Access control method of network security group and security computer

A security computer and network security technology, applied in the access control method of security group and security computer field, can solve the problem of low efficiency of access control of network security group, and achieve the effect of improving the efficiency of access control

Active Publication Date: 2013-06-19
南京汇荣信息技术有限公司
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a network security group access control method and device, aiming to solve the problem of low access control efficiency of network security groups

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method of network security group and security computer
  • Access control method of network security group and security computer
  • Access control method of network security group and security computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] In the embodiment of the present invention, all network security groups in the system are output in the same human-computer interaction interface, the user's mouse drag operation in the human-computer interaction interface is detected, and the initial position corresponding to the mouse drag operation is established. The access relationship between the network security group and the network security group corresponding to the end position, so that users can quickly, accurately and efficiently establish the access control relationship between network security groups from a global perspective, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applied to the field of information security, and provides an access control method and an access control device of a network security group. The access control method of the network security group comprises the steps of displaying all network security groups in a system in the same human-computer interaction interface; detecting mouse dragging operation of a user in the human-computer interaction interface; and building an access relationship of a network security group corresponding to an initial position of the mouse dragging operation, to a network security group corresponding to an end position of the mouse dragging operation. The access control method of the network security group can enable the user to being capable of rapidly, accurately and efficiently building access control relationships among the network security groups from the overall situation, and improves access control efficiency among the network security groups.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a security group access control method and a security computer. Background technique [0002] In the basic service of cloud computing (IaaS), virtual machine instances can be dynamically added and deleted, which brings great impact on management complexity and efficiency in terms of security to the configuration and changes of firewalls. Moreover, the traditional firewall method is not enough to achieve the goal of carrier-level reliability and refined operation. For this reason, Amazon proposes the concept of Security Group (SG), which defines firewall rules for virtual machines. These rules determine which network traffic can enter a virtual machine, and new firewall rules can be dynamically added to the network security group to enhance the security of a running virtual machine or a virtual machine that will be started in the future. [0003] see figure 1 , is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
Inventor 潘健敏李礼
Owner 南京汇荣信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products