CN110138878A - A kind of method and system of network security - Google Patents
A kind of method and system of network security Download PDFInfo
- Publication number
- CN110138878A CN110138878A CN201910476518.5A CN201910476518A CN110138878A CN 110138878 A CN110138878 A CN 110138878A CN 201910476518 A CN201910476518 A CN 201910476518A CN 110138878 A CN110138878 A CN 110138878A
- Authority
- CN
- China
- Prior art keywords
- network
- intermediary device
- net elements
- mobile net
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0002—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
- H04L1/0003—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/101—Server selection for load balancing based on network conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1029—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1031—Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1036—Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of method and systems of network security, certification request and access interaction are combined into one by mobile net elements when requesting certification, network intermediary device is as network security device, receive the access registrar request that several mobile net elements are sent in adjacent domain, the certification policy issued according to server carries out authentication operation to the mobile net elements in adjacent domain, and by history authentication data, the information reportings server such as own load, server can carry out the adjacent domain size that dynamic adjusts each network intermediary device accordingly, update access relation model and certification policy, it is handed down to network intermediary device, realize the requirement for meeting mobile context.
Description
Technical field
This application involves field of communication technology more particularly to a kind of method and systems of network security.
Background technique
Mobile device certification scene in, due to equipment be it is mobile, network security device is sometimes difficult to equally loaded,
That is a period of time multiple mobile devices may be concentrated near some network security device, cause the network security device super
Load influences the certification access of mobile device.And due to quickly changing in mobile context, existing authenticating step was interacted
It is more, it needs to improve.
Summary of the invention
The purpose of the present invention is to provide a kind of method and system of network security, mobile net elements will be recognized when requesting certification
Card request and access interaction are combined into one, the certification policy that network intermediary device is issued as network security device according to server
Authentication operation is carried out to the mobile net elements in adjacent domain, and by the information reportings server such as history authentication data, own load,
To which server can carry out dynamic adjustment accordingly, meet the requirement of mobile context.
In a first aspect, the application provides a kind of method of network security, which comprises
Mobile net elements send access registrar request, and the access registrar request includes that each mobile net elements collect itself
Network data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to the first CSI
It is worth a kind of adaptively selected order of modulation, according to specified modulation system and order of modulation, the access registrar is requested to modulate
For information symbol, network intermediary device is sent to by transmission network;
Network intermediary device receives the access registrar request that several mobile net elements in adjacent domain are sent, from each visit
Ask the network data and user identity that each mobile net elements are extracted in certification request;Wherein, network intermediary device estimation transmission
2nd CSI value of channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to selection demodulation mode and
The information symbol received is demodulated into data flow by order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain
It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution
Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching
The certification request for then passing through the mobile net elements, refuses certification request if mismatching;
The number of mobile net elements, mobile net elements history in adjacent domain are periodically authenticated number by the network intermediary device
Server is reported according to, own load and network state;The information that the server is reported according to network intermediary device, dynamic adjust
The adjacent domain size of each network intermediary device, the security service resource of automatic deployment and extension network element, updates server sheet
The certification policy of the access relation model on ground and corresponding each network intermediary device, by adjacent domain adjustment information, updated
Model and certification policy are handed down to network intermediary device;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis
The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device, are shown in greatly by display device
On screen.
With reference to first aspect, in a first possible implementation of that first aspect, the automatic deployment and extension network element
Security service resource, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, will pacify
Full inspection surveys deployment on network intermediary device wherein most lightly loaded or best network state.
With reference to first aspect, in a second possible implementation of that first aspect, neighbouring when safety detection to be deployed in
When on other network intermediary devices, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices,
It uploads onto the server together with the deployment result of local network intermediate equipment.
With reference to first aspect, in first aspect in the third possible implementation, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
Second aspect, the application provide a kind of system of network security, the system comprises:
Mobile net elements, for sending access registrar request, the access registrar request includes that each mobile net elements are collected
The network data and user identity of itself;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to described
A kind of adaptively selected order of modulation of first CSI value asks the access registrar according to specified modulation system and order of modulation
It asks and is modulated to information symbol, network intermediary device is sent to by transmission network;
Network intermediary device, for receiving the access registrar request of the transmission of several mobile net elements in adjacent domain, from
The network data and user identity of each mobile net elements are extracted in each access registrar request;Wherein, network intermediary device is estimated
The 2nd CSI value for counting transmission channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to the demodulation of selection
The information symbol received is demodulated into data flow by mode and order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain
It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution
Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching
The certification request for then passing through the mobile net elements, refuses certification request if mismatching;The network intermediary device periodically will
The number of mobile net elements, mobile net elements history authentication data, own load and network state report server in adjacent domain;
Server, the information for being reported according to network intermediary device, dynamically adjusts the neighbouring of each network intermediary device
Area size, the security service resource of automatic deployment and extension network element, updates the access relation model and correspondence of server local
Adjacent domain adjustment information, updated model and certification policy are handed down to net by the certification policy of each network intermediary device
Network intermediate equipment;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis
The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device;
Display device, for showing the adjacent domain of several network intermediary devices, attack situation and attack path in real time
Show on large screen.
In conjunction with second aspect, in second aspect in the first possible implementation, the automatic deployment and extension network element
Security service resource, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, will pacify
Full inspection surveys deployment on network intermediary device wherein most lightly loaded or best network state.
It is neighbouring when safety detection to be deployed in second of second aspect possible implementation in conjunction with second aspect
When on other network intermediary devices, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices,
It uploads onto the server together with the deployment result of local network intermediate equipment.
In conjunction with second aspect, in second aspect in the third possible implementation, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
The present invention provides a kind of method and system of network security, and mobile net elements are when requesting certification by certification request and visit
Ask that interaction is combined into one, network intermediary device receives several mobile net elements in adjacent domain and send as network security device
Access registrar request, the certification policy issued according to server in adjacent domain mobile net elements carry out authentication operation, and
By the information reportings server such as history authentication data, own load, server can carry out dynamic accordingly and adjust in each network
Between equipment adjacent domain size, update access relation model and certification policy, be handed down to network intermediary device, realize to meet and move
The requirement of dynamic scene.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, for those of ordinary skills, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow chart of one embodiment of the method for inventive network safety;
Fig. 2 is the architecture diagram of one embodiment of the system of inventive network safety.
Specific embodiment
The preferred embodiment of the present invention is described in detail with reference to the accompanying drawing, so that advantages and features of the invention energy
It is easier to be readily appreciated by one skilled in the art, so as to make a clearer definition of the protection scope of the present invention.
Fig. 1 is the flow chart of the method for network security provided by the present application, which comprises
Mobile net elements send access registrar request, and the access registrar request includes that each mobile net elements collect itself
Network data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to the first CSI
It is worth a kind of adaptively selected order of modulation, according to specified modulation system and order of modulation, the access registrar is requested to modulate
For information symbol, network intermediary device is sent to by transmission network;
Network intermediary device receives the access registrar request that several mobile net elements in adjacent domain are sent, from each visit
Ask the network data and user identity that each mobile net elements are extracted in certification request;Wherein, network intermediary device estimation transmission
2nd CSI value of channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to selection demodulation mode and
The information symbol received is demodulated into data flow by order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain
It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution
Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching
The certification request for then passing through the mobile net elements, refuses certification request if mismatching;
The number of mobile net elements, mobile net elements history in adjacent domain are periodically authenticated number by the network intermediary device
Server is reported according to, own load and network state;The information that the server is reported according to network intermediary device, dynamic adjust
The adjacent domain size of each network intermediary device, the security service resource of automatic deployment and extension network element, updates server sheet
The certification policy of the access relation model on ground and corresponding each network intermediary device, by adjacent domain adjustment information, updated
Model and certification policy are handed down to network intermediary device;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis
The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device, are shown in greatly by display device
On screen.
In some preferred embodiments, the security service resource of the automatic deployment and extension network element, comprising: according to network
Safety detection is disposed most lightly loaded wherein or net by the load and network state of intermediate equipment and neighbouring network intermediary device
On network network intermediary device in the best state.
In some preferred embodiments, when being deployed in safety detection on other neighbouring network intermediary devices, local network
Network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, the deployment result with local network intermediate equipment
It uploads onto the server together.
In some preferred embodiments, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
Fig. 2 is the architecture diagram of the system of network security provided by the present application, the system comprises:
Mobile net elements, for sending access registrar request, the access registrar request includes that each mobile net elements are collected
The network data and user identity of itself;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to described
A kind of adaptively selected order of modulation of first CSI value asks the access registrar according to specified modulation system and order of modulation
It asks and is modulated to information symbol, network intermediary device is sent to by transmission network;
Network intermediary device, for receiving the access registrar request of the transmission of several mobile net elements in adjacent domain, from
The network data and user identity of each mobile net elements are extracted in each access registrar request;Wherein, network intermediary device is estimated
The 2nd CSI value for counting transmission channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to the demodulation of selection
The information symbol received is demodulated into data flow by mode and order of modulation;
The certification policy that the network intermediary device is issued according to server, to several mobile net elements in adjacent domain
It is authenticated, user identity is matched with the access relation model of local special object, judges the corresponding role of user;Solution
Network data is analysed, network access behavior therein and access object role match whether corresponding to the user are judged, if matching
The certification request for then passing through the mobile net elements, refuses certification request if mismatching;The network intermediary device periodically will
The number of mobile net elements, mobile net elements history authentication data, own load and network state report server in adjacent domain;
Server, the information for being reported according to network intermediary device, dynamically adjusts the neighbouring of each network intermediary device
Area size, the security service resource of automatic deployment and extension network element, updates the access relation model and correspondence of server local
Adjacent domain adjustment information, updated model and certification policy are handed down to net by the certification policy of each network intermediary device
Network intermediate equipment;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and by basis
The attack situation and attack path that mobile net elements history authentication data is extracted pass to display device;
Display device, for showing the adjacent domain of several network intermediary devices, attack situation and attack path in real time
Show on large screen.
In some preferred embodiments, the security service resource of the automatic deployment and extension network element, comprising: according to network
Safety detection is disposed most lightly loaded wherein or net by the load and network state of intermediate equipment and neighbouring network intermediary device
On network network intermediary device in the best state.
In some preferred embodiments, when being deployed in safety detection on other neighbouring network intermediary devices, local network
Network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, the deployment result with local network intermediate equipment
It uploads onto the server together.
In some preferred embodiments, the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
In the specific implementation, the present invention also provides a kind of computer storage mediums, wherein the computer storage medium can deposit
Program is contained, which may include step some or all of in each embodiment of the present invention when executing.The storage medium
It can be magnetic disk, CD, read-only memory (referred to as: ROM) or random access memory (referred to as: RAM) etc..
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software
The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or
The part that contributes to existing technology can be embodied in the form of software products, which can store
In storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions use is so that a computer equipment (can be
Personal computer, server or network equipment etc.) it executes described in certain parts of each embodiment of the present invention or embodiment
Method.
The same or similar parts between the embodiments can be referred to each other for this specification.For embodiment,
Since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to the explanation in embodiment of the method
?.
Invention described above embodiment is not intended to limit the scope of the present invention..
Claims (8)
1. a kind of method of network security, which is characterized in that the described method includes:
Mobile net elements send access registrar request, and the access registrar request includes the network that each mobile net elements collect itself
Data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, certainly according to the first CSI value
Adaptation selects a kind of order of modulation, and according to specified modulation system and order of modulation, access registrar request is modulated to letter
Symbol is ceased, network intermediary device is sent to by transmission network;
Network intermediary device receives the access registrar request that several mobile net elements in adjacent domain are sent, and recognizes from each access
The network data and user identity of each mobile net elements are extracted in card request;Wherein, network intermediary device estimates transmission channel
The 2nd CSI value, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, demodulation mode and modulation according to selection
The information symbol received is demodulated into data flow by order;
The certification policy that the network intermediary device is issued according to server carries out several mobile net elements in adjacent domain
User identity is matched with the access relation model of local special object, judges the corresponding role of user by certification;Parse net
Network data judge network access behavior therein and access object role match whether corresponding to the user, lead to if matching
The certification request for crossing the mobile net elements refuses certification request if mismatching;
The network intermediary device periodically by the number of mobile net elements in adjacent domain, mobile net elements history authentication data, from
It bears load and network state reports server;The information that the server is reported according to network intermediary device, dynamic adjust each
The adjacent domain size of network intermediary device, the security service resource of automatic deployment and extension network element, updates server local
The certification policy of access relation model and corresponding each network intermediary device, by adjacent domain adjustment information, updated model
Network intermediary device is handed down to certification policy;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and will be according to movement
The attack situation and attack path that network element history authentication data is extracted pass to display device, are shown in large screen by display device
On.
2. the method according to claim 1, wherein the security service money of the automatic deployment and extension network element
Source, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, safety detection is deployed in
On network intermediary device wherein most lightly loaded or best network state.
3. method according to claim 1 to 2, which is characterized in that be deployed in when by safety detection adjacent to other networks
When in intermediate equipment, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, with local network
The deployment result of network intermediate equipment is uploaded onto the server together.
4. method according to claim 1 to 3, which is characterized in that the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
5. a kind of system of network security, which is characterized in that the system comprises:
Mobile net elements, for sending access registrar request, the access registrar request includes that each mobile net elements collect itself
Network data and user identity;Wherein, the first CSI value of the transmission channel where mobile net elements estimation, according to described first
A kind of adaptively selected order of modulation of CSI value requests that the access registrar adjust according to specified modulation system and order of modulation
It is made as information symbol, network intermediary device is sent to by transmission network;
Network intermediary device, for receiving the access registrar request of the transmission of several mobile net elements in adjacent domain, from each
The network data and user identity of each mobile net elements are extracted in access registrar request;Wherein, network intermediary device estimation passes
2nd CSI value of defeated channel, according to the adaptively selected a kind of order of modulation of the 2nd CSI value, according to the demodulation mode of selection
And order of modulation, the information symbol received is demodulated into data flow;
The certification policy that the network intermediary device is issued according to server carries out several mobile net elements in adjacent domain
User identity is matched with the access relation model of local special object, judges the corresponding role of user by certification;Parse net
Network data judge network access behavior therein and access object role match whether corresponding to the user, lead to if matching
The certification request for crossing the mobile net elements refuses certification request if mismatching;The network intermediary device periodically will be neighbouring
The number of mobile net elements, mobile net elements history authentication data, own load and network state report server in region;
Server, the information for being reported according to network intermediary device, dynamically adjusts the adjacent domain of each network intermediary device
Size, the security service resource of automatic deployment and extension network element update the access relation model of server local and correspond to each
Adjacent domain adjustment information, updated model and certification policy are handed down in network by the certification policy of network intermediary device
Between equipment;
The server by the adjacent domain real-time delivery of several network intermediary devices to display device, and will be according to movement
The attack situation and attack path that network element history authentication data is extracted pass to display device;
Display device, for the adjacent domain of several network intermediary devices, attack situation and attack path real-time display to exist
On large screen.
6. system according to claim 5, which is characterized in that the security service money of the automatic deployment and extension network element
Source, comprising: according to the load and network state of network intermediary device and neighbouring network intermediary device, safety detection is deployed in
On network intermediary device wherein most lightly loaded or best network state.
7. according to any system of claim 5-6, which is characterized in that be deployed in when by safety detection adjacent to other networks
When in intermediate equipment, local network intermediate equipment obtains the judging result of other neighbouring network intermediary devices, with local network
The deployment result of network intermediate equipment is uploaded onto the server together.
8. according to any system of claim 5-7, which is characterized in that the transmission services include:
One of multi-medium data, audio data, video data, text data or several combination.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910476518.5A CN110138878B (en) | 2019-06-03 | 2019-06-03 | Network security method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910476518.5A CN110138878B (en) | 2019-06-03 | 2019-06-03 | Network security method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110138878A true CN110138878A (en) | 2019-08-16 |
CN110138878B CN110138878B (en) | 2022-06-24 |
Family
ID=67579771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910476518.5A Active CN110138878B (en) | 2019-06-03 | 2019-06-03 | Network security method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110138878B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231693A (en) * | 2010-04-22 | 2011-11-02 | 北京握奇数据系统有限公司 | Method and apparatus for managing access authority |
US20130310029A1 (en) * | 2010-11-17 | 2013-11-21 | Evolved Intelligence Limited | Avoid accidental roaming by triggering a network re-attachment procedure |
CN106559895A (en) * | 2015-09-30 | 2017-04-05 | 北京展讯高科通信技术有限公司 | Base station, MSA and its communication signal processing method and communication system |
CN106603513A (en) * | 2016-11-30 | 2017-04-26 | 中国人民解放军理工大学 | Host identifier-based resource access control method and system |
CN107426168A (en) * | 2017-05-23 | 2017-12-01 | 国网山东省电力公司电力科学研究院 | A kind of Secure Network Assecc processing method and processing device |
CN108924169A (en) * | 2018-09-17 | 2018-11-30 | 武汉思普崚技术有限公司 | A kind of visual network security system |
-
2019
- 2019-06-03 CN CN201910476518.5A patent/CN110138878B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231693A (en) * | 2010-04-22 | 2011-11-02 | 北京握奇数据系统有限公司 | Method and apparatus for managing access authority |
US20130310029A1 (en) * | 2010-11-17 | 2013-11-21 | Evolved Intelligence Limited | Avoid accidental roaming by triggering a network re-attachment procedure |
CN106559895A (en) * | 2015-09-30 | 2017-04-05 | 北京展讯高科通信技术有限公司 | Base station, MSA and its communication signal processing method and communication system |
CN106603513A (en) * | 2016-11-30 | 2017-04-26 | 中国人民解放军理工大学 | Host identifier-based resource access control method and system |
CN107426168A (en) * | 2017-05-23 | 2017-12-01 | 国网山东省电力公司电力科学研究院 | A kind of Secure Network Assecc processing method and processing device |
CN108924169A (en) * | 2018-09-17 | 2018-11-30 | 武汉思普崚技术有限公司 | A kind of visual network security system |
Non-Patent Citations (1)
Title |
---|
高乾: ""高速移动场景自适应传输优化研究"", 《中国博士学位论文全文数据库工程科技Ⅱ辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110138878B (en) | 2022-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102365853B (en) | For server message being sent to by Service controll link the system and method for the proxy for equipment on end-user device | |
CN107566429A (en) | Base station, the response method of access request, apparatus and system | |
CN110366269A (en) | Session establishing method and equipment | |
CN103069776A (en) | Extending a content delivery network (cdn) into a mobile or wireline network | |
CN109710270A (en) | A kind of security application delivery method, device and storage medium | |
CN109241359A (en) | Block chain node device, block catenary system, block data processing system and method | |
CN110190998A (en) | A kind of Network Situation visualization method and system | |
CN104333567A (en) | Web caching with security as a service | |
US11315086B2 (en) | API charging system, API charging management method, and API charging program | |
CN109819033A (en) | A kind of resource file loading method and system | |
CN103957151A (en) | Interactive application management system based on interactive box | |
CN107148020A (en) | WiFi shared systems and its method, Wireless Communication Equipment and router | |
CN106034126B (en) | The method of calibration and device of identifying code | |
CN104092627A (en) | Bandwidth adjusting method and device | |
CN102142925B (en) | Method, equipment and system for filtering deep packet inspection | |
CN110213768A (en) | A kind of network behavior data-reusing authentication method and system | |
CN108377245A (en) | A kind of optimizing demonstration method and system of network insertion request | |
CN110213269A (en) | A kind of network behavior data authentication method and system | |
CN110392015A (en) | A kind of method and system of processing business request | |
CN110138878A (en) | A kind of method and system of network security | |
CN110113755A (en) | A kind of multi-business multiplexing method and system based on network authentication | |
CN105959292A (en) | Device using authority identification method and system, and management server | |
JP2010092407A (en) | Authentication information processing apparatus, authentication information transmission method, and authentication method | |
US10250476B2 (en) | Identifying modifications to technical characteristics of a communication channel to alter user perception of communication channel performance | |
CN106559771A (en) | A kind of method and apparatus of wireless terminal fast roaming |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |