Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security policy configuration method and device

A technology of security policy and configuration method, applied in the field of communication, can solve problems such as the inability to fully cover Web services and the vulnerability of Web servers to attacks

Inactive Publication Date: 2020-01-10
HANGZHOU DPTECH TECH
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the diversity and variability of IP addresses, domain names, and ports corresponding to web services, network administrators manually configure security policies for web services, which often cannot fully cover all web services, making web servers vulnerable to attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy configuration method and device
  • Security policy configuration method and device
  • Security policy configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0028] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security policy configuration method and device, which are applied to network security equipment. The method comprises steps of screening out a specific session adopting an HTTP by monitoring a session established between a terminal and a server; extracting an IP address, a port number and a domain name corresponding to the server in the specific session; and if the extracted IP address, the extracted port number and the extracted domain name are not recorded in a message feature set contained in a security policy of the server, adding the extracted IP address, the extracted port number and the extracted domain name into the message feature set. By means of the technical scheme, the message feature set contained in the security policy of the server can be automatically updated, it is guaranteed that the security policy covers all Web services, and comprehensive security protection is provided for the server.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a security policy configuration method and device. Background technique [0002] With the rapid development of network technology, it provides convenience to the society but also brings threats, and the security problem of Web server is one of them. The user enters the IP address, domain name or port corresponding to the Web service in the browser through the terminal device to communicate with the Web server, and the corresponding Web server uses the HTTP / HTTPS protocol to provide the terminal with online information browsing services. [0003] Network security devices are generally deployed at the front end of web servers, and security policies are configured for corresponding web servers to provide protection for web services. At present, the configuration of security policies often requires network administrators to collect the Web service information pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/20H04L67/02H04L67/141
Inventor 叶一聪吴庆王树太
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products