For the method protecting computer network security

For the method protecting computer network security

  • CN 106,254,329 A
  • Filed: 07/30/2016
  • Published: 12/21/2016
  • Est. Priority Date: 07/30/2016
  • Status: Active Application
First Claim
Patent Images

1. the method being used for protecting computer network security, it is characterised in that:

  • comprise the steps;

    Server is that user distributes credit value, determines access authorization privilege according to described credit value;

    Server detects that the access authorization requests that user sends, described access authorization requests include;

    ID, log in password andAccess item;

    Authorization requests is converted into multiple subquery task that authorizes that accesses by server, respectively the plurality of access is authorized subqueryTask is verified, if by checking, then by described access authorization requests, and user authentication success;

    If not verified, then refuseExhausted described access authorization requests, and feedback result is sent to user;

    When server detects the access request of user, first carry out user authentication, after user authentication success, be isolated to separation netNetwork region, carries out safety detection and risk assessment, determines whether connecing of consenting user according to safety detection and risk evaluation resultEnter request, and result is fed back to user;

    Described safety detection includes the detection of malicious attack detection, tender spots, network packetCapture and network topology detect;

    User authentication is unsuccessful, then refuse access request;

    After user receives the feedback agreeing to access, send the instruction of data search to server, and carry out phase on the serverThe operation answered;

    The data found are downloaded in the terminal computer of user;

    Described terminal computer is deposited after the data encryption of downloadStorage is in disk.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×