Method and device for processing security services

A security business and processing method technology, applied in the field of security business processing methods and devices, to achieve the effects of protecting security, reducing audit errors, and improving audit accuracy

Active Publication Date: 2019-07-09
HANGZHOU DPTECH TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, not all manufacturers implement data packet transmission between AC and AP according to the RFC standard. For example, data packets transmitted between AC and AP may use figure 2 The format of the CAPWAP tunneling protocol packet shown

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing security services
  • Method and device for processing security services
  • Method and device for processing security services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]Aiming at the problems existing in the prior art, an embodiment of the present invention proposes a method for processing security services, which can be applied to a system including AC, AP and security audit equipment, and the security audit equipment is located between AC and AP . The security audit device is used to process the security services of the data packets encapsulated by the tunnel technology transmitted between the AC and the AP. Wherein, the AC and the AP may use a tunnel protocol to encapsulate the data message, for example, use the CAPWAP tunnel protocol to encapsulate the data message. The security audit device obtains the data packets encapsulated by the tunnel protocol, and performs security service processing on this type of data packets. like Figure 5 As shown, it is a schematic diagram of the format of a data packet transmitted between the AP and the AC, and the data packet includes tunnel outer layer information and tunnel inner layer informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and device for processing security services. The method includes: step A, the security audit device checks the tunnel outer layer information of the data message; when there is an abnormality, execute step B; when there is no abnormality, Execute step C; step B, obtain the processing method when there is an abnormality in the outer layer information of the tunnel, if the processing method is to perform security business processing, execute step C; step C, perform the tunnel inner layer information of the data message Check; when there is an abnormality, perform step D; when there is no abnormality, perform step E; step D, perform preset processing on the data message, and perform step E; step E, perform security on the data message Business processing. Through the technical solution of the invention, the security of the data message is protected, which is beneficial to protect the normal interaction of the data message, reduces the audit error caused by the abnormal data message, and improves the audit accuracy.

Description

technical field [0001] The present invention relates to the field of security management, in particular to a method and device for processing security services. Background technique [0002] WLAN (Wireless Local Area Networks, wireless local area network) is one of the important technical means of broadband access. With the continuous expansion of network scale, the structure of WLAN is also changing. Thin AP (Access Point, access point) and The centralized management mode of AC (Access Controller, Access Controller) has become the mainstream architecture of WLAN. Furthermore, due to the difference in the actual networking environment and the deployment of AC and AP, it is necessary to require the security audit device to be deployed between the AC and the AP, and to be able to identify the tunnel-encapsulated data packets transmitted between the AC and the AP. . [0003] Since different vendors have different encapsulation methods and tunneling protocols for data packets,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/10H04W24/04H04L29/06H04W12/106
CPCH04L63/1425H04W12/10H04W24/04H04L12/4633H04W28/06
Inventor 张园慕野
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products