Method for processing safety warning and safety policy equipment

A security policy and security device technology, applied in the field of network security, can solve the problems of incompatibility, limit the use range of security device linkage security control module, reduce the use efficiency of security device and security control module, etc., to improve efficiency and simplify processing. Effect

Inactive Publication Date: 2008-08-27
NEW H3C TECH CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the current security device linkage security control module solution can handle security alarms generated by security devices well and solve most of the problems in current network security, most manufacturers develop their own security devices and security control modules. , the security policy device can only parse the alarm information sent by its own manufacturer's security device, and instruct its own manufacturer's security control module to perform security actions
In this way, the currently developed safety devices and safety control modules cannot be compatible with safety devices and safety control modules developed by other manufacturers, which greatly limits the scope of use of safety device linkage safety control modules, and reduces the safety The use efficiency of the control module also reduces the processing efficiency of security alarms, and cannot actively and effectively process security alarms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing safety warning and safety policy equipment
  • Method for processing safety warning and safety policy equipment
  • Method for processing safety warning and safety policy equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to achieve the purpose of the present invention, as long as the security policy device can analyze the security alarms from the security devices of various manufacturers, and use the format that each security control module can recognize to instruct it to perform security actions, the security device linkage security control module handles security alarms. method, it can be compatible with security devices and security control modules developed by various manufacturers.

[0027] see figure 1 , figure 1 It is an exemplary flowchart of the method of the present invention. Specifically include: in step 101, the security policy device receives the security alarm sent by the security device, and obtains the analysis information for analyzing the security alarm; in step 102, analyzes the received security alarm according to the analysis information to obtain its corresponding security alarm type; In step 103, according to the type of security alarm obtained, obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for processing security alarm and a security policy equipment. In the technical proposal of the invention, the analysis of the security policy equipment to different formats of security alarm is realized through configurating analyzing information, and a prior consultation format and a security control module are adopted to realize the interaction, the compatibility problem that the security equipment is linked with a security alarm module to process the security alarm is solved, and the efficiency of processing the security alarm is improved. Simultaneously, the technical proposal of the invention can also dynamically adapt to newly increased alarm sources and support the log-in and the extension of the security operation, the network security solving proposal in real significance is provided and the generated security alarm can be processed with more intelligence, higher efficiency, quicker speed and more simplicity and convenience.

Description

technical field [0001] The invention relates to network security technology, in particular to a method for processing security alarms and security policy equipment. Background technique [0002] With the continuous development of network applications and the increasing amount of information data, network security issues have become increasingly prominent. In view of the various viruses and attacks that emerge in an endless stream, enterprise users also pay more attention to and pay more attention to network security, and their requirements are more stringent. [0003] At present, the commonly used network security solution is the way of linking security devices with security control modules. Specifically, a security device generates a security alarm after a security event occurs, and the security policy device receives the security alarm sent by the security device, and notifies the corresponding security control module to perform a security action to handle the current sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 胡冰
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products