A working method of trusted network and trusted network
A credible and network technology, applied in the field of network security, can solve the problems of prone to false positives, false negatives, too many devices, inaccurate security events, etc., to avoid theft and meet the effect of network-level protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The specific embodiments described here are only used to explain the present invention, but not to limit the present invention.
[0060] A trusted network of the present invention, such as figure 1 As shown, it includes trusted applications, trusted tokens, trusted agents, trusted management platforms, and trusted routers; among them, trusted applications are IT services deployed in the network to support services, and are composed of identifiable subjects and Composed of objects, where the subject is a process representing user behavior, and the object is one or more of files, directories, device files, and symbolic links; trusted applications have given specific security levels and categories for read / write; The trusted mark exists in the IP messag...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com