CN201821367U - Information processing system for online behaviors - Google Patents

Information processing system for online behaviors Download PDF

Info

Publication number
CN201821367U
CN201821367U CN2010202757403U CN201020275740U CN201821367U CN 201821367 U CN201821367 U CN 201821367U CN 2010202757403 U CN2010202757403 U CN 2010202757403U CN 201020275740 U CN201020275740 U CN 201020275740U CN 201821367 U CN201821367 U CN 201821367U
Authority
CN
China
Prior art keywords
internet
processing system
information processing
online
online behaviors
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010202757403U
Other languages
Chinese (zh)
Inventor
姚欣
石凤龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI EETONG GUANGDA INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI EETONG GUANGDA INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI EETONG GUANGDA INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI EETONG GUANGDA INFORMATION TECHNOLOGY Co Ltd
Priority to CN2010202757403U priority Critical patent/CN201821367U/en
Application granted granted Critical
Publication of CN201821367U publication Critical patent/CN201821367U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The utility model relates to an information processing system for online behaviors, comprising a mail server, a file server, an office computer, the Internet and a fire wall; the system comprises an information processor for online behaviors; the mail server, the file server and the office computer are respectively connected with the information processor for online behaviors; and the information processor for online behaviors is connected with the Internet through the fire wall. Compared with the prior art, the information processing system for online behaviors has the advantages of being capable of managing network bandwidth, controlling bandwidth flow, filtering web contents, managing chat software and online time, and the like.

Description

A kind of internet behavior information processing system
Technical field
The utility model relates to a kind of information processing system, especially relates to a kind of internet behavior information processing system.
Background technology
Development and progress along with information technology, especially the rise of network and universal, organizations and individuals' networking condition improves, and the organization internal employee has been not limited to dismiss the work hours by chatting with the colleague, shopping online, pass through the immediate communication tool online chatting with the good friend, online music appreciating and film, download, receive and dispatch individual mail, in forum, indulge in rhetorical flourishes or the like by P2P instruments such as BT, as long as the employee is interesting, their enjoyment that the Internet brings that just can indulge in luxuriousness to one's heart's desire the time of being on duty.
The employee indulges among the temptation of the Internet, organizes limited network bandwidth resources but constantly to be nibbled and destroy.Comprise BT, electric donkey, sudden peal of thunder equiband resource " phagotroph ", make originally limited bandwidth resources nervous more, most of employee complains that network speed is too slow, bandwidth congested except that direct interference video meeting, VOIP etc. to the comparatively responsive system's normal operation of bandwidth, also greatly reduce the efficient of various service operations based on the Internet, brought bigger business risk and opportunity cost to tissue.In this simultaneously; not limited internet access makes that the employee may be unconscious or even the numerous contents that may the crisis organization networks of malice visit; for example virus, worm and the wooden horse that brings by Web, IM and file-sharing may be clicked easy to do intrusion Intranet along with mouse is simple.The risk that not controlled internet access may bring more than above-mentioned those, cause because lacking limited management means divulge a secret, illegal incidents become increasingly conspicuous, and become the sword of the Damokers on the manager crown just gradually.
Allow the people helpless be that employee's network behavior lack of standardization is organized as it often and checks, and except be not in the mood for direct losses that work brings because of the work hours, organize also to be faced with and bears legal responsibility and divulge a secret risk.Part employee utilize the work hours accessed content improperly website (as pornographic, reaction etc.), deliver carefree network speech even tissue or participate in illegal network activity, for example deception on the net, network attack, these behaviors will make organize fame impaired, suffer and involve.The information assets of tissue, the unauthorized of confidential information are propagated and are made the manager painful equally, because the Internet behavior is complicated and be difficult to expect, no matter be intentionally or accident, an employee who has an ulterior motive and a honest and trustworthy capable person may reveal the capsule information of Intranet to third party's tissue even rival.
The utility model content
The purpose of this utility model is exactly to provide a kind of energy supervising the network bandwidth, control bandwidth flow, filtering web page content, management chat software and the internet behavior information processing system of surf time for the defective that overcomes above-mentioned prior art existence.
The purpose of this utility model can be achieved through the following technical solutions: a kind of internet behavior information processing system, comprise mail server, file server, office computer, internet, fire compartment wall, this system comprises the internet behavior message handler, described mail server, file server, office computer are connected with the internet behavior message handler respectively, and described internet behavior message handler is connected with internet by fire compartment wall.
What described internet behavior message handler adopted is net health internet behavior management equipment.
Compared with prior art, the utlity model has following advantage:
1, supervising the network bandwidth
For interior network server enough bandwidth is provided, ensure the Email of market department transmitting-receiving bandwidth demand, be market department's every employee's mean allocation bandwidth resources, demonstrated fully the difference of different departments, employee and application, both prevented from the bandwidth abuse to have promoted again with mad service efficiency.
2, webpage and information filtering strategy
The employee and the department that realize appointment can only visit specific website in the operating time, trade information website for example, and portal website of company etc., and other web page browsings without permission all will be rejected.
3, application program management
By concrete application program is discerned in the analysis of using agreement and packet feature, no matter how application program changes the server ip and the port of connection, can accurately discern, secondly can also control the management of P2P software, IM (even communication) chat software.
4, surf time management
Can give the different rights of different time at different departments or different personnel's identity, promptly can be controlled at access authority in the special time period, also can limit total surf time in the employee one day, realize human-based management.
Description of drawings
Fig. 1 is a structural representation of the present utility model.
Embodiment
Below in conjunction with the drawings and specific embodiments the utility model is elaborated.
Embodiment
As shown in Figure 1, a kind of internet behavior information processing system, comprise mail server 4, file server 5, office computer 6, internet 1, fire compartment wall 2, this system comprises internet behavior message handler 3, mail server 4, file server 5, office computer 6 are connected with internet behavior message handler 3 respectively, and internet behavior message handler 3 is connected with internet 1 by fire compartment wall 2.What internet behavior message handler 3 adopted is net health internet behavior management equipment.
Planning user grouping structure:
For the internet access authority of authorizing differentiation for different clients, different department, comprise the behavior audit strategy of differentiation, at first to plan and set up the user grouping structure of tissue.Usually can set up the user grouping structure of tissue according to administrative framework or IP segmentation/vlan information, as setting up " leader's group ", " market department ", " research and development department " etc., after the establishment of finishing user's group, can create the user, and the user is assigned in user's group of appointment, to realize authorizing and inheriting of network access authority.Support with the designated user to be template when creating user grouping, duplicate same authority, streamlining management person's operation; And the process of creating the user is simple and convenient equally, when supporting usemame/password authentication mode, energy binding IP/MAC function, and provide multiple identification authentication mode, can limit the time of commencement of number of the account, and support to set up the shared number of the account of many people etc., abundant user identity identification mode makes that the keeper is free to rationally be arranged in its corresponding authentication means according to the actual user in in-house identity and authority.
Set up the authentication system:
Do not have strict authentication just can't effectively distinguish the user, just can't dispose differentiation mandate and audit strategy yet, can't defend effectively naturally that identity is pretended to be, authority spreads and abuse etc.The multiple identification authentication mode that the utility model is supported will be brought huge facility for you.User/encrypted message can be stored in equipment itself, support and organize existing LDAP, the AD of Microsoft domain controller, the interlock of Radius server again even can utilize the existing number of the account of organizing on the POP3 server to make up basic account data storehouse, and Unsupervised member adds user account one by one.The phase-split network flow:
In the Network Management process, the keeper often needs further to understand the operating position of the Internet bandwidth of tissue, understand bandwidth by which employee take, which application tied up most the Internet bandwidth.Use the utility model keeper can check the WAN traffic curve chart intuitively, and can further check, add up the flow situation of yesterday or fixed time section, thereby help the keeper to optimize and the distribution bandwidth resources.
Web page access control:
The URL storehouse of all can be built-in in the equipment of the present utility model closely necessarily presorting allows the keeper to import new URL address and classification simultaneously, and this built-in URL storehouse is through special messenger's manual examination and verification classification, has included all kinds of websites such as pornographic, reaction, violence that relate on the Internet.Because the capacity of the Internet just increases with volatile, adopt the means in static URL storehouse to be not sufficient to ensure that the keeper can effectively classify internet content and manage, therefore the equipment in used the utility model is also supported content-based filtration means, comprises that filter user is by the nominal key of search engine search, the webpage that filtration comprises nominal key, the URL address that filtration contains nominal key etc.The issue of SSL encrypted form is adopted in now increasing website, " encryptionization " become the trend of network development, enforcement the utility model can be encrypted the website to SSL and select and filter, except discerning and block the corresponding URL, can also shield the visit of Intranet user by the mode of checking the SSL certificate chain, thereby provide comprehensive webpage controlling schemes for tissue the website that do not have legal certificate.
Managing I M immediate communication tool:
The utility model can be based on forbidding and supervising two aspects to the management of IM immediate communication tool
Forbid: according to the transmission protocol data bag feature field of IM software, the various IM of shutoff use comprehensively, comprise QQ, MSN, the UC of Sina, POPO, Yahoo Messenger, Skype, ICQ, Google Talk, mobile Fetion etc.; Even IM software is dressed up the agreement of back by port transmission such as 80,443 with data envelope, the utility model also can effectively be distinguished IM flow and normal HTTP and HTTPS, thus the effectively use of managing I M.
Supervision: allow to use the employee of IM instrument, its chat content is not necessarily relevant with work, especially the tissue secret may be revealed.The utility model can write down all IM chat content, comprises the IM instrument that employing cipher modes such as QQ, Skype transmit.
P2P behaviors such as control BT:
Shutoff at P2P comprises the end-blocking mouth traditionally, envelope seed server IP, envelope seed resource website, but softwares such as BT can pass through 80 port transmission data, the IP of seed server and the quantity of resource website are surprising, and are changing at any time, and the keeper is difficult to obtain satisfied effect.The method that the utility model adopts comprises application protocol analysis and P2P behavior Intelligent Measurement technology, by analyzing the contents such as COS, agreement, port and data characteristics field of packet, from four layers to seven layers complete detection, realizes its management and control and shutoff.
In addition, the utility model can also be discerned and management and control common application in online speculation in stocks, online game, the Online Video etc. more than 150 for example.
Daily record audit and form center:
The utility model can carry out behavior record and audit at different user (group), the information of message body that comprise the UR1 address, web page title of visit, the speech by the issue of BBS/ blog, sends by Webmail and annex, all Email by the client transmitting-receiving and annex thereof, the information by the HTTP/FTP upload file and content, file in download; Can also write down simultaneously which user, when, what behavior taken place.For in-house CEO contour level leader, " exempting from the key that audits " provided by the utility model function has thoroughly been exempted the behavior record to the specific people, insert the computer USB interface and import corresponding PIN code as long as will " exempt from the key that audits ", any network behavior of this user all will not be recorded.

Claims (1)

1. internet behavior information processing system, comprise mail server, file server, office computer, internet, fire compartment wall, it is characterized in that, this system comprises the internet behavior message handler, described mail server, file server, office computer are connected with the internet behavior message handler respectively, and described internet behavior message handler is connected with internet by fire compartment wall.
CN2010202757403U 2010-07-29 2010-07-29 Information processing system for online behaviors Expired - Fee Related CN201821367U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010202757403U CN201821367U (en) 2010-07-29 2010-07-29 Information processing system for online behaviors

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010202757403U CN201821367U (en) 2010-07-29 2010-07-29 Information processing system for online behaviors

Publications (1)

Publication Number Publication Date
CN201821367U true CN201821367U (en) 2011-05-04

Family

ID=43919309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010202757403U Expired - Fee Related CN201821367U (en) 2010-07-29 2010-07-29 Information processing system for online behaviors

Country Status (1)

Country Link
CN (1) CN201821367U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495942A (en) * 2011-10-26 2012-06-13 深信服网络科技(深圳)有限公司 Assessment method for risks of internal network of organization and system
CN105978879A (en) * 2016-05-11 2016-09-28 北京交通大学 Safety management system of network channels
CN107465659A (en) * 2017-06-30 2017-12-12 北京北信源软件股份有限公司 A kind of network log-in management method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495942A (en) * 2011-10-26 2012-06-13 深信服网络科技(深圳)有限公司 Assessment method for risks of internal network of organization and system
CN102495942B (en) * 2011-10-26 2014-09-17 深信服网络科技(深圳)有限公司 Assessment method for risks of internal network of organization and system
CN105978879A (en) * 2016-05-11 2016-09-28 北京交通大学 Safety management system of network channels
CN105978879B (en) * 2016-05-11 2019-04-26 北京交通大学 Network channel safety management system
CN107465659A (en) * 2017-06-30 2017-12-12 北京北信源软件股份有限公司 A kind of network log-in management method and device
CN107465659B (en) * 2017-06-30 2020-08-07 北京北信源软件股份有限公司 Internet access behavior management method and device

Similar Documents

Publication Publication Date Title
CN107395570B (en) Cloud platform auditing system based on big data management analysis
US8976008B2 (en) Cross-domain collaborative systems and methods
Mislove et al. Ostra: Leveraging Trust to Thwart Unwanted Communication.
CN105049232B (en) Network information Log Audit System
US20140282952A1 (en) Systems and methods for facilitating relationship management
CN103181125A (en) Access control device, access control program, and access control method
WO2021183939A1 (en) Improved investigation of threats using queryable records of behavior
WO2006129962A1 (en) System for blocking spam mail and method of the same
EP2446371A1 (en) Automatic message moderation for mailing lists
CN105553956A (en) Mail blocking method and device based on sensitive information recognition
CN103136255A (en) Method and device for information management
CN110222498A (en) A kind of supervision management system and method based on mobile interchange cloud
CN201821367U (en) Information processing system for online behaviors
CN102347849A (en) Networking behavior information processing system
CN102972005B (en) Pay authentication method
WO2010099560A1 (en) Device and method for monitoring of data packets
CN206341241U (en) A kind of internet behavior information management system
JP2022181684A (en) Program and information processing apparatus
CN107787500A (en) Message provides and evaluation system
CN108093078B (en) Safe document circulation method
Koban et al. Modeling User-Centric Threats in Smart City: A Hybrid Threat Modeling Method
Wolff Application-layer design patterns for accountable–anonymous online identities
Zhao et al. Examining social dynamics for countering botnet attacks
KR101037675B1 (en) System and Method for Collecting and Processing Dispersing Contents
Park et al. Spam Detection: Increasing Accuracy with A Hybrid Solution.

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110504

Termination date: 20130729