Network security monitoring method and system

A network security and monitoring system technology, applied in the fields of identity authentication, access control, data monitoring methods and systems, can solve problems such as setting security policy obstacles

Inactive Publication Date: 2014-12-31
ZTE CORP
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to ensure the security of the Internet, it is a common method and technology to implement network security monitoring and management based on security policies. Among them, a technology based on user identit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method and system
  • Network security monitoring method and system
  • Network security monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] This embodiment provides a network security monitoring system, including an access security execution unit and a security policy engine unit.

[0041] The access security execution unit obtains the network address or user ID of the user accessing the network, and sends a user security policy query request carrying the user ID and / or network address to the security policy engine unit, and from the security policy Obtain the corresponding user security policy from the user security policy query response returned by the engine unit, and execute the security policy for the user;

[0042] Among them, user identification includes but is not limited to any of the following:

[0043] Mobile phone number, landline phone number, International Mobile Subscriber Identity (IMSI) number, International Mobile Equipment Identity (IMEI) number, user registration name, user unique identifier of user digital certificate.

[0044] Network addresses include but are not limited to any one o...

Embodiment 2

[0069] This embodiment provides a network security monitoring method, the method includes the following operations:

[0070] When a user accesses the network from a terminal, the network security monitoring system obtains the user's network address or user ID;

[0071] The network security monitoring system determines the user identity information corresponding to the user's network address or user ID, queries the user security policy of the user accessing the network according to the user identity information, and executes the security policy for the user.

[0072] The network security monitoring system involved in the above method can adopt the framework of the above embodiment 1, at least including an access security execution unit and a security policy engine unit, wherein:

[0073] Access to the security execution unit, obtain the network address or user ID of the user accessing the network, and send a user security policy query request carrying the user ID and / or network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security monitoring method and system and relates to the field of communications. The system comprises an access security execution unit and a security strategy engine unit; the access security execution unit transmits a user security strategy query request, carrying a user identifier and/or a network address, to the security strategy engine unit, acquires a corresponding user security strategy from a user security strategy query response returned from the security strategy engine unit, and executes the user security strategy for a user; the security strategy engine unit receives the user security strategy query request, extracts the user identifier and/or the network address from the request, determines user identify corresponding to the extracted user identifier and/or the network address, queries a corresponding user security strategy according to the user identity, and feeds back the queried user security strategy through user security strategy query response. The invention further discloses a network security monitoring method. The network security monitoring method and system according to the technical scheme allow execution of security strategies of network users.

Description

technical field [0001] The invention relates to the field of communication, in particular to methods and systems for access control, identity authentication and data monitoring in the field of network security. Background technique [0002] The initial development of the Internet was characterized by freedom and openness. While promoting social progress, democratic development, and economic prosperity, it also brought some hidden dangers in public safety and network security. Compared with the various constraints in the real society, any network behavior can only be traced to a certain IP (Internet Protocol Internet Protocol) address, so people tend to lack self-discipline on their behavior, and some even use the Internet to commit crimes. [0003] With the development of the Internet, especially the explosive growth of the number of Internet users and Internet applications, and the rapid development of the mobile Internet, relatively high requirements have been put forward ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26H04L29/12
CPCH04L61/106H04L63/20
Inventor 滕志猛周苏静
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products