Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
Safety system and method for management of net element
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A network element management and security system technology, applied in the field of network security, can solve problems affecting security system performance, etc.
Inactive Publication Date: 2010-10-27
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0007] But in this architecture, the invocation of each module directly depends on a specific distributed event service, such as CORBA (Common Object Request Broker Architecture) event service, and requires other integrated subsystems to also use this service, so it is difficult to integrate with other distributed event services based on Integration of different event service subsystems, such as JMS (JAVA Message Service)
In addition, when deployed in the same process as other subsystems, messages between submodules in the security system are also served through distributed events, such as directly calling CORBA or JMS services, which will affect the performance of the security system
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0032] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0033] First, refer to figure 2 The functional block diagram of the first embodiment of the system of the present invention shown:
[0034] In this embodiment, the network element management security system includes: a database 20 , a management unit 21 , a service unit 22 and a message broker unit 23 . Among them, the database 20 is used to store management data in the system; the management unit 21 is used to provide user-oriented management functions. In practical applications, the network element management security system may include one or more management units, such as account management , group management, rights management, log management, session management, etc., there can be multiple individual management units to complete a ce...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The present invention discloses a network element management security system which comprises the following components: a data base which is used for storing and managing the data; at least one management unit which is used for providing a management function facing to the subscriber and modifying the management data corresponding with the subscriber in the data base when the information of subscriber is altered; at least one service unit which is used for providing security service according to the management data in the data base to other applications in the network system; and an information broker unit which is used for informing the service unit to obtain the modified data from the data base when the informing information that the management unit has modified the data. The invention furthermore discloses a network element management security method. With the invention, the loose coupling between each unit of the system and a multiple living examples arrangement disposition can be realized, and the expanding capability of the system can be increased.
Description
technical field [0001] The invention relates to the technical field of network security, in particular to a network element management security system and method. Background technique [0002] At present, EMS (Element Management System) is mostly used in network management to realize unified management of various network element devices in the network. Usually, EMS provides functions such as system management, monitoring, control, statistics, and device version upgrades, and is responsible for managing business platforms, gateways, and other devices, including device configuration, routing configuration, device software upgrade, monitoring and alarm, security management, etc. . [0003] In order to ensure the security of EMS, in the case of large-scale network management, it is also necessary to set up a security management subsystem in EMS to provide user-oriented management functions, such as account management, log management, authority management, etc., collectively ref...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.