Safety strategy adapting frame and method thereof

A security policy and strategy technology, applied in the field of information security, can solve the problem of not meeting the requirements of policy management, and achieve the effect of strong versatility

Active Publication Date: 2017-06-13
北京爱普安信息技术有限公司
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are relatively few domestic researches in this area, and there are more or less flaws, which cannot meet the existing strategic management requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety strategy adapting frame and method thereof
  • Safety strategy adapting frame and method thereof
  • Safety strategy adapting frame and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] refer to figure 1 , figure 1 It is a flow chart of a security policy adaptation method provided by the embodiment of the present invention. Such as figure 1 As shown, the method of the embodiment of the present invention comprises the following steps:

[0033] Step S1: pre-store the security information of the target object and the security information of policy conversion.

[0034] Among them, the security information of the target object includes the device type of the target object, the system software in the target object, the type of business software and system patch information, the possible vulnerabilities and security risks of the target object, the deployed security policies in the target object, and the target object safety requirements.

[0035] Wherein, the device type includes a host type, a network type, and a security type. System software includes operating systems, databases, and middleware. Security requirements include class protection requirem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a safety strategy adapting frame and a method thereof. The method comprises the steps that safety information of a target object and safety information of strategy transformation are prestored; the target object is scanned to obtain the safety information of the target object; morphological and grammatical analysis is conducted on an original strategy of the target object, semantic translation of the strategy is performed, and the strategy obtained after semantic translation of the strategy is further transformed into an executable safety strategy rule suitable for multiple target objects by adopting a strategy packaging technique of safety information based on the safety strategy; according to the safety information of the target object, the executable safety strategy rule suitable for the target objects is issued to the target object for execution. In the mode, a general safety strategy described by using a natural language can be converted into the executable safety strategy rule suitable for the target objects, and the method has high universality and supports centralized and unified management of safety strategies of multiple heterogeneous safety devices.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular, relate to a security policy adaptation framework and a method thereof. Background technique [0002] With the advent of the era of cloud computing and big data, cloud computing and big data security issues have gradually become the main problems to be solved in modern information security. One of the effective ways to solve the security problems of cloud computing and big data is security management, and security policy management is an important means to realize security management, it is the core of security management, through the centralized configuration and management of security policies, the system Efficient management of safety mechanisms such as safety equipment, etc., to improve the operating efficiency of the system and safety equipment. [0003] However, the status quo of security policy management is that in a large-scale di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/105H04L63/205
Inventor 李清玉
Owner 北京爱普安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products