A method and system for automate verification of remote system security rules

A technology of automatic verification and remote system, which is applied in the field of automatic verification method and system of remote system security rules, and can solve problems such as lack of security rules

Inactive Publication Date: 2018-12-18
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and system for automatic verification of remote system security rules, aiming to solve the lack of a method for verifying whether the security rules are effectively issued and effective in the prior art, and realize automatic acquisition of defense according to the operating system and defense level. Rules, and test against defense rules, so as to realize automatic verification of security rules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for automate verification of remote system security rules
  • A method and system for automate verification of remote system security rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to clearly illustrate the technical features of the present solution, the present invention will be described in detail below through specific implementation methods and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily lim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a remote system safety rule automatic verification method and system, comprising: S1, remotely login operating system, obtaining operating system type; S2, according to the typeof the operating system and the defense level of the current operating system, filtering the rules in the security rule base; S3, connecting the operating system remotely to obtain the type of the protection path; S4, according to different protection path types, setting corresponding authority verification methods; S5, reading the authorization value corresponding to the protection rule path, comparing the protection result with the actual protection result of the rule path, and if the protection error occurs, adding 1 to the error value; S6, continuously verifying until all the rules are verified, if the error value is 0, determining that all the protection rules are verified, otherwise, returning the number of the protection failure safety rules and the specific rule information. The invention realizes automatic obtaining of defense rules according to the operating system and the defense level, and testing of the defense rules, thereby realizing automatic verification of the security rules.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a remote system security rule automatic verification method and system. Background technique [0002] With the development of information technology, Web services have become an important carrier of the Internet industry, and the current hidden dangers of Web security are also emerging one after another. How to protect Web services from attacks has become a hot research topic in the security field. Traditional network security equipment such as firewall (Firewall), intrusion detection system (Intrusion Detection System, IDS), intrusion prevention system (Intrusion Prevention System, IPS), etc., are all based on packet filtering methods, the focus and depth of defense Each is different, and it is difficult to effectively protect web services based on the application level. [0003] Based on the consideration of information security, we will install corresponding prot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26H04L29/08
CPCH04L43/50H04L63/20H04L67/08
Inventor 潘燕燕
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products