A tag-based policy configuration method and device

A policy configuration and label technology, applied in the field of network security, can solve the problem of inflexible policy management and achieve the effect of improving flexibility and efficiency

Active Publication Date: 2022-02-01
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a tag-based policy configuration method and device to solve the problem of inflexible policy management in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A tag-based policy configuration method and device
  • A tag-based policy configuration method and device
  • A tag-based policy configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0045] Prior to this application, the strategies required for different services of the terminal are different, therefore, it is necessary to dynamically adjust the strategy according to the current service situation of the terminal in real time. Among them, a policy refers to a set of rules for all related activities in a certain area. Policy management refers to the formulation, adjustment, and adaptation of the above rules. There are mostly two existing policy management methods, one is a terminal-based policy management method, and the other is a group-based policy management method.

[0046] figure 1 A schematic diagram of a terminal-based policy management method provided for the comparative embodiment, such as figure 1 As shown in , the modified policy is modified on the basis of the bound...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a tag-based policy configuration method and device. The method includes: obtaining the initial strategy corresponding to each terminal in the network, and the label currently used by each terminal; the initial strategy includes a plurality of policy modules, and each policy module defines the rules for the terminal to perform one or more operations; the label is used to Characterize the attribute information of the corresponding terminal; acquire a dynamic strategy, the dynamic strategy includes at least one sub-dynamic strategy, and each sub-dynamic strategy includes at least one dynamic strategy module; for each terminal, select from the dynamic strategy according to the label it currently uses The target sub-dynamic policy, and using the dynamic policy module corresponding to the target sub-dynamic policy to update the corresponding policy module in the initial policy of the terminal to obtain the target policy. The present application can not only realize flexible configuration of terminal policies with different labels, but also realize batch configuration of terminal policies with the same label, which improves the flexibility of policy configuration.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a tag-based policy configuration method and device. Background technique [0002] In the field of terminal security, policy formulation and management are important modules of terminal security. The new generation of terminal security emphasizes intelligence-driven and active defense, that is, through mining relevant terminal information, performing weak point analysis, strengthening policy configuration, and completing active defense. It can be seen that policy configuration management is an important part of terminal security. [0003] The general process of policy configuration management is: initialize a complete policy according to certain experience, distribute the policy to the corresponding terminals, adjust the policy if there is a need to adjust the policy, and update the corresponding terminal. In the above process, the policy finally used by the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/0803
CPCH04L63/20H04L63/0807H04L41/0803
Inventor 邓程
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products