CN102006186B - System for monitoring illegal external connection of intranet equipment and method thereof - Google Patents
System for monitoring illegal external connection of intranet equipment and method thereof Download PDFInfo
- Publication number
- CN102006186B CN102006186B CN201010548279A CN201010548279A CN102006186B CN 102006186 B CN102006186 B CN 102006186B CN 201010548279 A CN201010548279 A CN 201010548279A CN 201010548279 A CN201010548279 A CN 201010548279A CN 102006186 B CN102006186 B CN 102006186B
- Authority
- CN
- China
- Prior art keywords
- service end
- client
- warning information
- module
- intranet equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a system for monitoring illegal external connection of intranet equipment and a method thereof. The system comprises an intranet equipment client and a monitoring center server. The method comprises the steps of: when the intranet equipment tries to connect the internet through illegal ways, obtaining equipment information and user information by the client through an information collection module; carrying out information bundling to generate alarm information; transferring the alarm information to an encryption module; encapsulating the encrypted alarm information by an encapsulation module; sending the encapsulated alarm information to the monitoring center server connected with the internet; judging whether the equipment permits external connection or not by the server according to an established policy and the received alarm information; and carrying out corresponding operation. In the invention, the internal equipment directly sends the alarm information to the server, then the internal monitored host is monitored by the server no matter how the internal monitored host is connected to the external network; meanwhile, the condition that the internal monitored mobile storage equipment is connected to the external network unknowingly is prevented.
Description
Technical field
The present invention relates to computer and mobile device information security field, particularly a kind of Intranet equipment illegal external connection supervisory control system and method thereof.
Background technology
Along with the deep propelling of social informatization, and the continuous development of network, computer and mobile device are universal day by day in each field of society.It has been a kind of universal phenomenon that computer uses at internal institution, and because mobile device has advantages such as easy to carry, that use is flexible, makes it in information-based process, obtain developing rapidly.Therefore, mobile device obtains using at internal institution also becomes a trend.
Internal institution work regular meeting often relates to secret information, and the leakage of these confidential information may be given the consequence of unit or bringing on a disaster property of enterprise.At present, for the confidential information in the unit of preventing or the enterprises computer is revealed, more existing prevention inner computers and inner mobile device insert the method for the Internet.Like the Chinese patent publication number is that the invention of CN200920222401.6 has just proposed the method to the main frame external connection monitoring; When computer occurs connecting the Internet in violation of rules and regulations; The illegal external connection supervising device is the forbidding network interface card automatically, and transmits the warning message that pre-sets to Surveillance center.
But; Above method and existing certain methods all are only to inner computer or inner move media, lack the effective ways that inner computer and inner move media unified monitoring are outreached, Intranet equipment illegal external connection; With the possibility that increases information leakage greatly; Maybe be like internal host through the network insertion the Internet beyond the unit, inner mobile disk possibly inserted has inserted the external host of the Internet, thereby lets confidential information be exposed under the Internet; Like this, confidential information has just been revealed under the situation of knowing nothing probably.
Therefore; For the unit's of letting Intranet equipment obtains safe handling; People are badly in need of a kind of more reliable, more effective method that Intranet equipment illegal external connection is monitored; Guarantee accuracy and real-time, and guarantee Intranet equipment illegal external connection is made emergency operation accurately, thereby guaranteed the fail safe and the confidentiality of internal information in the Intranet equipment the monitoring of Intranet equipment illegal external connection.
Summary of the invention
First goal of the invention of the present invention is to provide a kind of Intranet equipment illegal external connection supervisory control system, to solve the technical problem that prior art can not effective monitoring Intranet equipment illegal external connection.
In order to realize first goal of the invention of the present invention, the technical scheme of employing is following:
A kind of Intranet equipment illegal external connection supervisory control system, said system comprises:
Be arranged on the client of Intranet equipment, comprise:
The client data acquisition module is used to gather the client-side information of Intranet equipment, generates warning information;
The long-range link block of client is used for when the Intranet device start, setting up long-range the connection with service end, and the warning information that generates the client data acquisition module sends to service end;
The client module of meeting an urgent need receives the emergent instruction of service end, according to the emergent instruction of service end, carries out emergency operation;
Be arranged on service end:
The service end monitoring module is used for connecting with the long-range link block of client, and receives the warning information that Intranet equipment sends;
Service end policy development module; Be used for when receiving warning information,, judge whether client allows to outreach according to the predefined strategy that outreaches; If judge not allow to outreach, then send emergent instruction to the emergent module of client according to the emergent strategy of formulating in advance.
As a kind of preferred version:
If Intranet equipment is host computer, then client-side information is the Intranet facility information;
If Intranet equipment is movable storage device; Then client-side information is the facility information of movable storage device information and host's main frame of being connected with movable storage device, and said client data acquisition module comprises Intranet equipment information collection module and host's main frame acquisition module.
As a kind of preferred version, said system also comprises:
Be arranged on client:
The client encrypt module is used for the warning information that the data acquisition module generates is carried out encryption;
The client package module is used for the warning information after encrypting is encapsulated;
The long-range link block of client sends to service end to the warning information after encapsulating;
Be arranged on service end:
The service end decapsulation module is used for the warning information after the encapsulation that receives is carried out decapsulation;
The service end decoder module is used for the warning information after the decapsulation is decoded, and obtains decoded warning information.
As further preferred version, said client encrypt module is used symmetric encryption method.
Preferably, said symmetric encryption method specifically adopts the AES-256bit encryption method, and promptly adopting block length is 128bit, and key length is the AES encryption method of 256bit.
As further preferred version; Said client package module comprises that the tcp that connects successively seals the dress module and http seals the dress module; Tcp seals the dress module and is used for being encapsulated as the tcp bag to the warning information after encrypting, and http seals the dress module and is used for being encapsulated as the http bag to the warning information after encrypting;
Said service end decapsulation module comprises tcp bag decapsulation module and the http bag decapsulation module that connects successively; Tcp bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the tcp bag; Http bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the http bag.
As a kind of preferred version:
If Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy.
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
Preferably, the connecting interface of movable storage device and host's main frame is a USB interface, and the input equipment of said host computer comprises mouse and keyboard.
Second goal of the invention of the present invention is to provide a kind of Intranet equipment illegal external connection method for supervising, to use the supervisory control system that first goal of the invention of the present invention is provided.
In order to realize second goal of the invention of the present invention, the technical scheme of employing is following:
A kind of Intranet equipment illegal external connection method for supervising, said method comprises:
Intranet operation of equipment step:
(1) establishment is set up the long-range thread that is connected with service end, starts client;
(2) after the client operation, the client-side information of gathering Intranet equipment generates warning information;
(3) use symmetric encryption method that warning information is carried out encryption to warning information;
(4) warning information after encrypting is carried out encapsulation process, at first, be packaged into the tcp bag to the warning information after encrypting, and send to service end,, then be packaged into the http bag to the warning information after encrypting, resend service end if the tcp bag sends failure;
(5) the emergent instruction of wait service end;
(6) Intranet equipment receives the emergent instruction of service end, then calls and withdraws from after the emergent module of client is carried out emergency operation;
The operating procedure of service end:
(7) service end is waited for the warning information that receives Intranet equipment;
(8) after service end receives warning information, judge the encapsulated type of warning information,, then call tcp bag decapsulation module and carry out the decapsulation of tcp bag,, then call http bag decapsulation module and carry out the decapsulation of http bag if for http seals dress if for tcp seals dress;
(9) warning information after the decapsulation is deciphered the warning information after obtaining deciphering;
(10) strategy that outreaches that sets in advance according to service end judges whether the warning information after the deciphering is illegal; If legal outreaching, then execution in step (7) continues to wait for the warning information that receives client, otherwise; Send emergent instruction, execution in step (7) then to client.
In the said method; The strategy that outreaches that step (10) sets in advance is specially: the condition that the keeper can allow Intranet equipment to outreach in Surveillance center's service end setting; As specific director, particular department and specific IP or the like be set; Qualified Intranet equipment outreaches allowing, and through like this, avoids the Intranet equipment that allows to outreach is carried out emergency operation.
Preferably, said symmetric encryption method specifically adopts the AES-256bit encryption method, and promptly adopting block length is 128bit, and key length is the AES encryption method of 256bit.
As a kind of preferred version, said step (1) comprising:
If Intranet equipment is host computer, then, creates host computer the remote thread that is connected with service end when starting, start client;
If Intranet equipment is movable storage device, then, creates movable storage device the remote thread that is connected with service end after inserting host's main frame, start client.
As further preferred version:
If Intranet equipment is host computer, then in the initialize process of host computer, loads and set up the long-range thread that is connected, and start client with service end;
If Intranet equipment is movable storage device; Then movable storage device is carried out division operation, be divided into two above subregions, comprise first subregion and one or more common subregion; The divisional type of said first subregion is an optical disc storage; The divisional type of one or more common subregions is a generic storage, in first subregion, loads to create to set up the long-range thread that is connected and starts client with service end, and optical disc storage is arranged to automatic operation.
As a kind of preferred version,
If Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy.
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
Preferably, the connecting interface of movable storage device and host's main frame is a USB interface, and the input equipment of said host computer comprises mouse and keyboard.
The present invention has the following advantages with respect to prior art:
(1) among the present invention Intranet equipment is carried out external connection monitoring, and write down the details that Intranet equipment outreaches, so that for later audit work data are provided, this helps to follow the trail of the source that intranet data is revealed;
(2) among the present invention to the illegal external connection of Intranet equipment, Surveillance center can send emergent instruction to Intranet equipment, requires Intranet equipment to carry out emergency operation, avoids the leakage of internal information;
(3) the present invention is directly sent a warning message to service end by internal unit; Then no matter inside receives monitoring host computer to pass through what mode is inserted outer net; The capital receives the service end monitoring, has also avoided inner simultaneously and has received monitoring mobile storage device under unwitting situation, to insert the situation of outer net.
Description of drawings
Fig. 1 is the structural representation of the realization system of a kind of Intranet equipment of the present invention illegal external connection monitoring;
The workflow diagram that Fig. 2 outreaches for Surveillance center of the present invention monitoring Intranet equipment.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is done further explain, but execution mode of the present invention is not limited thereto.
Embodiment
As shown in Figure 1, a kind of realization system of Intranet equipment illegal external connection monitoring comprises:
The client data acquisition module; Be used to gather Intranet facility information and out of Memory, if Intranet equipment is a main frame, the information of then only gathering Intranet equipment; If Intranet equipment is u dish or other mobile device, the information of then gathering Intranet equipment and host's machine.And these information are carried out integration processing;
The client encrypt module is used for the warning information that the data acquisition module generates is carried out encryption;
The client package module is used for the warning information after encrypting is encapsulated, and can information be packaged into tcp bag or http bag.Module at first considers to be packaged into the tcp bag, if use the tcp bag can not early warning information be sent to Surveillance center's service end, then considers to be packaged into the http bag;
The client module of meeting an urgent need according to the emergent instruction of service end, is carried out emergency operation;
Service end policy development module is used to be provided with the Intranet equipment that meets specified requirements and allows to outreach, and formulates the strategy that sends the emergency operation instruction when receiving warning information;
Number clients operates in Intranet equipment, mainly comprises internal host and inner mobile disk.If operate in internal host, then when internal host started, client just started; If operate in inner mobile disk, then to work as inner mobile disk and insert any main frame, client just starts.
Said service end operates in the Surveillance center that inserts the Internet, as long as Intranet equipment inserts the Internet, client just sends a warning message to service end, and service end will be made emergent decision-making immediately, and carry out log record.
A kind of implementation method of Intranet equipment illegal external connection monitoring can be carried out external connection monitoring to internal host and inner mobile device, and as shown in Figure 2, the present invention operates as follows:
If 1 monitored device is an internal host, then directly carry out to create the program of remote thread, this program is injected into client dll that system has moved and reliably in the process, starts client thus;
If 2 monitored devices are inner mobile disks, the program (be in the step 1 carry out program) that then will create remote thread writes USB flash disk, lets inner mobile disk insert behind the main frame operation automatically and creates the program of remote thread, thereby start client;
3, after the client operation, gather the information of Intranet equipment and host's main frame, and the structure of these information by appointment encapsulated, the generation warning information uses symmetric encryption method that warning information is encrypted then;
4, at first, be packaged into the tcp bag to the warning information after encrypting, and send to Surveillance center's service end to warning information.If send out failure, then be packaged into the http bag to the warning information after encrypting, send to Surveillance center's service end to warning information again;
5, service end is waited for the warning information that outreaches that receives client always.After receiving warning information, judge according to the strategy that outreaches that Surveillance center's service end sets in advance whether this outreaches alarm illegal.If legal outreaching, then do not carry out other operation, continue to wait for that other that receive client outreaches warning information, otherwise, send emergent instruction to client immediately, wait for that then other that receive client outreaches warning information;
If 6 clients receive the emergent instruction that sends in the step 5, client is called emergent module immediately:
For belonging to inner movable storage device; In case it inserts the main frame that has inserted the Internet, service end is sent instruction just as client, and client is carried out associative operation immediately; The USB interface that makes mobile device insert main frame lost efficacy, even mobile device breaks off and being connected of main frame.
For intranet host, in a single day service end finds that it inserts the Internet, and service end is sent instruction just as client, and client is carried out associative operation immediately, and the mouse of this main frame and keyboard were lost efficacy, and promptly forbids the mutual of user and main frame;
Do not receive emergent instruction else if, then do not carry out other operation.
In the said method; Step 1 and step 2 are said to be injected into that system has moved and reliably in the process with client dll; Its method is specially: select reliable process, in this process, create remote thread then, then let this thread running client dll; Revise system registry at last, all load client dll at every turn when letting this reliable process start;
In the said method; Step 2 is said with moving the program of creating remote thread automatically behind the inner mobile disk insertion main frame, and its method is specially: need carry out special processing to inner mobile disk, with being divided into two districts in the inner mobile disk; One is divided into optical disc storage; And another is divided into generic storage, writes the program (being the program of carrying out in the step 1) of creating remote thread then in the optical disc storage the inside, at last optical disc storage is arranged to automatic operation;
In the said method; The said Surveillance center of step 5 service end sets in advance and outreaches strategy and be specially: the condition that the keeper can allow Intranet equipment to outreach in Surveillance center's service end setting; As specific director, particular department and specific IP or the like be set; Qualified Intranet equipment outreaches allowing, and through like this, avoids the Intranet equipment that allows to outreach is carried out emergency operation;
Said symmetric encryption method specifically adopts the AES-256bit encryption method, and promptly adopting block length is 128bit, and key length is the AES encryption method of 256bit.
The foregoing description is a typical embodiment of the present invention; But execution mode of the present invention is not limited by the examples; Other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; All should be the substitute mode of equivalence, be included within protection scope of the present invention.
Claims (10)
1. Intranet equipment illegal external connection supervisory control system is characterized in that said system comprises:
Be arranged on the client of Intranet equipment, comprise:
The client data acquisition module is used to gather the Intranet facility information, generates warning information;
The long-range link block of client is used for when the Intranet device start, setting up long-range the connection with service end, and as long as Intranet equipment inserts the Internet, the warning information that just generates the client data acquisition module sends to service end;
The client module of meeting an urgent need receives the emergent instruction of service end, according to the emergent instruction of service end, carries out emergency operation;
Be arranged on service end:
The service end monitoring module is used for connecting with the long-range link block of client, and receives the warning information that outreaches of Intranet equipment transmission;
Service end policy development module; Be used for when receiving warning information,, judge whether Intranet equipment allows to outreach according to the predefined strategy that outreaches; If judge not allow to outreach, then send emergent instruction to the emergent module of client according to the emergent strategy of formulating in advance.
2. supervisory control system according to claim 1 is characterized in that:
If Intranet equipment is host computer, the information of then gathering Intranet equipment;
If Intranet equipment is movable storage device, the information of then gathering Intranet equipment and host's machine.
3. supervisory control system according to claim 1 is characterized in that, said system also comprises:
Be arranged on client:
The client encrypt module is used for the warning information that the data acquisition module generates is carried out encryption;
The client package module is used for the warning information after encrypting is encapsulated;
The long-range link block of client sends to service end to the warning information after encapsulating;
Be arranged on service end:
The service end decapsulation module is used for the warning information after the encapsulation that receives is carried out decapsulation;
The service end deciphering module is used for the warning information after the decapsulation is deciphered, the warning information after obtaining deciphering.
4. supervisory control system according to claim 3 is characterized in that, said client encrypt module is used symmetric encryption method.
5. supervisory control system according to claim 3; It is characterized in that; Said client package module comprises that the tcp that connects successively seals the dress module and http seals the dress module; Tcp seals the dress module and is used for being encapsulated as the tcp bag to the warning information after encrypting, and http seals the dress module and is used for being encapsulated as the http bag to the warning information after encrypting;
Said service end decapsulation module comprises tcp bag decapsulation module and the http bag decapsulation module that connects successively; Tcp bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the tcp bag; Http bag decapsulation module is used for carrying out decapsulation to the warning information after the encryption that is encapsulated as the http bag.
6. supervisory control system according to claim 2 is characterized in that: if Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy;
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
7. Intranet equipment illegal external connection method for supervising is characterized in that said method comprises:
Intranet operation of equipment step:
(1) establishment is set up the long-range thread that is connected with service end, starts client;
(2) after the client operation, gather the Intranet facility information, generate warning information;
(3) use symmetric encryption method to carry out encryption to warning information;
(4) warning information after encrypting is carried out encapsulation process, at first, be packaged into the tcp bag to the warning information after encrypting, and send to service end,, then be packaged into the http bag to the warning information after encrypting, resend service end if the tcp bag sends failure;
(5) the emergent instruction of wait service end;
(6) Intranet equipment receives the emergent instruction of service end, then calls and withdraws from the emergency operation module after the emergent module of client is carried out emergency operation;
The operating procedure of service end:
(7) service end is waited for the warning information that outreaches that receives Intranet equipment;
(8) after service end receives warning information, judge the encapsulated type of warning information,, then call tcp bag decapsulation module and carry out the decapsulation of tcp bag,, then call http bag decapsulation module and carry out the decapsulation of http bag if for http seals dress if for tcp seals dress;
(9) warning information after the decapsulation is deciphered the warning information after obtaining deciphering;
(10) according to service end set in advance outreach strategy judge after the deciphering whether outreach warning information illegal; If legal outreaching, then execution in step (7) continues to wait for the warning information that outreaches that receives client, otherwise; Send emergent instruction, execution in step (7) then to client.
8. method for supervising according to claim 7 is characterized in that, said step (1) comprising:
If Intranet equipment is host computer, then, creates host computer the remote thread that is connected with service end when starting, start client;
If Intranet equipment is movable storage device, then, creates movable storage device the remote thread that is connected with service end after inserting host's main frame, start client.
9. method for supervising according to claim 8 is characterized in that:
If Intranet equipment is host computer, then in the initialize process of host computer, loads and set up the long-range thread that is connected, and start client with service end;
If Intranet equipment is movable storage device; Then movable storage device is carried out division operation, be divided into two above subregions, comprise first subregion and one or more common subregion; The divisional type of said first subregion is an optical disc storage; The divisional type of one or more common subregions is a generic storage, in first subregion, writes the program of creating remote thread, and optical disc storage is arranged to automatic operation.
10. method for supervising according to claim 7 is characterized in that,
If Intranet equipment is movable storage device, then said emergency operation is: if receive the emergent instruction of service end, the connecting interface of movable storage device and host's main frame was lost efficacy;
If Intranet equipment is host computer, then said emergency operation is: if receive the emergent instruction of service end, the input equipment of host computer was lost efficacy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010548279A CN102006186B (en) | 2010-11-16 | 2010-11-16 | System for monitoring illegal external connection of intranet equipment and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010548279A CN102006186B (en) | 2010-11-16 | 2010-11-16 | System for monitoring illegal external connection of intranet equipment and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102006186A CN102006186A (en) | 2011-04-06 |
CN102006186B true CN102006186B (en) | 2012-10-17 |
Family
ID=43813278
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010548279A Expired - Fee Related CN102006186B (en) | 2010-11-16 | 2010-11-16 | System for monitoring illegal external connection of intranet equipment and method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102006186B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624541A (en) * | 2011-12-19 | 2012-08-01 | 上海华御信息技术有限公司 | Whole network managing and monitoring system based on virtual private network (VPN) technology |
CN102779068A (en) * | 2012-07-10 | 2012-11-14 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and application program networking control method |
CN102868750B (en) * | 2012-09-20 | 2016-05-18 | 无锡华御信息技术有限公司 | The monitoring management system of messaging device |
CN102916943A (en) * | 2012-09-20 | 2013-02-06 | 无锡华御信息技术有限公司 | Management method and management system of portable storage device based on network environment |
CN103023926A (en) * | 2012-12-28 | 2013-04-03 | 中科正阳信息安全技术有限公司 | Reverse proxy based information leakage preventing security gateway system |
CN105404503A (en) * | 2015-10-22 | 2016-03-16 | 成都卫士通信息产业股份有限公司 | Method for supporting multiple terminals to remotely access to intelligent card in parallel |
CN105610874B (en) * | 2016-03-23 | 2018-06-22 | 国网河南省电力公司商丘供电公司 | A kind of local network safety management system |
CN109587175A (en) * | 2019-01-11 | 2019-04-05 | 杭州迪普科技股份有限公司 | A kind of illegal external connection processing method and system |
CN110191102B (en) * | 2019-05-09 | 2021-12-21 | 黄志英 | Illegal external connection comprehensive monitoring system and method thereof |
CN112069489A (en) * | 2020-08-13 | 2020-12-11 | 中国电子科技集团公司第三十研究所 | Detection method for cross use of internal network and external network of mobile storage medium |
CN117319088B (en) * | 2023-11-28 | 2024-02-23 | 北京天防安全科技有限公司 | Method, device, equipment and medium for blocking illegal external connection equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101188557A (en) * | 2007-12-07 | 2008-05-28 | 杭州华三通信技术有限公司 | Method, client, server and system for managing user network access behavior |
CN101504710A (en) * | 2009-03-26 | 2009-08-12 | 北京鼎普科技股份有限公司 | Method and equipment for security of intranet computer |
CN202050425U (en) * | 2010-11-16 | 2011-11-23 | 暨南大学 | Illegal external connection monitoring system for internal network equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2883687A1 (en) * | 2005-03-22 | 2006-09-29 | France Telecom | SYSTEM AND METHOD FOR COMMUNICATING MESSAGES FOR A SET OF SERVER TERMINALS |
-
2010
- 2010-11-16 CN CN201010548279A patent/CN102006186B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101188557A (en) * | 2007-12-07 | 2008-05-28 | 杭州华三通信技术有限公司 | Method, client, server and system for managing user network access behavior |
CN101504710A (en) * | 2009-03-26 | 2009-08-12 | 北京鼎普科技股份有限公司 | Method and equipment for security of intranet computer |
CN202050425U (en) * | 2010-11-16 | 2011-11-23 | 暨南大学 | Illegal external connection monitoring system for internal network equipment |
Also Published As
Publication number | Publication date |
---|---|
CN102006186A (en) | 2011-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102006186B (en) | System for monitoring illegal external connection of intranet equipment and method thereof | |
CN110557251B (en) | Industrial data safety isolation acquisition system and internal and external network data one-way transmission method | |
US8955042B2 (en) | Systems and methods for implementing transparent encryption | |
US9065846B2 (en) | Analyzing data gathered through different protocols | |
US10389817B2 (en) | System-on-chip data security appliance and methods of operating the same | |
KR20180120157A (en) | Data set extraction based pattern matching | |
US20140096230A1 (en) | Method and system for sharing vpn connections between applications | |
WO2016040942A1 (en) | Method and system for forensic data tracking | |
CN103391216A (en) | Alarm and blocking method for illegal external connections | |
CN101098224B (en) | Method for encrypting/deciphering dynamically data file | |
US20210176141A1 (en) | Secure count in cloud computing networks | |
CN103632107A (en) | Mobile terminal information safety protection system and method | |
CN202050425U (en) | Illegal external connection monitoring system for internal network equipment | |
CN111046405B (en) | Data processing method, device, equipment and storage medium | |
CN115499844A (en) | Mobile terminal information safety protection system and method | |
CN103824014A (en) | Isolation certificating and monitoring method of USB (universal serial bus) port within local area network | |
KR101592323B1 (en) | System and method for remote server recovery | |
CN103036879A (en) | Method for auditing QQ chat contents | |
CN104978302A (en) | TCM chip based intelligent security USB interface control method | |
US11283768B1 (en) | Systems and methods for managing connections | |
US11496508B2 (en) | Centralized security package and security threat management system | |
US10938913B2 (en) | Hardware turnstile | |
CN106203173B (en) | A kind of SWF file cracks means of defence and system | |
US20150067343A1 (en) | Tamper resistance of aggregated data | |
CN105592021A (en) | Novel internal network security protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20121017 Termination date: 20211116 |
|
CF01 | Termination of patent right due to non-payment of annual fee |