Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for network security management

A network security and management method technology, applied in transmission systems, electrical components, etc., can solve problems such as server abnormal restart, billing interruption, server workload increase, etc., to reduce business processing volume, reduce server pressure, and ensure normal online Effect

Active Publication Date: 2020-01-24
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are currently a large number of attacks against the authentication server. The attacker continuously sends authentication request packets to the authentication server, and the authentication server needs to judge and authenticate all authentication request packets one by one, which will inevitably increase the workload of the server. As a result, the server business is so busy that it cannot handle the online business of normal users in time, resulting in the inability of normal users to go online
When the server load is too heavy, problems such as abnormal server restart and billing interruption may even occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for network security management
  • Method and device for network security management
  • Method and device for network security management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0025] In this embodiment, the network security management method can be mainly applied to user security authentication. After receiving the online request message reported by the user, the access device can analyze the online request message, obtain the user ID (Identity, identity identification number) carried in the online request message, and then, from Determine the first object that matches the user ID in the verification information saved locally, determine the penalty value corresponding to the first object according to the cumulative counting result of the first object, and determine the penalty value corresponding to the first object according to the penalty value and the first object. Set the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security management method and device. The method comprises the following steps: analyzing a received online request message, and obtaining a user ID carried by the online request message; determining a first object matched with the user ID from locally saved authentication information; according to an accumulative counting result of the first object, determining a penalty value corresponding to the first object; and according to a comparison result of the penalty value and a first set threshold, determining whether to refuse the online request message or not. The method and device provided by the invention has the advantages that the business processing amount of an authentication server during the AAA authentication process is reduced, so that the pressure on the authentication server is lessened, and normal user authentication of the authentication server is guaranteed.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a network security management method and device. Background technique [0002] AAA (Authentication, Authorization, Accounting, Authentication, Authorization, Accounting) is a network security management mechanism that provides three security functions of authentication, authorization, and accounting. Among them, authentication: used to confirm the identity of the remote user accessing the network, and judge whether the visitor is a legitimate network user. Authorization: It is used to grant different permissions to different users and limit the services that users can use. For example, the administrator authorizes office users to access and print files in the server, while other temporary visitors do not have this permission. Billing: It is used to record all operations of users in the process of using network services, including the type of service used, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0892H04L63/10
Inventor 戴一凡
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products