sends to service end;
The client module of meeting an urgent need receives the emergent instruction of service end, according to the emergent instruction of service end, carries out emergency operation;
Be arranged on service end:
The service end monitoring module is used for connecting with the long-range link block of client, and receives the warning information that Intranet equipment sends;
Service end policy development module; Be used for when receiving warning information,, judge whether client allows to outreach according to the predefined strategy that outreaches; If judge not allow to outreach, then send emergent instruction to the emergent module of client according to the emergent strategy of formulating in advance.
As a kind of preferred version:
If Intranet equipment is host computer, then client-side information is the Intranet facility information;
If Intranet equipment is movable storage device; Then client-side information is the facility information of movable storage device information and host's main frame of being connected with movable storage device, and said client data acquisition module comprises Intranet equipment information collection module and host's main frame acquisition module.
As a kind of preferred version, said system also comprises:
Be arranged on client:
The client encrypt module is used for the warning information that the data acquisition module generates is carried out encryption;
The client package module is used for the warning information after encrypting is encapsulated;
The long-range link block of client sends to service end to the warning information after encapsulating;
Be arranged on service end:
The service end decapsulation module is used for the warning information after the encapsulation that receives is carried out decapsulation;
The service end decoder module is used for the warning information after the decapsulation is decoded, and obtains decoded warning information.
As further preferred version, said client encrypt module is used symmetric encryption method.
Preferably, said symmetric encryption method specifically adopts the AES-256bit encryption method, and promptly adopting block length is 128bit, and key length is the AES encryption method of 256bit.
As further preferred version; Said client package module comprises that the tcp that connects successively seals the dress module and http seals the dress module; Tcp seals the dress module and is used for being encapsulated as the tcp bag to the warning information after encrypting, and http seals the dress module and is used for being encapsulated as the http bag to the warning information after encrypting;
Said service end decapsulation module comprises tcp bag decapsulation module and the http bag decapsulation module that connects successively; Tcp bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the tcp bag; Http bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the http bag.
As a kind of preferred version:
If Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy.
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
Preferably, the connecting interface of movable storage device and host's main frame is a USB interface, and the input equipment of said host computer comprises mouse and keyboard.
Second goal of the invention of the present invention is to provide a kind of Intranet equipment illegal external connection method for supervising, to use the supervisory control system that first goal of the invention of the present invention is provided.
In order to realize second goal of the invention of the present invention, the technical scheme of employing is following:
A kind of Intranet equipment illegal external connection method for supervising, said method comprises:
Intranet operation of equipment step:
(1) establishment is set up the long-range thread that is connected with service end, starts client;
(2) after the client operation, the client-side information of gathering Intranet equipment generates warning information;
(3) use symmetric encryption method that warning information is carried out encryption to warning information;
(4) warning information after encrypting is carried out encapsulation process, at first, be packaged into the tcp bag to the warning information after encrypting, and send to service end,, then be packaged into the http bag to the warning information after encrypting, resend service end if the tcp bag sends failure;
(5) the emergent instruction of wait service end;
(6) Intranet equipment receives the emergent instruction of service end, then calls and withdraws from after the emergent module of client is carried out emergency operation;
The operating procedure of service end:
(7) service end is waited for the warning information that receives Intranet equipment;
(8) after service end receives warning information, judge the encapsulated type of warning information,, then call tcp bag decapsulation module and carry out the decapsulation of tcp bag,, then call http bag decapsulation module and carry out the decapsulation of http bag if for http seals dress if for tcp seals dress;
(9) warning information after the decapsulation is deciphered the warning information after obtaining deciphering;
(10) strategy that outreaches that sets in advance according to service end judges whether the warning information after the deciphering is illegal; If legal outreaching, then execution in step (7) continues to wait for the warning information that receives client, otherwise; Send emergent instruction, execution in step (7) then to client.
In the said method; The strategy that outreaches that step (10) sets in advance is specially: the condition that the keeper can allow Intranet equipment to outreach in Surveillance center's service end setting; As specific director, particular department and specific IP or the like be set; Qualified Intranet equipment outreaches allowing, and through like this, avoids the Intranet equipment that allows to outreach is carried out emergency operation.
Preferably, said symmetric encryption method specifically adopts the AES-256bit encryption method, and promptly adopting block length is 128bit, and key length is the AES encryption method of 256bit.
As a kind of preferred version, said step (1) comprising:
If Intranet equipment is host computer, then, creates host computer the remote thread that is connected with service end when starting, start client;
If Intranet equipment is movable storage device, then, creates movable storage device the remote thread that is connected with service end after inserting host's main frame, start client.
As further preferred version:
If Intranet equipment is host computer, then in the initialize process of host computer, loads and set up the long-range thread that is connected, and start client with service end;
If Intranet equipment is movable storage device; Then movable storage device is carried out division operation, be divided into two above subregions, comprise first subregion and one or more common subregion; The divisional type of said first subregion is an optical disc storage; The divisional type of one or more common subregions is a generic storage, in first subregion, loads to create to set up the long-range thread that is connected and starts client with service end, and optical disc storage is arranged to automatic operation.
As a kind of preferred version,
If Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy.
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
Preferably, the connecting interface of movable storage device and host's main frame is a USB interface, and the input equipment of said host computer comprises mouse and keyboard.
The present invention has the following advantages with respect to prior art:
(1) among the present invention Intranet equipment is carried out external connection monitoring, and write down the details that Intranet equipment outreaches, so that for later audit work data are provided, this helps to follow the trail of the source that intranet data is revealed;
(2) among the present invention to the illegal external connection of Intranet equipment, Surveillance center can send emergent instruction to Intranet equipment, requires Intranet equipment to carry out emergency operation, avoids the leakage of internal information;
(3) the present invention is directly sent a warning message to service end by internal unit; Then no matter inside receives monitoring host computer to pass through what mode is inserted outer net; The capital receives the service end monitoring, has also avoided inner simultaneously and has received monitoring mobile storage device under unwitting situation, to insert the situation of outer net.
Description of drawings
Fig. 1 is the structural representation of the realization system of a kind of Intranet equipment of the present invention illegal external connection monitoring;
The workflow diagram that Fig. 2 outreaches for Surveillance center of the present invention monitoring Intranet equipment.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is done further explain, but execution mode of the present invention is not limited thereto.
Embodiment
As shown in Figure 1, a kind of realization system of Intranet equipment illegal external connection monitoring comprises:
The client data acquisition module; Be used to gather Intranet facility information and out of Memory, if Intranet equipment is a main frame, the information of then only gathering Intranet equipment; If Intranet equipment is u dish or other mobile device, the information of then gathering Intranet equipment and host's machine.And these information are carried out integration processing;
The client encrypt module is used for the warning information that the data acquisition module generates is carried out encryption;
The client package module is used for the warning information after encrypting is encapsulated, and can information be packaged into tcp bag or http bag.Module at first considers to be packaged into the tcp bag, if use the tcp bag can not early warning information be sent to Surveillance center's service end, then considers to be packaged into the http bag;
The client module of meeting an urgent need according to the emergent instruction of service end, is carried out emergency operation;
Service end policy development module is used to be provided with the Intranet equipment that meets specified requirements and allows to outreach, and formulates the strategy that sends the emergency operation instruction when receiving warning information;
Number clients operates in Intranet equipment, mainly comprises internal host and inner mobile disk.If operate in internal host, then when internal host started, client just started; If operate in inner mobile disk, then to work as inner mobile disk and insert any main frame, client just starts.
Said service end operates in the Surveillance center that inserts the Internet, as long as Intranet equipment inserts the Internet, client just sends a warning message to service end, and service end will be made emergent decision-making immediately, and carry out log record.
A kind of implementation method of Intranet equipment illegal external connection monitoring can be carried out external connection monitoring to internal host and inner mobile device, and as shown in Figure 2, the present invention operates as follows:
If 1 monitored device is an internal host, then directly carry out to create the program of remote thread, this program is injected into client dll that system has moved and reliably in the process, starts client thus;
If 2 monitored devices are inner mobile disks, the program (be in the step 1 carry out program) that then will create remote thread writes USB flash disk, lets inner mobile disk insert behind the main frame operation automatically and creates the program of remote thread, thereby start client;
3, after the client operation, gather the information of Intranet equipment and host's main frame, and the structure of these information by appointment encapsulated, the generation warning information uses symmetric encryption method that warning information is encrypted then;
4, at first, be packaged into the tcp bag to the warning information after encrypting, and send to Surveillance center's service end to warning information.If send out failure, then be packaged into the http bag to the warning information after encrypting, send to Surveillance center's service end to warning information again;
5, service end is waited for the warning information that outreaches that receives client always.After receiving warning information, judge according to the strategy that outreaches that Surveillance center's service end sets in advance whether this outreaches alarm illegal.If legal outreaching, then do not carry out other operation, continue to wait for that other that receive client outreaches warning information, otherwise, send emergent instruction to client immediately, wait for that then other that receive client outreaches warning information;
If 6 clients receive the emergent instruction that sends in the step 5, client is called emergent module immediately:
For belonging to inner movable storage device; In case it inserts the main frame that has inserted the Internet, service end is sent instruction just as client, and client is carried out associative operation immediately; The USB interface that makes mobile device insert main frame lost efficacy, even mobile device breaks off and being connected of main frame.
For intranet host, in a single day service end finds that it inserts the Internet, and service end is sent instruction just as client, and client is carried out associative operation immediately, and the mouse of this main frame and keyboard were lost efficacy, and promptly forbids the mutual of user and main frame;
Do not receive emergent instruction else if, then do not carry out other operation.
In the said method; Step 1 and step 2 are said to be injected into that system has moved and reliably in the process with client dll; Its method is specially: select reliable process, in this process, create remote thread then, then let this thread running client dll; Revise system registry at last, all load client dll at every turn when letting this reliable process start;
In the said method; Step 2 is said with moving the program of creating remote thread automatically behind the inner mobile disk insertion main frame, and its method is specially: need carry out special processing to inner mobile disk, with being divided into two districts in the inner mobile disk; One is divided into optical disc storage; And another is divided into generic storage, writes the program (being the program of carrying out in the step 1) of creating remote thread then in the optical disc storage the inside, at last optical disc storage is arranged to automatic operation;
In the said method; The said Surveillance center of step 5 service end sets in advance and outreaches strategy and be specially: the condition that the keeper can allow Intranet equipment to outreach in Surveillance center's service end setting; As specific director, particular department and specific IP or the like be set; Qualified Intranet equipment outreaches allowing, and through like this, avoids the Intranet equipment that allows to outreach is carried out emergency operation;
Said symmetric encryption method specifically adopts the AES-256bit encryption method, and promptly adopting block length is 128bit, and key length is the AES encryption method of 256bit.
The foregoing description is a typical embodiment of the present invention; But execution mode of the present invention is not limited by the examples; Other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; All should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (10)

1. Intranet equipment illegal external connection supervisory control system is characterized in that said system comprises:
Be arranged on the client of Intranet equipment, comprise:
The client data acquisition module is used to gather the Intranet facility information, generates warning information;
The long-range link block of client is used for when the Intranet device start, setting up long-range the connection with service end, and as long as Intranet equipment inserts the Internet, the warning information that just generates the client data acquisition module sends to service end;
The client module of meeting an urgent need receives the emergent instruction of service end, according to the emergent instruction of service end, carries out emergency operation;
Be arranged on service end:
The service end monitoring module is used for connecting with the long-range link block of client, and receives the warning information that outreaches of Intranet equipment transmission;
Service end policy development module; Be used for when receiving warning information,, judge whether Intranet equipment allows to outreach according to the predefined strategy that outreaches; If judge not allow to outreach, then send emergent instruction to the emergent module of client according to the emergent strategy of formulating in advance.
2. supervisory control system according to claim 1 is characterized in that:
If Intranet equipment is host computer, the information of then gathering Intranet equipment;
If Intranet equipment is movable storage device, the information of then gathering Intranet equipment and host's machine.
3. supervisory control system according to claim 1 is characterized in that, said system also comprises:
Be arranged on client:
The client encrypt module is used for the warning information that the data acquisition module generates is carried out encryption;
The client package module is used for the warning information after encrypting is encapsulated;
The long-range link block of client sends to service end to the warning information after encapsulating;
Be arranged on service end:
The service end decapsulation module is used for the warning information after the encapsulation that receives is carried out decapsulation;
The service end deciphering module is used for the warning information after the decapsulation is deciphered, the warning information after obtaining deciphering.
4. supervisory control system according to claim 3 is characterized in that, said client encrypt module is used symmetric encryption method.
5. supervisory control system according to claim 3; It is characterized in that; Said client package module comprises that the tcp that connects successively seals the dress module and http seals the dress module; Tcp seals the dress module and is used for being encapsulated as the tcp bag to the warning information after encrypting, and http seals the dress module and is used for being encapsulated as the http bag to the warning information after encrypting;
Said service end decapsulation module comprises tcp bag decapsulation module and the http bag decapsulation module that connects successively; Tcp bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the tcp bag; Http bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the http bag.
6. supervisory control system according to claim 2 is characterized in that: if Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy;
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
7. Intranet equipment illegal external connection method for supervising is characterized in that said method comprises:
Intranet operation of equipment step:
(1) establishment is set up the long-range thread that is connected with service end, starts client;
(2) after the client operation, gather the Intranet facility information, generate warning information;
(3) use symmetric encryption method to carry out encryption to warning information;
(4) warning information after encrypting is carried out encapsulation process, at first, be packaged into the tcp bag to the warning information after encrypting, and send to service end,, then be packaged into the http bag to the warning information after encrypting, resend service end if the tcp bag sends failure;
(5) the emergent instruction of wait service end;
(6) Intranet equipment receives the emergent instruction of service end, then calls and withdraws from the emergency operation module after the emergent module of client is carried out emergency operation;
The operating procedure of service end:
(7) service end is waited for the warning information that outreaches that receives Intranet equipment;
(8) after service end receives warning information, judge the encapsulated type of warning information,, then call tcp bag decapsulation module and carry out the decapsulation of tcp bag,, then call http bag decapsulation module and carry out the decapsulation of http bag if for http seals dress if for tcp seals dress;
(9) warning information after the decapsulation is deciphered the warning information after obtaining deciphering;
(10) according to service end set in advance outreach strategy judge after the deciphering whether outreach warning information illegal; If legal outreaching, then execution in step (7) continues to wait for the warning information that outreaches that receives client, otherwise; Send emergent instruction, execution in step (7) then to client.
8. method for supervising according to claim 7 is characterized in that, said step (1) comprising:
If Intranet equipment is host computer, then, creates host computer the remote thread that is connected with service end when starting, start client;
If Intranet equipment is movable storage device, then, creates movable storage device the remote thread that is connected with service end after inserting host's main frame, start client.
9. method for supervising according to claim 8 is characterized in that:
If Intranet equipment is host computer, then in the initialize process of host computer, loads and set up the long-range thread that is connected, and start client with service end;
If Intranet equipment is movable storage device; Then movable storage device is carried out division operation, be divided into two above subregions, comprise first subregion and one or more common subregion; The divisional type of said first subregion is an optical disc storage; The divisional type of one or more common subregions is a generic storage, in first subregion, writes the program of creating remote thread, and optical disc storage is arranged to automatic operation.
10. method for supervising according to claim 7 is characterized in that,
If Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy;
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
CN201010548279A 2010-11-16 2010-11-16 System for monitoring illegal external connection of intranet equipment and method thereof Expired - Fee Related CN102006186B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010548279A CN102006186B (en) 2010-11-16 2010-11-16 System for monitoring illegal external connection of intranet equipment and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010548279A CN102006186B (en) 2010-11-16 2010-11-16 System for monitoring illegal external connection of intranet equipment and method thereof

Publications (2)

Publication Number Publication Date
CN102006186A CN102006186A (en) 2011-04-06
CN102006186B true CN102006186B (en) 2012-10-17

Family

ID=43813278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010548279A Expired - Fee Related CN102006186B (en) 2010-11-16 2010-11-16 System for monitoring illegal external connection of intranet equipment and method thereof

Country Status (1)

Country Link
CN (1) CN102006186B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624541A (en) * 2011-12-19 2012-08-01 上海华御信息技术有限公司 Whole network managing and monitoring system based on virtual private network (VPN) technology
CN102779068A (en) * 2012-07-10 2012-11-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and application program networking control method
CN102868750B (en) * 2012-09-20 2016-05-18 无锡华御信息技术有限公司 The monitoring management system of messaging device
CN102916943A (en) * 2012-09-20 2013-02-06 无锡华御信息技术有限公司 Management method and management system of portable storage device based on network environment
CN103023926A (en) * 2012-12-28 2013-04-03 中科正阳信息安全技术有限公司 Reverse proxy based information leakage preventing security gateway system
CN105404503A (en) * 2015-10-22 2016-03-16 成都卫士通信息产业股份有限公司 Method for supporting multiple terminals to remotely access to intelligent card in parallel
CN105610874B (en) * 2016-03-23 2018-06-22 国网河南省电力公司商丘供电公司 A kind of local network safety management system
CN109587175A (en) * 2019-01-11 2019-04-05 杭州迪普科技股份有限公司 A kind of illegal external connection processing method and system
CN110191102B (en) * 2019-05-09 2021-12-21 黄志英 Illegal external connection comprehensive monitoring system and method thereof
CN112069489A (en) * 2020-08-13 2020-12-11 中国电子科技集团公司第三十研究所 Detection method for cross use of internal network and external network of mobile storage medium
CN117319088B (en) * 2023-11-28 2024-02-23 北京天防安全科技有限公司 Method, device, equipment and medium for blocking illegal external connection equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188557A (en) * 2007-12-07 2008-05-28 杭州华三通信技术有限公司 Method, client, server and system for managing user network access behavior
CN101504710A (en) * 2009-03-26 2009-08-12 北京鼎普科技股份有限公司 Method and equipment for security of intranet computer
CN202050425U (en) * 2010-11-16 2011-11-23 暨南大学 Illegal external connection monitoring system for internal network equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2883687A1 (en) * 2005-03-22 2006-09-29 France Telecom SYSTEM AND METHOD FOR COMMUNICATING MESSAGES FOR A SET OF SERVER TERMINALS

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188557A (en) * 2007-12-07 2008-05-28 杭州华三通信技术有限公司 Method, client, server and system for managing user network access behavior
CN101504710A (en) * 2009-03-26 2009-08-12 北京鼎普科技股份有限公司 Method and equipment for security of intranet computer
CN202050425U (en) * 2010-11-16 2011-11-23 暨南大学 Illegal external connection monitoring system for internal network equipment

Also Published As

Publication number Publication date
CN102006186A (en) 2011-04-06

Similar Documents

Publication Publication Date Title
CN102006186B (en) System for monitoring illegal external connection of intranet equipment and method thereof
CN110557251B (en) Industrial data safety isolation acquisition system and internal and external network data one-way transmission method
US8955042B2 (en) Systems and methods for implementing transparent encryption
US9065846B2 (en) Analyzing data gathered through different protocols
US10389817B2 (en) System-on-chip data security appliance and methods of operating the same
KR20180120157A (en) Data set extraction based pattern matching
US20140096230A1 (en) Method and system for sharing vpn connections between applications
WO2016040942A1 (en) Method and system for forensic data tracking
CN103391216A (en) Alarm and blocking method for illegal external connections
CN101098224B (en) Method for encrypting/deciphering dynamically data file
US20210176141A1 (en) Secure count in cloud computing networks
CN103632107A (en) Mobile terminal information safety protection system and method
CN202050425U (en) Illegal external connection monitoring system for internal network equipment
CN111046405B (en) Data processing method, device, equipment and storage medium
CN115499844A (en) Mobile terminal information safety protection system and method
CN103824014A (en) Isolation certificating and monitoring method of USB (universal serial bus) port within local area network
KR101592323B1 (en) System and method for remote server recovery
CN103036879A (en) Method for auditing QQ chat contents
CN104978302A (en) TCM chip based intelligent security USB interface control method
US11283768B1 (en) Systems and methods for managing connections
US11496508B2 (en) Centralized security package and security threat management system
US10938913B2 (en) Hardware turnstile
CN106203173B (en) A kind of SWF file cracks means of defence and system
US20150067343A1 (en) Tamper resistance of aggregated data
CN105592021A (en) Novel internal network security protection method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121017

Termination date: 20211116

CF01 Termination of patent right due to non-payment of annual fee