Security Policy Update Method and System

A security policy and update method technology, applied in the Internet field, can solve problems such as the failure of normal communication between the client and the server, inconsistencies, etc., to achieve the effect of avoiding normal communication and improving efficiency

Active Publication Date: 2019-04-19
唯品会(广州)软件有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a security policy update method and system, aiming to solve the problem that the client and the server cannot communicate normally in a short period of time due to the inconsistency of the time when the security policy is activated by the client and the server when updating the security policy question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Policy Update Method and System
  • Security Policy Update Method and System
  • Security Policy Update Method and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] The invention provides a security policy update method.

[0054] refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the security policy update method of the present invention.

[0055] In this embodiment, the security policy update method includes:

[0056] Step S10, the first client monitors in real time whether there is security policy update information in the corresponding ZooKeeper node;

[0057] Among them, ZooKeeper is a distributed, open-source distributed application coordination service. ZooKeeper nodes have a life cycle. In ZooKeeper, ZooKeeper nodes can be divided into persistent nodes, temporary nodes, and timing nodes according to node types.

[0058] In this embodiment, the first client monitors the ZooKeeper node under the domain to which the first client belon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security policy updating method comprising the following steps: a first client monitors a corresponding a ZooKeeper node in real time to determine whether there is security policy update information in the ZooKeeper node; when monitoring that there is security policy update information in the ZooKeeper node, the first client acquires a security policy corresponding to the security policy update information; and when monitoring that the time interval after the time point of the security policy update information is greater than a preset length, the first client switches a current security policy to the acquired security policy. The invention further discloses a security policy updating device. According to the invention, a security policy can be delayed taking effect, and the problem that a client and a server cannot communicate normally in a short period of time is solved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and system for updating a security policy. Background technique [0002] With the continuous development of Internet technology and the rapid increase of network information, the number of servers has increased year by year, making the application of distributed cluster systems more and more extensive. A distributed cluster system is a storage system based on a distributed node architecture. The system distributes loads including clients and servers through multiple nodes to maximize high performance. [0003] At present, the distributed cluster system uses a security policy to ensure the security of communication between the client and the server. To ensure the security of the security policy, it is necessary to update the security policy of the distributed cluster system in time. [0004] However, when updating the security policy in a distributed cluster, due to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/205
Inventor 韩国忠宋威张学诚刘璟宇王军伟何涛余倩
Owner 唯品会(广州)软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products