Rule description method and construction method for network access control and medium
A network access control and rule technology, applied in the field of network security, can solve problems such as unfavorable maintenance and affecting the efficiency of rule execution, and achieve the effect of convenient modification and improved rule expression ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The rule description method of the present invention will be described in detail below in conjunction with examples.
[0028] The construction of the access control rule of the present invention comprises the following three steps:
[0029] (1) Construct the characteristics of network access behaviors, that is, the conditions to be met for the implementation of access control rules.
[0030] a) If the existing group configuration is reused, record the group configuration ID. Otherwise, create a new group configuration and assign a unique group configuration ID.
[0031] b) Add domain configuration within the group configuration. For each piece of domain configuration it contains, assign a domain configuration ID, and store the relationship between the domain configuration ID and the group configuration ID it belongs to. After that, determine the matching location and matching content of the domain configuration
[0032] c) Record the group configuration ID.
[0033...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com