Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security service method and system and security resource unit

A resource unit and security service technology, applied in the field of information security, can solve problems such as bottlenecks, limit security processing performance, affect security processing efficiency, etc., and achieve the effect of improving efficiency

Active Publication Date: 2020-12-18
CHINA TELECOM CORP LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can dynamically adjust the configuration of security objects and security resource units, but because policy routing is too detailed, the efficiency of control and forwarding is not high. Using this method, nodes implementing policy routing will become a performance bottleneck that limits security processing , will also affect the efficiency of security processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security service method and system and security resource unit
  • Security service method and system and security resource unit
  • Security service method and system and security resource unit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0024] The application scenarios of the present invention can be as figure 1 shown. In the present invention, the security objects 12 are grouped according to their service types or other indicators, and each group is a logical network group 10, and each logical network group 10 is identified by a d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security service method, a system and a security resource unit and relates to the field of information security. Security objects and security resource units served for the security objects are divided by adopting a logical network group. Meanwhile, for a data packet which enters the logical network group, whether the data packet needs to be processed or not according tothe judgment on whether a logical tag in the data packet is consistent with the logical group tag of the logical network group or not. As a result, the data of only a target logical network group areprocessed, so that the security processing efficiency is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a security service method and system and a security resource unit. Background technique [0002] A security resource pool is a collection of various security devices and systems involved in network services. Each security device and system in a resource pool is called a security resource unit. [0003] The traditional security resource unit pool does not provide differentiated services for different security objects. Each individual security device or system integrates the security policies of all security objects, and processes them sequentially in a unified process. This method needs to put forward very high requirements on the processing performance of single-point resources in the resource pool, so the construction cost is also high. [0004] The cloud security resource pool can perform different security processing on different security objects by means of differentiate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0233H04L41/0893H04L63/20
Inventor 樊宁何明沈军金华敏
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products