Terminal strategy management and execution method and system

A technology of policy management and execution method, applied in the direction of digital data authentication, etc., can solve the problems of difficult reuse, low efficiency, limited scope of logical calculation, etc., to achieve the effect of preventing risks, high efficiency, and easy to ensure compliance

Active Publication Date: 2021-03-09
南京中孚信息技术有限公司
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The scope of logical calculation supported by the expression language is limited. If complex logic is still implemented through hard coding, there will be problems such as low efficiency and difficult reuse.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal strategy management and execution method and system
  • Terminal strategy management and execution method and system
  • Terminal strategy management and execution method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to further illustrate the various embodiments, the present invention provides accompanying drawings, which are part of the disclosure of the present invention, and are mainly used to illustrate the embodiments, and can be used in conjunction with the relevant descriptions in the specification to explain the operating principles of the embodiments, for reference Those of ordinary skill in the art should be able to understand other possible implementations and advantages of the present invention. The components in the figures are not drawn to scale, and similar component symbols are generally used to represent similar components.

[0053] According to an embodiment of the present invention, a terminal policy management and execution method and system are provided.

[0054] Now in conjunction with accompanying drawing and specific embodiment the present invention is further described, as Figure 1-9 As shown, the present invention encapsulates complex policy logic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal strategy management and execution method and system. The method comprises the following steps: completing preparation work of a strategy management unit; completingthe work of the strategy management unit by using a management method; verifying the work of the strategy management unit by using a verification method; and completing the authentication of the useridentity by using a decision-making method, matching the user identity with the strategy, and authorizing the asset access permission of the user if the matching is successful. The method and the system have the advantages that complex strategy logic is packaged into a template, configuration is achieved, logic multiplexing is supported, evaluation of the strategy effect is easy to complete, and compliance is easy to guarantee; the strategy expression can support a wide logic calculation range and is high in efficiency and easy to reuse; policy legality verification is added when a policy is newly added, modified and issued, so that risks brought to a terminal system by wrong policies are prevented; and meanwhile, the operation of the strategy is recorded, so that later query is facilitated.

Description

technical field [0001] The present invention relates to the field of terminal security, in particular to a terminal policy management and execution method and system. Background technique [0002] With the advent of the era of big data, data security and sensitive information issues are increasingly valued by individuals, enterprises and even countries. There are more and more detection methods for data security and system security, and security audit methods such as identity authentication, authorization, access control, auditing, and asset protection are widely used. Policy rules are used in the security audit process. [0003] Currently, policy configuration and management in most systems is done manually, or directly coded into the system. With the continuous expansion of network and terminal scale and frequent changes of services, the complexity of scenarios and policy logic is further increased. The number of policy rules is increasing day by day, the effect evaluat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/31
CPCG06F21/45G06F21/31
Inventor 殷博潘飚曲志峰
Owner 南京中孚信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products