Method, device and system of distributing network safety strategies

A security strategy and network security technology, applied in transmission systems, electrical components, etc., can solve problems such as difficulty in achieving overall defense and failure to eliminate network security threats, and achieve the effect of eliminating network security threats and improving the effect

Inactive Publication Date: 2010-06-09
ZTE CORP
View PDF28 Cites 100 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides an improved network security policy distribution scheme to solve the problem that it is difficul

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system of distributing network safety strategies
  • Method, device and system of distributing network safety strategies
  • Method, device and system of distributing network safety strategies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] In this embodiment, the communication entity A and the communication entity B belong to different resource control entities A and B respectively, and the resource control entity A and the resource control entity B belong to the same security domain A (that is, belong to the same security policy system A ).

[0061] Image 6 It is a schematic flowchart of the network security policy distribution method in this embodiment. Such as Image 6 As shown, the network security policy distribution in this embodiment mainly includes the following steps (step S601-step S617):

[0062] Step S601: Communication entity A sends a communication request to resource control entity A, requesting to communicate with communication entity B;

[0063] Step S603: The resource control entity A checks its locally stored security policy information, and if there is no security policy information that matches the communication request of the communication entity A, it requests the security polic...

Embodiment 2

[0072] In this embodiment, communication entity A and communication entity B belong to different resource control entities A and B respectively, resource control entity A and resource control entity B belong to different security domains (that is, belong to different security policy systems), Wherein, the resource control entity A belongs to the security domain A (that is, belongs to the security policy system A), and the resource control entity B belongs to the security domain B (that is, belongs to the security policy system B).

[0073] Figure 7 It is a schematic flowchart of the network security policy distribution method in this embodiment. Such as Figure 7 As shown, the network security policy distribution in this embodiment mainly includes the following steps (step S701-step S719):

[0074] Step S701: The communication entity A in the security domain A sends a communication request to the resource control entity A, requesting to communicate with the communication enti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system of distributing network safety strategies, wherein the system of distributing the network safety strategies comprises a safety strategy system, one or more resource control entities attributed to the safety strategy system and one or more communication entities respectively attributed to each resource control entity, wherein each resource control entity is used for sending a request message to the attributed safety strategy system thereof when receiving a communication request, and the request message is used for requesting a safety strategy related to the communication request; and the safety strategy system is used for obtaining the safety strategy related to the communication request according to the received request message and sending the safety strategy to each resource control entity. Through the invention, the integral defensive effect of a network can be enhanced, and the network safety threat is eliminated.

Description

technical field [0001] The present invention relates to the technical field of communication network security, in particular to a network security policy distribution method, device and system. Background technique [0002] With the rapid growth of Internet applications, security incidents on the communication network continue to appear, and there are more and more incidents such as illegal theft of network resources, illegal use of network services, denial of service, worms, viruses, Trojan horses, and even malicious attacks and destruction. . The insecurity of the network has caused huge losses to network operators, service providers and users. How to ensure the security of the communication network itself and the security of user information on the communication network has become a basic issue in network design and application. [0003] For various network intrusions, computer viruses, and various system defects and loopholes, there are various security devices, such as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 滕志猛钱勇韦银星
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products