Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security service providing method and server

A security service and server technology, applied in the field of security service provision and server, can solve problems such as limited function expansion, and achieve the effect of improving scalability

Active Publication Date: 2019-12-27
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a security service providing method and server, aiming to solve the problem of limited function expansion in traditional SOC

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security service providing method and server
  • A security service providing method and server
  • A security service providing method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0059] The embodiment of this application discloses a security service providing server, such as figure 1 As shown, it includes: a basic platform 101 and at least one application 102 (Application, APP). In this embodiment, APP-1, APP-2, ... APP-N are taken as examples.

[0060] Among them, the functions of the basic platform 101 are mainly focused on providing public functions or services for each application, that is, the basic platform is used to verify the call request after rec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a server and method for security service providing, wherein a basic platform is used for verifying the call request after receiving the call request of the user for any application, forwarding the call request to the application it calls after the call request is verified and configuring the resources for the run of the called application. Every application is used to receive the forwarded call request of the basic platform and provides the user with the business of the security class according to the call request. The basic platform provides unified services of request verifying and resources configuring for all the applications. And because each application is independent of other applications in the running process, numerous applications can be built based on the basic platform theoretically, which can improve the scalability of the security service providing server.

Description

technical field [0001] This application relates to the field of electronic information, in particular to a security service provider and server. Background technique [0002] A security operation center (Security Operate Center, SOC) is a system for centralized management of security devices (including centralized operation status monitoring, event collection and analysis, and security policy delivery). [0003] Traditional SOC is generally built as a system. For traditional SOC, this system is closed. The system includes several modules such as asset management, security log management, event management, process management, and risk management. Through the analysis of security logs, Generate security incidents, and then drive the resolution of security issues through the operation of security incidents, in order to reduce security risks. It can be seen that the traditional SOC is a complex system, in which there are various levels of coupling and calling among various func...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 段文国
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products