Unlock instant, AI-driven research and patent intelligence for your innovation.

A security policy management method and device

A technology of security policy and management method, applied in the field of security policy management method and equipment, can solve the problems of bad user experience, time-consuming, long time, etc., and achieve the effect of improving user experience

Active Publication Date: 2018-09-14
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, in the above technical solution, the user equipment needs to perform two MAC authentication processes. During the first MAC authentication, the user equipment is assigned to the isolated VLAN, and during the second MAC authentication, the user equipment is assigned to the VLAN to obtain legal resources. The process takes a long time, and it takes a long time for the user device to obtain legal resources, and the two MAC authentication processes of the user device will also bring a bad user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security policy management method and device
  • A security policy management method and device
  • A security policy management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] An embodiment of the present invention provides a security policy management method, which is applied to a network including an AP, user equipment and a management server. by figure 1 It is a schematic diagram of the application scenario of the embodiment of the present invention. The network also includes an AC, the management server can be an iMC server, and the user equipment can be a Telephone (telephone), a PC (personal computer), a Printer (printer), a Notebook (notebook computer) ), Fax (fax machine), TV (television), Cell phone (mobile phone), DC (digital camera), etc.

[0050] In the above application scenarios, such as figure 2 As shown, the method includes the following steps:

[0051] Step 201, the user equipment obtains the equipment information of the user equipment, adds the equipment information of the user equipment to the LLDP packet, and sends the LLDP packet carrying the equipment information of the user equipment to the AP.

[0052] In a specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a security policy management method and equipment. The method comprises: an AP receives an LLDP message from a user equipment, and the LLDP message carries equipment information of the user equipment; the AP sends the equipment information of the user equipment to management server, the management server uses the equipment information of the user equipment to determine whether the user equipment performs user role authentication; when the user equipment needs to perform user role authentication notification, the AP sends the user role authentication information to the management server, and the management server The server uses the device information and user role authentication information of the user equipment to determine the security policy of the user equipment; after the AP receives the security policy of the user equipment from the management server, uses the user equipment's The security policy performs security management on the user equipment. In the embodiment of the present invention, the user equipment can be enabled to obtain legal resources as soon as possible, and user experience can be improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a security policy management method and equipment. Background technique [0002] In order to meet employees' pursuit of new technology and personalization, improve employee work efficiency, and reduce enterprise costs and investment, many companies are currently considering allowing employees to use their own user devices to use internal applications. Based on this, BYOD (Bring Your Own Device) came into being. BYOD refers to bringing your own user equipment to work, and these user equipment include personal computers, mobile phones, tablets, etc. However, when employees use their own user devices for office work, many security problems will be brought about, such as the malicious software on the employee's user devices being introduced into the company network will bring losses and so on. Therefore, the premise of BYOD is that sufficient security is required, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/24
CPCH04L2101/622H04L67/51H04L63/101H04W12/08H04W12/06Y02D30/00H04W12/37H04L63/0876H04L63/10H04L69/324H04W48/16
Inventor 刘佳
Owner NEW H3C TECH CO LTD