CN110138878A - A kind of method and system of network security - Google Patents

A kind of method and system of network security Download PDF

Info

Publication number
CN110138878A
CN110138878A CN201910476518.5A CN201910476518A CN110138878A CN 110138878 A CN110138878 A CN 110138878A CN 201910476518 A CN201910476518 A CN 201910476518A CN 110138878 A CN110138878 A CN 110138878A
Authority
CN
China
Prior art keywords
network
intermediary device
net elements
mobile net
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910476518.5A
Other languages
Chinese (zh)
Other versions
CN110138878B (en
Inventor
段彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Sipuleng Technology Co Ltd
Original Assignee
Wuhan Sipuleng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Sipuleng Technology Co Ltd filed Critical Wuhan Sipuleng Technology Co Ltd
Priority to CN201910476518.5A priority Critical patent/CN110138878B/en
Publication of CN110138878A publication Critical patent/CN110138878A/en
Application granted granted Critical
Publication of CN110138878B publication Critical patent/CN110138878B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0002Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
    • H04L1/0003Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/101Server selection for load balancing based on network conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1029Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1031Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1036Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of method and systems of network security, certification request and access interaction are combined into one by mobile net elements when requesting certification, network intermediary device is as network security device, receive the access registrar request that several mobile net elements are sent in adjacent domain, the certification policy issued according to server carries out authentication operation to the mobile net elements in adjacent domain, and by history authentication data, the information reportings server such as own load, server can carry out the adjacent domain size that dynamic adjusts each network intermediary device accordingly, update access relation model and certification policy, it is handed down to network intermediary device, realize the requirement for meeting mobile context.

Description

A kind of method and system of network security
Technical field
This application involves field of communication technology more particularly to a kind of method and systems of network security.
Background technique
Mobile device certification scene in, due to equipment be it is mobile, network security device is sometimes difficult to equally loaded, That is a period of time multiple mobile devices may be concentrated near some network security device, cause the network security device super Load influences the certification access of mobile device.And due to quickly changing in mobile context, existing authenticating step was interacted It is more, it needs to improve.
Summary of the invention
The purpose of the present invention is to provide a kind of method and system of network security, mobile net elements will be recognized when requesting certification Card request and access interaction are combined into one, the certification policy that network intermediary device is issued as network security device according to server Authentication operation is carried out to the mobile net elements in adjacent domain, and by the information reportings server such as history authentication data, own load, To which server can carry out dynamic adjustment accordingly, meet the requirement of mobile context.
In a first aspect, the application provides a kind of method of network security, which comprises
Mobile net elements send access registrar request, and the access registrar request includes that each mobile net elements collect itself Network data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to the first CSI It is worth a kind of adaptively selected order of modulation, according to specified modulation system and order of modulation, the access registrar is requested to modulate For information symbol, network intermediary device is sent to by transmission network;
Network intermediary device receives the access registrar request that several mobile net elements in adjacent domain are sent, from each visit Ask the network data and user identity that each mobile net elements are extracted in certification request;Wherein, network intermediary device estimation transmission 2nd CSI value of channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to selection demodulation mode and The information symbol received is demodulated into data flow by order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching The certification request for then passing through the mobile net elements, refuses certification request if mismatching;
The number of mobile net elements, mobile net elements history in adjacent domain are periodically authenticated number by the network intermediary device Server is reported according to, own load and network state;The information that the server is reported according to network intermediary device, dynamic adjust The adjacent domain size of each network intermediary device, the security service resource of automatic deployment and extension network element, updates server sheet The certification policy of the access relation model on ground and corresponding each network intermediary device, by adjacent domain adjustment information, updated Model and certification policy are handed down to network intermediary device;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device, are shown in greatly by display device On screen.
With reference to first aspect, in a first possible implementation of that first aspect, the automatic deployment and extension network element Security service resource, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, will pacify Full inspection surveys deployment on network intermediary device wherein most lightly loaded or best network state.
With reference to first aspect, in a second possible implementation of that first aspect, neighbouring when safety detection to be deployed in When on other network intermediary devices, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, It uploads onto the server together with the deployment result of local network intermediate equipment.
With reference to first aspect, in first aspect in the third possible implementation, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
Second aspect, the application provide a kind of system of network security, the system comprises:
Mobile net elements, for sending access registrar request, the access registrar request includes that each mobile net elements are collected The network data and user identity of itself;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to described A kind of adaptively selected order of modulation of first CSI value asks the access registrar according to specified modulation system and order of modulation It asks and is modulated to information symbol, network intermediary device is sent to by transmission network;
Network intermediary device, for receiving the access registrar request of the transmission of several mobile net elements in adjacent domain, from The network data and user identity of each mobile net elements are extracted in each access registrar request;Wherein, network intermediary device is estimated The 2nd CSI value for counting transmission channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to the demodulation of selection The information symbol received is demodulated into data flow by mode and order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching The certification request for then passing through the mobile net elements, refuses certification request if mismatching;The network intermediary device periodically will The number of mobile net elements, mobile net elements history authentication data, own load and network state report server in adjacent domain;
Server, the information for being reported according to network intermediary device, dynamically adjusts the neighbouring of each network intermediary device Area size, the security service resource of automatic deployment and extension network element, updates the access relation model and correspondence of server local Adjacent domain adjustment information, updated model and certification policy are handed down to net by the certification policy of each network intermediary device Network intermediate equipment;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device;
Display device, for showing the adjacent domain of several network intermediary devices, attack situation and attack path in real time Show on large screen.
In conjunction with second aspect, in second aspect in the first possible implementation, the automatic deployment and extension network element Security service resource, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, will pacify Full inspection surveys deployment on network intermediary device wherein most lightly loaded or best network state.
It is neighbouring when safety detection to be deployed in second of second aspect possible implementation in conjunction with second aspect When on other network intermediary devices, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, It uploads onto the server together with the deployment result of local network intermediate equipment.
In conjunction with second aspect, in second aspect in the third possible implementation, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
The present invention provides a kind of method and system of network security, and mobile net elements are when requesting certification by certification request and visit Ask that interaction is combined into one, network intermediary device receives several mobile net elements in adjacent domain and send as network security device Access registrar request, the certification policy issued according to server in adjacent domain mobile net elements carry out authentication operation, and By the information reportings server such as history authentication data, own load, server can carry out dynamic accordingly and adjust in each network Between equipment adjacent domain size, update access relation model and certification policy, be handed down to network intermediary device, realize to meet and move The requirement of dynamic scene.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, for those of ordinary skills, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow chart of one embodiment of the method for inventive network safety;
Fig. 2 is the architecture diagram of one embodiment of the system of inventive network safety.
Specific embodiment
The preferred embodiment of the present invention is described in detail with reference to the accompanying drawing, so that advantages and features of the invention energy It is easier to be readily appreciated by one skilled in the art, so as to make a clearer definition of the protection scope of the present invention.
Fig. 1 is the flow chart of the method for network security provided by the present application, which comprises
Mobile net elements send access registrar request, and the access registrar request includes that each mobile net elements collect itself Network data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to the first CSI It is worth a kind of adaptively selected order of modulation, according to specified modulation system and order of modulation, the access registrar is requested to modulate For information symbol, network intermediary device is sent to by transmission network;
Network intermediary device receives the access registrar request that several mobile net elements in adjacent domain are sent, from each visit Ask the network data and user identity that each mobile net elements are extracted in certification request;Wherein, network intermediary device estimation transmission 2nd CSI value of channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to selection demodulation mode and The information symbol received is demodulated into data flow by order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching The certification request for then passing through the mobile net elements, refuses certification request if mismatching;
The number of mobile net elements, mobile net elements history in adjacent domain are periodically authenticated number by the network intermediary device Server is reported according to, own load and network state;The information that the server is reported according to network intermediary device, dynamic adjust The adjacent domain size of each network intermediary device, the security service resource of automatic deployment and extension network element, updates server sheet The certification policy of the access relation model on ground and corresponding each network intermediary device, by adjacent domain adjustment information, updated Model and certification policy are handed down to network intermediary device;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device, are shown in greatly by display device On screen.
In some preferred embodiments, the security service resource of the automatic deployment and extension network element, comprising: according to network Safety detection is disposed most lightly loaded wherein or net by the load and network state of intermediate equipment and neighbouring network intermediary device On network network intermediary device in the best state.
In some preferred embodiments, when being deployed in safety detection on other neighbouring network intermediary devices, local network Network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, the deployment result with local network intermediate equipment It uploads onto the server together.
In some preferred embodiments, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
Fig. 2 is the architecture diagram of the system of network security provided by the present application, the system comprises:
Mobile net elements, for sending access registrar request, the access registrar request includes that each mobile net elements are collected The network data and user identity of itself;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to described A kind of adaptively selected order of modulation of first CSI value asks the access registrar according to specified modulation system and order of modulation It asks and is modulated to information symbol, network intermediary device is sent to by transmission network;
Network intermediary device, for receiving the access registrar request of the transmission of several mobile net elements in adjacent domain, from The network data and user identity of each mobile net elements are extracted in each access registrar request;Wherein, network intermediary device is estimated The 2nd CSI value for counting transmission channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to the demodulation of selection The information symbol received is demodulated into data flow by mode and order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching The certification request for then passing through the mobile net elements, refuses certification request if mismatching;The network intermediary device periodically will The number of mobile net elements, mobile net elements history authentication data, own load and network state report server in adjacent domain;
Server, the information for being reported according to network intermediary device, dynamically adjusts the neighbouring of each network intermediary device Area size, the security service resource of automatic deployment and extension network element, updates the access relation model and correspondence of server local Adjacent domain adjustment information, updated model and certification policy are handed down to net by the certification policy of each network intermediary device Network intermediate equipment;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device;
Display device, for showing the adjacent domain of several network intermediary devices, attack situation and attack path in real time Show on large screen.
In some preferred embodiments, the security service resource of the automatic deployment and extension network element, comprising: according to network Safety detection is disposed most lightly loaded wherein or net by the load and network state of intermediate equipment and neighbouring network intermediary device On network network intermediary device in the best state.
In some preferred embodiments, when being deployed in safety detection on other neighbouring network intermediary devices, local network Network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, the deployment result with local network intermediate equipment It uploads onto the server together.
In some preferred embodiments, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
In the specific implementation, the present invention also provides a kind of computer storage mediums, wherein the computer storage medium can deposit Program is contained, which may include step some or all of in each embodiment of the present invention when executing.The storage medium It can be magnetic disk, CD, read-only memory (referred to as: ROM) or random access memory (referred to as: RAM) etc..
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or The part that contributes to existing technology can be embodied in the form of software products, which can store In storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions use is so that a computer equipment (can be Personal computer, server or network equipment etc.) it executes described in certain parts of each embodiment of the present invention or embodiment Method.
The same or similar parts between the embodiments can be referred to each other for this specification.For embodiment, Since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to the explanation in embodiment of the method ?.
Invention described above embodiment is not intended to limit the scope of the present invention..

Claims (8)

1. a kind of method of network security, which is characterized in that the described method includes:
Mobile net elements send access registrar request, and the access registrar request includes the network that each mobile net elements collect itself Data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, certainly according to the first CSI value Adaptation selects a kind of order of modulation, and according to specified modulation system and order of modulation, access registrar request is modulated to letter Symbol is ceased, network intermediary device is sent to by transmission network;
Network intermediary device receives the access registrar request that several mobile net elements in adjacent domain are sent, and recognizes from each access The network data and user identity of each mobile net elements are extracted in card request;Wherein, network intermediary device estimates transmission channel The 2nd CSI value, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, demodulation mode and modulation according to selection The information symbol received is demodulated into data flow by order;
The certification policy that the network intermediary device is issued according to server carries out several mobile net elements in adjacent domain User identity is matched with the access relation model of local special object, judges the corresponding role of user by certification;Parse net Network data judge network access behavior therein and access object role match whether corresponding to the user, lead to if matching The certification request for crossing the mobile net elements refuses certification request if mismatching;
The network intermediary device periodically by the number of mobile net elements in adjacent domain, mobile net elements history authentication data, from It bears load and network state reports server;The information that the server is reported according to network intermediary device, dynamic adjust each The adjacent domain size of network intermediary device, the security service resource of automatic deployment and extension network element, updates server local The certification policy of access relation model and corresponding each network intermediary device, by adjacent domain adjustment information, updated model Network intermediary device is handed down to certification policy;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and will be according to movement The attack situation and attack path that network element history authentication data is extracted pass to display device, are shown in large screen by display device On.
2. the method according to claim 1, wherein the security service money of the automatic deployment and extension network element Source, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, safety detection is deployed in On network intermediary device wherein most lightly loaded or best network state.
3. method according to claim 1 to 2, which is characterized in that be deployed in when by safety detection adjacent to other networks When in intermediate equipment, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, with local network The deployment result of network intermediate equipment is uploaded onto the server together.
4. method according to claim 1 to 3, which is characterized in that the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
5. a kind of system of network security, which is characterized in that the system comprises:
Mobile net elements, for sending access registrar request, the access registrar request includes that each mobile net elements collect itself Network data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to described first A kind of adaptively selected order of modulation of CSI value requests that the access registrar adjust according to specified modulation system and order of modulation It is made as information symbol, network intermediary device is sent to by transmission network;
Network intermediary device, for receiving the access registrar request of the transmission of several mobile net elements in adjacent domain, from each The network data and user identity of each mobile net elements are extracted in access registrar request;Wherein, network intermediary device estimation passes 2nd CSI value of defeated channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to the demodulation mode of selection And order of modulation, the information symbol received is demodulated into data flow;
The certification policy that the network intermediary device is issued according to server carries out several mobile net elements in adjacent domain User identity is matched with the access relation model of local special object, judges the corresponding role of user by certification;Parse net Network data judge network access behavior therein and access object role match whether corresponding to the user, lead to if matching The certification request for crossing the mobile net elements refuses certification request if mismatching;The network intermediary device periodically will be neighbouring The number of mobile net elements, mobile net elements history authentication data, own load and network state report server in region;
Server, the information for being reported according to network intermediary device, dynamically adjusts the adjacent domain of each network intermediary device Size, the security service resource of automatic deployment and extension network element update the access relation model of server local and correspond to each Adjacent domain adjustment information, updated model and certification policy are handed down in network by the certification policy of network intermediary device Between equipment;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and will be according to movement The attack situation and attack path that network element history authentication data is extracted pass to display device;
Display device, for the adjacent domain of several network intermediary devices, attack situation and attack path real-time display to exist On large screen.
6. system according to claim 5, which is characterized in that the security service money of the automatic deployment and extension network element Source, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, safety detection is deployed in On network intermediary device wherein most lightly loaded or best network state.
7. according to any system of claim 5-6, which is characterized in that be deployed in when by safety detection adjacent to other networks When in intermediate equipment, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, with local network The deployment result of network intermediate equipment is uploaded onto the server together.
8. according to any system of claim 5-7, which is characterized in that the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
CN201910476518.5A 2019-06-03 2019-06-03 Network security method and system Active CN110138878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910476518.5A CN110138878B (en) 2019-06-03 2019-06-03 Network security method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910476518.5A CN110138878B (en) 2019-06-03 2019-06-03 Network security method and system

Publications (2)

Publication Number Publication Date
CN110138878A true CN110138878A (en) 2019-08-16
CN110138878B CN110138878B (en) 2022-06-24

Family

ID=67579771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910476518.5A Active CN110138878B (en) 2019-06-03 2019-06-03 Network security method and system

Country Status (1)

Country Link
CN (1) CN110138878B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231693A (en) * 2010-04-22 2011-11-02 北京握奇数据系统有限公司 Method and apparatus for managing access authority
US20130310029A1 (en) * 2010-11-17 2013-11-21 Evolved Intelligence Limited Avoid accidental roaming by triggering a network re-attachment procedure
CN106559895A (en) * 2015-09-30 2017-04-05 北京展讯高科通信技术有限公司 Base station, MSA and its communication signal processing method and communication system
CN106603513A (en) * 2016-11-30 2017-04-26 中国人民解放军理工大学 Host identifier-based resource access control method and system
CN107426168A (en) * 2017-05-23 2017-12-01 国网山东省电力公司电力科学研究院 A kind of Secure Network Assecc processing method and processing device
CN108924169A (en) * 2018-09-17 2018-11-30 武汉思普崚技术有限公司 A kind of visual network security system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231693A (en) * 2010-04-22 2011-11-02 北京握奇数据系统有限公司 Method and apparatus for managing access authority
US20130310029A1 (en) * 2010-11-17 2013-11-21 Evolved Intelligence Limited Avoid accidental roaming by triggering a network re-attachment procedure
CN106559895A (en) * 2015-09-30 2017-04-05 北京展讯高科通信技术有限公司 Base station, MSA and its communication signal processing method and communication system
CN106603513A (en) * 2016-11-30 2017-04-26 中国人民解放军理工大学 Host identifier-based resource access control method and system
CN107426168A (en) * 2017-05-23 2017-12-01 国网山东省电力公司电力科学研究院 A kind of Secure Network Assecc processing method and processing device
CN108924169A (en) * 2018-09-17 2018-11-30 武汉思普崚技术有限公司 A kind of visual network security system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高乾: ""高速移动场景自适应传输优化研究"", 《中国博士学位论文全文数据库工程科技Ⅱ辑》 *

Also Published As

Publication number Publication date
CN110138878B (en) 2022-06-24

Similar Documents

Publication Publication Date Title
CN102365853B (en) For server message being sent to by Service controll link the system and method for the proxy for equipment on end-user device
CN107566429A (en) Base station, the response method of access request, apparatus and system
CN110366269A (en) Session establishing method and equipment
CN103069776A (en) Extending a content delivery network (cdn) into a mobile or wireline network
CN109710270A (en) A kind of security application delivery method, device and storage medium
CN109241359A (en) Block chain node device, block catenary system, block data processing system and method
CN110190998A (en) A kind of Network Situation visualization method and system
CN104333567A (en) Web caching with security as a service
US11315086B2 (en) API charging system, API charging management method, and API charging program
CN109819033A (en) A kind of resource file loading method and system
CN103957151A (en) Interactive application management system based on interactive box
CN107148020A (en) WiFi shared systems and its method, Wireless Communication Equipment and router
CN106034126B (en) The method of calibration and device of identifying code
CN104092627A (en) Bandwidth adjusting method and device
CN102142925B (en) Method, equipment and system for filtering deep packet inspection
CN110213768A (en) A kind of network behavior data-reusing authentication method and system
CN108377245A (en) A kind of optimizing demonstration method and system of network insertion request
CN110213269A (en) A kind of network behavior data authentication method and system
CN110392015A (en) A kind of method and system of processing business request
CN110138878A (en) A kind of method and system of network security
CN110113755A (en) A kind of multi-business multiplexing method and system based on network authentication
CN105959292A (en) Device using authority identification method and system, and management server
JP2010092407A (en) Authentication information processing apparatus, authentication information transmission method, and authentication method
US10250476B2 (en) Identifying modifications to technical characteristics of a communication channel to alter user perception of communication channel performance
CN106559771A (en) A kind of method and apparatus of wireless terminal fast roaming

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant