Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for integrating security context into network routing decisions

A contextual and safe technology, applied in safety devices, electrical components, transmission systems, etc., can solve problems such as increased operating costs

Active Publication Date: 2019-06-14
CA TECH INC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, additional installation and activation of servers and network equipment will result in increased operating costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for integrating security context into network routing decisions
  • Method and apparatus for integrating security context into network routing decisions
  • Method and apparatus for integrating security context into network routing decisions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Methods and apparatus for integrating security context into network routing decisions are described herein according to various implementations. According to the security context of the data access request response, the data flow is controlled through the router. Examples of a security context may include, but are not limited to, the sensitivity of data in a response to an access request, network security associated with the response, security of the user device receiving the access request, and the like. For example, if the response data is highly sensitive, and if the network and / or the user device are deemed insecure, the router may block highly sensitive response data from flowing to the user device. The specific implementation of the present disclosure can select a route according to the security context of the response, and then use the router to automatically implement the policy to control the data flow. A specific implementation may select different routes for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides an apparatus for identifying an access request of a user equipment to data in a storage server. The apparatus determines a sensitivity level of response data in response to the request, determines a security context of the response, and determines a security context for the response by applying a policy to the sensitivity level of the response data and the security context of the response The routing action to perform. The means performs the routing operation for the response.

Description

technical field [0001] The present disclosure relates to network routing decisions, and in particular, it relates to integrating security context into network routing decisions. Background technique [0002] Enterprises, such as commercial organizations, can store data that may contain sensitive content. For example, corporate data can include confidential customer information, sensitive research documents, proprietary designs, and more. Enterprise users (such as enterprise employees) may wish to use these enterprise data remotely. For example, a user may be traveling and may use a tablet and the hotel's public network to access their corporate email account, which may contain sensitive corporate data. The enterprise may wish to control the data flow of sensitive data, and it does not want enterprise users to use public networks to access sensitive data. Traditional solutions implement a security proxy on user devices to prevent unauthorized access to sensitive data. How...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0245H04W12/67H04L63/02
Inventor D·班纳吉
Owner CA TECH INC