Unlock instant, AI-driven research and patent intelligence for your innovation.

Firewall opening verification method, electronic device, computer equipment and storage medium

A verification method and firewall technology, which is applied in the field of information security, can solve problems such as verification failure, prolonged network connection period, and destination service failure, and achieve the effects of shortening the cycle, improving the efficiency of opening the wall, and increasing the probability of network connection

Pending Publication Date: 2020-08-25
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. The process needs to be approved before it can be processed
[0008] 1. Labor cost: This type of network connection operation is usually processed at night. If the network connection needs to be completed on the same day, the operation and maintenance personnel need to be on duty at night until the network administrator completes the processing, and then verifies until it passes
[0009] 2. Time cost: It may be due to the failure of the route or the failure of the destination service to start normally, resulting in verification failure, and then repeated communication, or even need to go through another process of adding routes or other processes, resulting in a longer network connection cycle

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall opening verification method, electronic device, computer equipment and storage medium
  • Firewall opening verification method, electronic device, computer equipment and storage medium
  • Firewall opening verification method, electronic device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention is further illustrated below by means of examples, but the present invention is not limited to the scope of the examples.

[0051] Firstly, the present invention proposes a firewall opening verification method.

[0052] In the first embodiment, if figure 1 As shown, the firewall opening verification method includes the following steps:

[0053] Step 1. The requester sends a task invocation request to the responder;

[0054] The first module of a certain software system and the network connection application program are installed on the requesting end, and the second module of a certain software system and the network connection program are installed on the responding end. When the requesting end uses the first module to perform tasks, it can A task invocation request is sent to the second module at the response end. The task call between the requester and the responder may also include mutual calls between different systems.

[0055] Step 2, ju...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, and discloses a firewall opening verification method and device, computer equipment and a storage medium. The method comprises the steps of:judging whether a request end and a response end are in a network connection state or not, and if not, sending a network connection request to a management end by the request end; judging whether therequest end meets a dependency item or not, and if so, acquiring network information of the request end and the response end by the management end; and enabling the management end to generate a corresponding firewall policy according to the acquired network information of the request end and the response end, and configuring the firewall policy to a corresponding firewall. According to the invention, by setting dependency check judgment before network connection, the probability of network connection is improved, the probability of verification alleviation failure is reduced, and the processperiod of wall opening is automatically shortened through dependency check and strategy issuing verification process. In addition, the invention also relates to a blockchain technology, and the network information of the request end and the response end can be stored in the blockchain.

Description

technical field [0001] The invention relates to the field of information security, and relates to a verification method for opening a firewall, an electronic device, computer equipment and a storage medium. Background technique [0002] At present, large Internet companies, in order to ensure the security and stability of the IT network environment, the network architecture will adopt an isolated network; however, the mutual calls between different modules of a software system, or the mutual calls between different systems, require Across different network segments, there will be a lot of demand for network connectivity. The general process of opening up the network is as follows: [0003] 1. According to the company's IT operation specifications, the operation and maintenance personnel initiate the process of applying to open the network. The process content must include source ip (caller), destination ip (callee), destination port, TCP or UDP protocol. [0004] 2. The pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0263H04L63/20
Inventor 程涛
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN