Implementing method and system for could security service

A technology of security services and implementation methods, applied in the field of implementation methods and systems of cloud security services, can solve problems such as cloud computing security threats that cannot be well resolved, and achieve improved response effects

Inactive Publication Date: 2015-05-06
ZTE CORP
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention provides a method and system for implementing cloud security services, so as to at l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementing method and system for could security service
  • Implementing method and system for could security service
  • Implementing method and system for could security service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0028] The embodiment of the present invention mainly relates to the security service technology in the cloud computing environment, and can deal with security threats in the cloud computing environment by combining existing traditional security devices. Specifically, integrate existing security devices through the cloud security center, shield the differences between different security devices of different manufacturers through security middleware, and call security devices or security services through security middleware to realize dynamic deployment of security devices or security services. Services are provided to hosts or network security services rented by tenants in the cloud computing environ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an implementing method and an implementing system for cloud security service. The method includes the steps that: security middleware receives an executing message from a cloud security operating center, wherein the security middleware is preset in a security engine layer, and the cloud security operating center is preset in a managing layer; the security middleware executes corresponding dynamic security operation according to the executing message, and thereby obtaining an execution result; the security middleware dynamically regulate a cloud security strategy according to the execution result. According to the implementing method and system for cloud security service, the efficiency for quickly responding to security threat and dealing with security events in the case of no manual intervention can be improved.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a method and system for realizing cloud security services. Background technique [0002] Since cloud computing involves changes in the computing modes of individuals and enterprises, as well as sensitive information of individuals and enterprises, the first important issue cloud computing faces is security. [0003] In the cloud computing environment, in addition to facing the security issues in the traditional environment, there are also new security threats brought about by virtualization and data concentration. [0004] Traditional security protection devices (for example, firewalls at the network layer, IPS (Intrusion Prevention System, intrusion detection system), traffic cleaning equipment, 4A at the data layer, UDS (Universal Distributed Storage, universal distributed storage), anti-virus software, etc.) It is a passive defense device, and it is difficult for these trad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L63/02
Inventor 王雪玉李炀王华刚陈小华周详生
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products