Method and System for Network Security Control
First Claim
1. A method for network security control, comprising:
- collecting, by terminal devices, local security correlation information and reporting the same to a server;
receiving and parsing, by the server, the security correlation information, and obtaining a security strategy corresponding to the result of the parsing;
performing, by the server, network access control and/or service access control on a terminal device via a network access device by using the security strategy.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention provides a method and system for network security control. A server at the network side analyzes local security correlation information collected and reported by terminal devices, and determines a security strategy according to the result of the analysis. Since correlative reacting between the network side and the terminal side is implemented and the security strategy is established according to the information from the terminal devices, threats against security from a terminal device can be resisted from the beginning. A relative large number of information sources can be taken into account when determining the security strategy such that the determined security strategy is more reasonable and accurate. Furthermore, a differential security service can be provided for terminal devices with different subscriber levels. This invention also provides a method and system for preventing junk mails based on the concept of correlative reacting between a terminal and a server.
125 Citations
40 Claims
-
1. A method for network security control, comprising:
-
collecting, by terminal devices, local security correlation information and reporting the same to a server;
receiving and parsing, by the server, the security correlation information, and obtaining a security strategy corresponding to the result of the parsing;
performing, by the server, network access control and/or service access control on a terminal device via a network access device by using the security strategy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for network security control, comprising terminal devices, a network access device connected therewith, and a security correlation server connected with the network access device, and further comprising:
-
security correlation agents provided at the terminal device side, for collecting security correlation information of the terminal devices and reporting the same to the security correlation server;
wherein the security correlation server is for receiving and parsing the security correlation information reported by the security correlation agents, obtaining a security strategy corresponding to the result of the parsing, and performing network access control and/or application service access control on a terminal device via the network access device by using the security strategy. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for preventing junk mails, comprising:
-
reporting, by a client, the configuration information of a received junk mail to an associated server;
receiving and parsing, the server, the configuration information, and establishing a junk mail filtering strategy according to the result of the parsing;
filtering out, by the server, a junk mail received from the network according to the filtering strategy. - View Dependent Claims (26, 27, 28, 29)
-
-
30. A system for preventing junk mails, comprising a mail server and at least one client connected with the mail server via a network access device, and further comprising:
-
a configuration information obtaining unit provided in the client, for obtaining and transmitting configuration information of a junk mail received by the client;
a security correlation server connected with the network access device, for receiving and storing the configuration information transmitted from the configuration information obtaining unit, establishing or updating a junk mail filtering strategy according to the configuration information, and controlling the network access device to filter out a junk mail received from the network by the mail server according to the filtering strategy. - View Dependent Claims (31, 32, 33, 34)
-
-
35. A system for preventing junk mails, comprising a mail server and at least one client connected with the mail server via a network access device, and further comprising:
-
a configuration information obtaining unit provided in the client, for obtaining and transmitting configuration information of a junk mail received by the client;
a security correlation server connected with the network access device, for receiving and storing the configuration information of the junk mail transmitted from the configuration information obtaining unit;
a mail filtering unit connected with the security correlation server, for establishing or updating a junk mail filtering strategy according to the configuration information outputted by the security correlation server, and filtering out a junk mails received from the network according to the filtering strategy. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification