Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic network isolation method and device, storage medium and terminal equipment

A dynamic network and network technology, applied in the field of network security, can solve the problems of centralized identity management traffic pressure increase, usability hidden dangers, and difficulty in implementation

Pending Publication Date: 2022-04-08
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing network isolation scheme, the traditional static network isolation method can only construct an isolated network in units of computers or virtual instances, and it is difficult to implement east-west traffic in the same network due to the high cost of isolation, so it cannot effectively prevent threats lateral diffusion
However, with the rapid growth of the number of assets on the enterprise cloud, the traffic pressure of centralized identity management increases significantly, which will bring hidden dangers to availability; in addition, although distributed identity management guarantees availability, it also increases security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic network isolation method and device, storage medium and terminal equipment
  • Dynamic network isolation method and device, storage medium and terminal equipment
  • Dynamic network isolation method and device, storage medium and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0056]Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, in particular to a dynamic network isolation method, a dynamic network isolation device, a storage medium and terminal equipment. The method comprises the following steps: receiving a data processing request of a sending end; wherein the data processing request comprises a sending end identity identifier and a target end identity identifier; performing identity verification on the sending end identity identifier and the target identity identifier by using a block chain; when the identity verification is passed, receiving an operation instruction of a sending end, and analyzing the operation instruction to obtain a network node sequence table; and performing path planning based on the network node sequence table to obtain a routing table, and establishing a tunnel network between a receiving end and a target end according to the routing table. According to the invention, dynamic isolation of the network can be realized.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and in particular to a dynamic network isolation method, a dynamic network isolation device, a storage medium and a terminal device. Background technique [0002] In the existing network isolation scheme, the traditional static network isolation method can only construct an isolated network in units of computers or virtual instances, and it is difficult to implement east-west traffic in the same network due to the high cost of isolation, so it cannot effectively prevent threats Horizontal spread. However, as the number of assets on the enterprise cloud grows rapidly, the traffic pressure of centralized identity management increases significantly, which will bring hidden dangers to availability; in addition, although distributed identity management guarantees availability, it also increases security risks. [0003] Therefore, there is an urgent need to provide an effective netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L12/46
Inventor 余航金华敏王帅邓晓东张昊迪
Owner CHINA TELECOM CORP LTD