Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security policy management method, device and equipment

A network security and policy management technology, applied in the field of network security policy management, can solve the problems of a single network distribution method and waste of broadband resources, and achieve the effect of reducing the waste of broadband resources and realizing network security policy settings

Pending Publication Date: 2022-08-02
天翼安全科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present application provides a network security policy management method, device and equipment, which are used to solve the problem that the current network security policy is single and the network shunt method wastes broadband resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security policy management method, device and equipment
  • Network security policy management method, device and equipment
  • Network security policy management method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0057] In a possible implementation manner, determining the first indicator data of the mapped network requirements corresponding to different terminals includes:

[0058] Determine the average network speed corresponding to the terminal according to the amount of data transmitted between the terminal and the network server and the transmission time;

[0059] The benchmark indicator data includes a benchmark network speed, and the benchmark network speed is determined according to a file transfer request sent by the terminal.

[0060] like image 3 As shown, the network transmission data monitoring includes the detection of the upload data volume and the upload time, and the download data volume and the download time monitoring.

[0061] For example, the amount of data transmitted between the terminal and the network server is 100M and the transmission time is 10s, then the average network speed corresponding to the terminal is 100 / 10=10M / s.

[0062] The determination of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security policy management method, a network security policy management device and network security policy management equipment, and belongs to the technical field of network security. Determining first index data of mapping network requirements corresponding to different terminals and second index data of mapping terminal network security levels; evaluating the obtained first index data of the terminal, and increasing the bandwidth allocated to the terminal when determining that the network requirement cannot be met according to the difference value between the first index data and the reference index data meeting the network requirement; according to the method, the obtained second index data of the terminal is evaluated, the network security level of the terminal is determined, network security protection of a corresponding strategy is carried out on the terminal, comprehensive service is provided for the network using process of each terminal, and waste of broadband resources is reduced.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a network security policy management method, apparatus and device. Background technique [0002] The network is a collection of global information resources. The network aims to exchange information resources with each other. It is based on some common protocols and is formed through many routers and the public Internet. It is a collection of information resources and resource sharing. With the increasing development, it has become an indispensable and important device in people's lives at present. The Internet is related to our clothing, food, housing, transportation and communication. Due to the complicated information on the Internet, some people use the Internet to conduct social security. Influential behavior, thus making cybersecurity even more important. [0003] Network security includes two parts: one is that the hardware, software and data in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L41/0896H04L41/5051
CPCH04L63/205H04L63/1416H04L41/0896H04L41/5051
Inventor 刘紫千李金伟常力元谢妮孙福兴佟欣哲陈林刘长波
Owner 天翼安全科技有限公司