Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Heterogeneous security mechanism oriented centralized management and control system

A centralized control and security mechanism technology, applied in the field of network security, can solve problems such as scattered security information, security risks, and difficulty in maintaining consistent security policies, and achieve the effect of unified security policies

Active Publication Date: 2018-02-23
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method will lead to scattered security information and incompatibility with each other, making it difficult to maintain consistent security policies, resulting in many security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous security mechanism oriented centralized management and control system
  • Heterogeneous security mechanism oriented centralized management and control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0020] This example distributes security protection policies to various security devices by building a centralized management and control platform, so that all types of security devices have consistent access control policies throughout the process, so that the security policies of the entire system are unified.

[0021] see figure 1 , which shows the frame diagram of the heterogeneous security mechanism-oriented centralized management and control platform constructed according to this example. As can be seen from the figure, the centralized management and control platform 100 is mainly composed of a registration authentication module 110 , a policy extraction module 120 , a policy association module 130 , and a unified interface and fusion conv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a heterogeneous security mechanism oriented centralized management and control system. The system is composed of a registration authentication module, a policy extraction module, a policy correlation module and a uniform interface and fusion conversion module. According to the centralized control scheme, through establishment of an effective and secure system, the securityof user configuration is ensured in a resource access process; security policies of the whole system are uniform; and security mechanisms of different secure devices are uniformly managed and controlled.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a technology for realizing centralized management and control for heterogeneous security mechanisms. Background technique [0002] The centralized management technology summarizes, filters, collects and correlates a large number of single events in different locations and different systems, obtains a global perspective of risk events, and forms a unified decision to respond to and process the events. [0003] In computer information systems, the traditional security management method is to manage different types of security protection systems that are deployed separately. This method will lead to scattered security information and incompatibility with each other, and it is difficult to maintain consistent security policies, resulting in many security risks. [0004] It can be seen from this that it is an urgent technical problem in this field to centrally manage each se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/205H04L67/025H04L67/30
Inventor 李明陶源
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products