Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

55 results about "Configuration Issue" patented technology

Method and apparatus for managing a firewall

A method and apparatus are disclosed for managing a firewall. The disclosed firewall manager facilitates the generation of a security policy for a particular network environment, and automatically generates the firewall-specific configuration files from the security policy simultaneously for multiple gateways. The security policy is separated from the vendor-specific rule syntax and semantics and from the actual network topology. Thus, the security administrator can focus on designing an appropriate policy without worrying about firewall rule complexity, rule ordering, and other low-level configuration issues. In addition, the administrator can maintain a consistent policy in the presence of intranet topology changes. The disclosed firewall manager utilizes a model definition language (MDL) and an associated parser to produce an entity relationship model. A model compiler translates the entity-relationship model into the appropriate firewall configuration files. The entity-relationship model provides a framework for representing both the firewall-independent security policy, and the network topology. The security policy is expressed in terms of “roles,” which are used to define network capabilities of sending and receiving services. A role may be assumed by different hosts or host-groups in the network. A visualization and debugging tool is provided to transform the firewall-specific configuration files into a graphical representation of the current policy on the actual topology, allowing the viability of a chosen policy to be evaluated. A role-group may be closed to prevent the inheritance of roles.
Owner:LUCENT TECH INC

Method for measuring reference signal between UE (user equipment) and base station and base station

The embodiment of the invention provides a method for measuring a reference signal between UE (user equipment) and a base station and the base station. The method is applied to the base station and comprises the following steps: receiving a first measurement report reported by a first measurement configuration issued by the UE on the basis of the base station; when a distance between the position of the UE and an adjacent cell is determined to be smaller than a first distance threshold value according to the first measurement report, sending a second measurement configuration to the UE to indicate the UE to measure a reference signal of the adjacent cell according to an appointed second measurement period in the second measurement configuration, wherein the second measurement period is shorter than a corresponding first measurement period in the first measurement configuration; and receiving a measurement result which is acquired and encapsulated in a second measurement report by the UE after the adjacent cell is measured according to the second measurement period. In a moving process of the UE, after the second measurement configuration from the base station is received, the adjacent cell is measured in the second measurement period, and a more precise result is reported to the base station, so that the base station can be used for carrying out accurate switching between cells for the UE.
Owner:ZTE CORP

Method and apparatus for managing a firewall

A method and apparatus are disclosed for managing a firewall. The disclosed firewall manager facilitates the generation of a security policy for a particular network environment, and automatically generates the firewall-specific configuration files from the security policy simultaneously for multiple gateways. The security policy is separated from the vendor-specific rule syntax and semantics and from the actual network topology. Thus, the security administrator can focus on designing an appropriate policy without worrying about firewall rule complexity, rule ordering, and other low-level configuration issues. In addition, the administrator can maintain a consistent policy in the presence of intranet topology changes. The disclosed firewall manager utilizes a model definition language (MDL) and an associated parser to produce an entity relationship model. A model compiler translates the entity-relationship model into the appropriate firewall configuration files. The entity-relationship model provides a framework for representing both the firewall-independent security policy, and the network topology. The security policy is expressed in terms of “roles,” which are used to define network capabilities of sending and receiving services. A role may be assumed by different hosts or host-groups in the network. A visualization and debugging tool is provided to transform the firewall-specific configuration files into a graphical representation of the current policy on the actual topology, allowing the viability of a chosen policy to be evaluated. A role-group may be closed to prevent the inheritance of roles.
Owner:BARTAL YAIR +2

Method for realizing configuration synchronization of network elements and webmaster

ActiveCN102231679AQuickly locate configuration differencesSync configurationData switching networksConfiguration itemNetwork packet
The invention discloses a method for realizing the configuration synchronization of network elements and a webmaster, and the method comprises the following steps: A. carrying out unique identification on each configuration of the network elements in a command ID (identifier) mode, loading a configuration item marked with a command ID into each network element, configuring a serial number for each command ID, and storing the configuration information of each network element in a master control disk reference table; B. when the network elements initiate the synchronization to the webmaster or the webmaster initiates the synchronization to the network elements, comparing the configuration item of each network element which is stored in the database of the webmaster and the master control disk reference table, adding the different configuration items in the comparison result into a configuration issuing sequence, and preparing the configuration of the data; and C. sending and receiving synchronization data packets in subpackage and compression package modes. The method disclosed by the invention can be used for reliably and effectively realizing the configuration synchronization of the network elements and the webmaster in a time saving mode.
Owner:FENGHUO COMM SCI & TECH CO LTD

Method, system and equipment for managing multi-IDC (internet data center) cluster configuration file

The invention discloses a method, a system and equipment for managing a multi-IDC (internet data center) cluster configuration file. The method comprises the steps that according to the logo of the IDC cluster carried by a configuration updating request, the IP (internet protocol) address of one online server in the IDC cluster and the name of a configuration file, a supervisor acquires a corresponding configuration file as the copy of the configuration file to locally store the copy from the corresponding online server in the corresponding IDC cluster and displays configuration parameters in the copy of the configuration file by a configuration interface; after a configuration submit request is received, the corresponding configuration parameters in the copy of the configuration file are updated according to the configuration parameters modified through the configuration interface by a user; after a configuration issuing request is received, the copy of the configuration file is issued to each online server in the IDC cluster or is issued to each online server in each IDC cluster. Therefore, the management on the configuration file of multiple IDC clusters is realized by a simple logic, the management is more convenient and the stability of the online servers is higher.
Owner:新浪技术(中国)有限公司

Method for configuring network equipment by SDN controller and SDN controller

The invention provides a method for configuring network equipment by an SDN controller and the SDN controller, the method comprises steps of enabling a user service module of the SDN controller to determine a service type ID, a service entity ID, a configuration interface and configuration parameters according to service requirements; issuing a first request message to an equipment configuration module corresponding to the configuration interface, determining a configuration ID, an equipment configuration service ID and a configuration template by the equipment configuration module according to the received first request message, and issuing a second request message; enabling the configuration issuing module to receive the second request message and issue configuration information to the corresponding network equipment; after the configuration information is successfully issued, when a configuration list matched with the index information is found in a configuration queue of the network equipment, updating the configuration list by applying the configuration information. The mode of updating the configuration queue ensures that the same service in the configuration queue only stores the latest configuration information, avoids the problem that the network equipment repeatedly configures the same service, and improves the recovery efficiency of the service.
Owner:NEW H3C TECH CO LTD

Controlling access to information over a multiband network

A method and apparatus for controlling access to information over a network. Information and video/audio streams are transmitted across a network by a head end to a member space manager or set-top box where the information may be utilized or viewed. The frequency that a given stream of information is transmitted on is rotated or switched based on a switching algorithm. For example, a given stream (e.g., a motion picture on a pay-per-view station) may be transmitted on one frequency for a specified time interval, then switched to another frequency for a specified time interval, etc. To enable the member space manager to determine which frequency a given stream of information is transmitted on at a particular point in time, switching software may be provided by the head end server to the member space manager. Switching software may be encrypted prior to transmission to the member space manager. According to one or more embodiments of the invention, the stream-to-frequency mapping is determined, the mapping is transmitted to the member space manager where it is installed and executed, the stream of information is transmitted on varying frequencies to the member space manager, and the member space manager tunes into the appropriate frequency to receive and utilize a continuous stream of information. By transmitting information in this manner, all encryption, frequency/channel switching, configuration issues, etc. are transparent to the end user who merely has to select a virtual channel to view.
Owner:ORACLE INT CORP

Cloud configuration method and system based on proxy service

The invention discloses a cloud configuration method and a system based on proxy service, and the method comprises the steps that a server terminal maintains long-connection communication with a configuration management background through a first application program, and the configuration management background sends a configuration instruction to a server; a target machine receives the configuration instruction, creates, modifies or deletes a first configuration file in the target machine through a second application program according to the configuration instruction, or starts and stops a third application program in the target machine; and the target machine feeds back the operation state to the server terminal. The cloud configuration method based on the proxy server provided by the invention has the following advantages: centralized management: all configuration information can be subjected to centralized management in a configuration center management background, and can also be managed according to role permission, so that the operation is very convenient. Configuration is flexible, the configured content can be published according to a specified version and can also be published to a specific machine in a specified mode, and the whole configuration issuing operation is very flexible.
Owner:车轮互联科技(上海)股份有限公司

Method for automatic authentication and configuration issue of cable bridge terminal with utilization of BOSS system

The invention relates to a method for automatic authentication and configuration issue of a cable bridge terminal with utilization of a BOSS system. The method comprises the following steps that: a power supply starting signal of a cable bridge terminal triggers a cable bridge switch that is connected with the cable bridge terminal; according to a simple network management protocol (SNMP), the cable bridge switch converts a mode of a power-on event of the cable bridge terminal into an SNMP Trap mode and then the converted Trap information is sent to a management terminal of EMC network management; after the management terminal of the EMC network management receives the Trap information, a Trap processing flow is entered; and according to an open network computing remote procedure call (ONC RPC) procotol, unauthorized Trap information of the cable bridge terminal is converted into an authentication request and the converted request is sent to the BOSS system; the BOSS system returns whether the authentication is legal or not and correlated configuration information; and according to the returned information, the management terminal of the EMC network management determines whether the authentication of the cable bridge terminal is legal or not; if so, the configuration information of the cable bridge terminal is feedbacked to the cable bridge switch, so that corresponded configuration is carried out on the cable bridge terminal; and therefore, automatic authentication and configuration issue on the cable bridge terminal are realized.
Owner:SHANGHAI BROADBAND TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products