Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unified management method and device thereof

A management method and technology for managing devices, which are applied in the field of unified management methods and devices, can solve problems such as repetitive labor, large maintenance workload, and complicated use of audit functions, and achieve the effects of reducing occupation and maintenance work.

Active Publication Date: 2009-10-21
NEW H3C TECH CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Based on the above analysis, when the existing network access control system of enterprises and institutions controls access terminals (identity authentication control and security inspection control), it is difficult to manage and audit in a unified manner; large enterprises and institutions (for example, multinational enterprises) A large number of branches are distributed all over the world, and each branch has a large number of employees. The network access control system of each branch has its own business policy, and each branch can only control its own business Data management and audit; however, large enterprises and institutions need to use a unified business strategy to manage and audit the business data of each branch. At this time, it is necessary to repeatedly formulate the same business strategy in all branches, and the maintenance workload is huge and numerous. Due to duplication of work, the ease of use is poor; and it is necessary to manage and audit the business data of each branch in all branches one by one. Since the data of each branch is independent, the headquarters organization wants to carry out the data of each branch. Unified management and auditing can only be managed and audited by logging into the configuration console of each branch, and only the data of each branch can be audited, and the function of auditing the summary information of each branch cannot be realized, resulting in comparison of the use of audit functions complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified management method and device thereof
  • Unified management method and device thereof
  • Unified management method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The core idea of ​​the present invention is in the network access control system of distributed deployment (the network control systems of each branch are in an equal relationship, each branch uses its own independent database, and the network control systems of each branch operate independently) , all the branches are divided into multi-level relationships, and the business policy is uniformly formulated by the upper-level branch structure, and the business policy is manually distributed to the lower-level branches or automatically distributed to the lower-level branches. Wherein, the business strategy includes an authentication strategy and a security strategy, the authentication strategy is a set of binding information related to authentication (for example, the binding relationship between terminal name, identifier, IP address, and terminal name), and the security strategy is a set of binding information related to authentication. Relevant data (for example, traffic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a unified management method, which is applied to a system comprising a low-level device and a high-level device. The method comprises the following steps: the low-level device receives a business strategy of the high-level device; the low-level device modifies the business strategy according to a preset strategy, takes statistics of safety information of an access terminal according to the modified business strategy and collects statistical data; and the low-level device sends the statistical data to the high-level device which conducts unified management on the access terminal according to the statistical data. In the invention, the business strategy is obtained from the high-level device and the high-level device sends the business strategy to the low-level device, thus realizing unified management in the access and control system of a distributed deployment network and greatly relieving maintenance work. The invention also provides a device applying the method.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a unified management method and device. Background technique [0002] With the continuous acceleration of the pace of social informatization and the continuous popularization and deepening of network applications, network security has surpassed the requirements for network reliability, switching capabilities and service quality, and has become the most concerned issue of enterprise users. The top priority of construction. [0003] In enterprises, new security threats continue to emerge (for example, viruses and worms are rampant day by day), and the degree and scope of damage to the enterprise network continue to expand, often causing problems such as system crashes and network paralysis, causing enterprises to suffer serious losses. In the enterprise network, the security status of any terminal (for example, the anti-virus capability, patch level and system security settings ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
Inventor 黄婉清
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products