Security policy version generation method
A technology of security policy and version, which is applied in the field of computer technology and information security, can solve the problems of poor security of security policy and low level of anti-cracking difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] The present invention will be further described below in conjunction with the examples, but the protection scope of the present invention is not limited to the following specific examples.
[0023] This embodiment provides a method for generating a security policy version, the method including:
[0024] The security policy version is composed of multiple security policy rules, and the security policy rules are composed of algorithms, keys, and policy identifiers;
[0025] It should be noted that the plurality of security policy rules may be three or more security policy rules, and each of the security policy rules may be formed using a different algorithm; although the algorithm is a known algorithm, However, because the algorithm selected in this embodiment is not fixed, it increases the difficulty of being cracked.
[0026] The security policy version is divided into a security policy initial version and a security policy usage version;
[0027] The usage version of...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com