Unlock instant, AI-driven research and patent intelligence for your innovation.

Security resource selection implementation method and device

An implementation method and security technology, applied in the field of security resource selection implementation methods and devices, can solve problems such as inability to use resources and perform tasks efficiently, and fail to ensure reasonable utilization of resources and efficient execution of tasks

Active Publication Date: 2020-06-30
CHINA TELECOM CORP LTD
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing security resource selection is generally based on device resource polling, random selection, or resource current load conditions to select resources to perform orchestration tasks; Polling, random or based on load conditions are all directly selected in one stage, which cannot guarantee the reasonable utilization of resources and efficient execution of tasks
Even if the resource is selected based on the load, it is only calculated based on the resource load at the point in time when the resource is selected, which cannot achieve the purpose of using resources well and executing tasks efficiently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security resource selection implementation method and device
  • Security resource selection implementation method and device
  • Security resource selection implementation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0030] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0031] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way intended as any limitation of the disclosure, its application or uses.

[0032] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security resource selection implementation method and device, and relates to the field of software definition security. The method comprises the following steps: abstractly describing a security arrangement task to form a unified description information structure of the security arrangement task; based on the unified description information structure of the security orchestration task, screening security resources to determine a security resource preliminary screening list, and determining expected execution completion duration of the security orchestration task; andselecting the optimal security resource by utilizing a security resource selection quantization algorithm based on the predicted quantity of the tasks which are not completed in each security resourcein the security resource preliminary screening list and the expected execution completion duration of the security orchestration task so as to enable the optimal security resource to execute the security orchestration task. According to the invention, based on security orchestration task abstract description, security resource preliminary screening and security orchestration task expected completion duration, the optimal security resource can be selected, and efficient execution of security orchestration services and effective utilization of resources under a software-defined security architecture can be realized.

Description

technical field [0001] The present disclosure relates to the field of software-defined security, in particular to a method and device for implementing security resource selection. Background technique [0002] With the transformation of the traditional information system construction mode to a cloud-based computing framework model, the existing traditional information system network construction, information access, resource selection and other methods will also change. With the emergence of virtualization, cloud computing, and software-defined architecture, people have gradually built software-defined networks, software-defined data centers, and software-defined security systems. The emergence of a new technical system will inevitably bring about new software arrangement and management methods. [0003] In the software-defined security architecture, security services are effectively managed through intelligent and automated security service orchestration and management. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/50
CPCG06F9/505
Inventor 牛剑锋裘晓峰薄明霞唐维唐洪玉李天博张罡常巍邵振亚李玲晓张静
Owner CHINA TELECOM CORP LTD