Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Flow security processing method and security virtualization system

A virtualization system and security processing technology, which is applied in the field of traffic security processing methods and security virtualization systems, can solve the problems of insufficient processing capacity of security products, excess processing resources, waste, etc., and achieve the effect of avoiding insufficient processing capacity

Active Publication Date: 2020-03-03
BEIJING VENUS INFORMATION SECURITY TECH +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a traffic security processing method and a security virtualization system to overcome the insufficient processing capability of security products or processing The problem of wasting resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow security processing method and security virtualization system
  • Flow security processing method and security virtualization system
  • Flow security processing method and security virtualization system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] Please refer to the attached figure 1 , which is a flow chart of the traffic security processing method disclosed in the present invention, such as figure 1 As shown, the traffic security processing method may include:

[0050] Step 101: The intelligent management layer obtains the network information collected by the flow management layer and the operation data of the virtual security product collected by the virtual security product management layer....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a flow safe processing method and a safe virtualization system. An intelligent managing layer automatically adjusts the number of virtual safe products by collecting and obtaining network information and virtual safe product running parameters to adapt to the specific safe demand of a user. When changes occur in network flow, the intelligent managing layer adjusts the number of the virtual safe products according to a set rule to adjust the safe processing capability so as to adapt to the current need for network flow safe processing. According to the flow safe processing method and the safe virtualization system, a traditional hardware safe product of which the safe processing capability is indurated is converted into a virtual safe product of which the safe processing capability is variable according to the elasticity of demands, thus the flow safe processing method and a safe virtualization system cater to actual needs of the user, and the problem that the processing capability of the safe product is insufficient or a processing resource is redundant and thus wasted is avoided.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically, relates to a flow security processing method and a security virtualization system. Background technique [0002] With the rapid development of the Internet and information technology, users' demand for network security is getting higher and higher, and various network security products have been developed and applied to users' daily network work and network life. [0003] In the traditional IT network architecture, after the security product is deployed and launched, the security processing capability of the security product is fixed. However, the data traffic generated by users using the Internet is constantly changing with time. When the network data traffic is large, the security processing capabilities of security products are insufficient. When the network data traffic is small, security products will have security processing Situations where reso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0263H04L63/1408H04L63/205
Inventor 杨松松杨聪毅文光轶张志博
Owner BEIJING VENUS INFORMATION SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products