Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

105 results about "Security policy management" patented technology

A security policy management program is associated with the management of security policies within an environment. The goal of this program is to keep security policies updated, relevant, and standardized within an environment. The following elements and processes are generally associated with security policy management.

Method and device for migrating virtual machine safety policy

ActiveCN102739645AEliminate manual configuration operationsProgram controlData switching networksManagement unitData center
The invention discloses a virtual machine safety policy migrating device which is applied in a safety management server in a data center and comprises a migration sensing unit, a positioning unit and a safety policy management unit, wherein the migration sensing unit is used for receiving a virtual machine migration report from a virtual machine management device; the report contains location parameters of the virtual machine; the positioning unit is used for determining an original safety device to which the virtual machine belongs before the migration according to the location parameters of the virtual machine, and a new safety device to which the virtual machine belongs after the migration; the safety policy management unit is used for obtaining the safety policy of the virtual machine configured on the original safety device, and transmitting the safety policy to the new safety device. By utilizing the virtual machine safety policy migrating device, the automatic seamless migration of the safety policy of the safety device on the virtual machine along with the migration of the virtual migration is realized; and the manual configuration operation of a manager on the safety device because of the migration of the virtual machine is avoided, which means a lot for a large data center in which the virtual machine migrates often.
Owner:NEW H3C TECH CO LTD

Electronic document safety management system and method

ActiveCN103530570AGuaranteed security controlImprove offline securityDigital data protectionElectronic documentOperational system
The invention discloses an electronic document safety management system and method. The electronic document safety management system comprises a driving layer transparent encryption and decryption module, an application layer safety control and transparent encryption and decryption module, an intelligent file and process characteristic identification module, a file outside issuing off-line control module, a file screen watermark and printing watermark control module, a safety strategy management module and a secret key management module. The core technology of the system is managed in the driver of a client terminal, is operated in the core of the Windows operating system, and is called by an I/O manager to meet the demand of a file system. A data encryption platform of the system will take over the file system of the whole Windows operating system, and is responsible for providing the transparent encryption and decryption data services for the file system in real time. According to the electronic document safety management system and method, due to the fact that the electronic file safety protection measures are improved and the transparent encryption and decryption methods are imported, the off-line high safety and user friendliness of the electronic files are achieved.
Owner:STATE GRID CORP OF CHINA +1

Method and system for trusted control of operating environment of Android intelligent terminal

The invention relates to a method and a system for trusted control of an operating environment of an Android intelligent terminal. After the Android OS (operating system) of the Android terminal is safety started up, the trusted startup of an Android Dalvik application is conducted, the Android terminal monitors whether the geographical location of the terminal is in a preset sensitive area or not in real time, the Android terminal reports the integrity information of the Android Dalvik application to a monitoring center, the monitoring center sequentially verifies the integrity information of the application according to the security strategies of a security strategy management module, a verification result is fed back to the terminal through the integrity information collection module of the Android terminal, and the terminal executes corresponding operation according to the verification result and then again verifies whether the integrity information of the application is secure or not. By conducting remote control and application program management to a mobile terminal in the sensitive area and cutting off the addressing capability of the terminal, confidential information is prevented from being stolen and diffused.
Owner:HUAWEI TECH CO LTD +1

Distributed network security control method of public cloud service

InactiveCN102045353AGuaranteed query performanceOccupancy is minimizedTransmissionSecurity policy managementClient state
The invention discloses a distributed network security control method of a public cloud service, belonging to the technical field of information. The method comprises the following steps of: receiving the authentication information of a user by a cloud security gateway, and after the user passes the authentication, inquiring a local client state on-line table by the cloud security gateway to generate a security policy; if the security policy of the user does not exist in the local client state on-line table, sending a client security apply to a security control center by the cloud security gateway; generating the security policy of the user by the security control center and then sending the security policy of the user to the cloud security gateway; and controlling the access of the user by the cloud security gateway according to the security policy of the user. The invention has the advantages that because the quantity of security policies required to be maintained by the cloud security gateway is small, the security performance is higher; because the system only needs to synchronize update results of the security policies onto the cloud security gateway requiring the security policy update results, the security policy management efficiency is higher; and the occupation of system resources by security policy management is reduced.
Owner:BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products