Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for defining, developing and executing a security service

A technology of security business and execution method, which is applied in the directions of inter-program communication, program control design, internal/peripheral computer component protection, etc., to achieve the effects of improving modularization ability, development efficiency, and development efficiency

Inactive Publication Date: 2020-12-01
南京中孚信息技术有限公司 +3
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the rapid development of information technology, the problem of information security has gradually become prominent. Behaviors such as network attacks, illegal intrusions, and virus Trojan horses are on the rise every year, which also poses increasingly strong challenges to security companies.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for defining, developing and executing a security service
  • Method and system for defining, developing and executing a security service
  • Method and system for defining, developing and executing a security service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to further illustrate the various embodiments, the present invention provides accompanying drawings, which are part of the disclosure of the present invention, and are mainly used to illustrate the embodiments, and can be used in conjunction with the relevant descriptions in the specification to explain the operating principles of the embodiments, for reference Those of ordinary skill in the art should be able to understand other possible implementations and advantages of the present invention. The components in the figures are not drawn to scale, and similar component symbols are generally used to represent similar components.

[0050] According to the embodiment of the present invention, a method and system for defining, developing and executing a security service are provided.

[0051] Now in conjunction with accompanying drawing and specific embodiment the present invention is further described, as figure 1 As shown, according to the method for defining, de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for defining, developing and executing a security service. The method comprises the following steps of: configuring a service generation environment and aservice execution environment; in the service generation environment, adopting a preset rule to realize arrangement of the service; after the service orchestration is finished, realizing the generation of the service by utilizing the service generation environment to obtain a service definition file; transmitting the service definition file to the service execution environment through a preset service management program, loading the service definition file by utilizing the service execution environment, and monitoring the service execution environment. The service execution environment selects a service for triggering according to a preset method; and the service execution environment analyzes the service trigger event, extracts the event type and the event content, and processes the service trigger event according to the service processing logic set in the service generation environment. The method has the beneficial effects that the security service is divided into two parts, namelythe platform and the service, wherein the platform mainly provides a universal function, and the service is developed according to specific service requirements.

Description

technical field [0001] The present invention relates to the technical field of security services, in particular to a method and system for defining, developing and executing security services. Background technique [0002] Information Technology (Information Technology, abbreviated as IT) is a general term for various technologies mainly used to manage and process information. Information technology is playing an increasingly important role in the country's politics, economy, culture and other fields. However, with the rapid development of information technology, the problem of information security has gradually become prominent. Behaviors such as network attacks, illegal intrusions, and virus Trojan horses are on the rise every year, which also poses more and more challenges to security companies. At present, the mainstream security business development is still closed-door development for specific targets. Protection programs need to be developed for protection-type busi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/20G06F8/10G06F8/36G06F9/54G06F11/30G06F21/71
CPCG06F8/10G06F8/24G06F8/36G06F9/542G06F11/302G06F11/3051G06F21/71
Inventor 曲志峰殷博袁春峰潘飚
Owner 南京中孚信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products