Safety on-demand supply method and system, and service type acquisition method

A business type and business technology, applied in the field of information security, can solve problems such as different security risks, different security strengths, staying in the theoretical stage, etc., and achieve the effect of improving user experience

Active Publication Date: 2013-02-13
ZTE CORP
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] (3) Different application scenarios cause different security risks and require different security strengths
At present, the idea of ​​safe on-demand supply is only at the theoretical stage, and there is no technical solution for reference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety on-demand supply method and system, and service type acquisition method
  • Safety on-demand supply method and system, and service type acquisition method
  • Safety on-demand supply method and system, and service type acquisition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The basic idea of ​​the present invention is: by extracting the service identifier from the service type, combined with the application scene, the user's setting of the security level, as the input parameter of the security policy, deriving the security parameter from the security policy, and acting on the security algorithm and protocol, thereby Provide on-demand security protection for business data.

[0069] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail by citing the following embodiments and referring to the accompanying drawings.

[0070] figure 1 It is a schematic diagram of the composition and structure of the secure on-demand provisioning system of the embodiment of the present invention, such as figure 1 As shown, the security on-demand system of the present invention includes a security policy parameter collection unit 10, a security policy unit 11 and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety on-demand supply method. The method comprises the following steps of: determining configuration parameters of a safety function module according to a safety level which is set for service request by a user, an application scene in which a user terminal is positioned, and / or service type; and configuring the safety function module according to the configuration parameters, and safely protecting service data of the user. The invention also discloses a service type acquisition method for safely protecting a specific user and / or a service. Service identifiers of data are acquired by using a service type classification function of a quality of service (QoS) function module, so the specific user and / or the service are safely protected. The invention also discloses a safety on-demand supply system and the service type acquisition method. By the invention, according to safety requirements of different users on different services, different service safety guarantee can be provided. The safety on-demand supply system meets the safety requirements of various users and various services, personalized safety guarantee is provided for the users, and a user experience effect is improved.

Description

technical field [0001] The present invention relates to information security technology, in particular to a secure on-demand supply method and system, and a service type acquisition method. Background technique [0002] In recent years, cloud computing has developed rapidly. From the early theoretical stage, it has gradually been transformed into products and put on the market, and the technology has become increasingly mature. Whether it is Internet manufacturers and operators, or communication manufacturers and basic network operators, they all show great concern for cloud computing. Cloud computing in a narrow sense refers to the delivery and use mode of Internet technology (IT, Internet Technology) infrastructure, which refers to obtaining the required resources through the network in an on-demand and easy-to-expand manner; cloud computing in a broad sense refers to the delivery and use of services model. The form of this service is based on a data center with super co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04W12/00H04W12/06H04W12/10
CPCH04W12/00H04L63/20H04L29/08H04L63/105H04L29/06551H04L47/2408H04L29/06H04L63/0428H04L63/205H04L63/0227
Inventor 陈剑勇陈小华林兆骥
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products