CN110138878B - Network security method and system - Google Patents

Network security method and system Download PDF

Info

Publication number
CN110138878B
CN110138878B CN201910476518.5A CN201910476518A CN110138878B CN 110138878 B CN110138878 B CN 110138878B CN 201910476518 A CN201910476518 A CN 201910476518A CN 110138878 B CN110138878 B CN 110138878B
Authority
CN
China
Prior art keywords
network
intermediate equipment
data
server
network intermediate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910476518.5A
Other languages
Chinese (zh)
Other versions
CN110138878A (en
Inventor
段彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Sipuling Technology Co Ltd
Original Assignee
Wuhan Sipuling Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Sipuling Technology Co Ltd filed Critical Wuhan Sipuling Technology Co Ltd
Priority to CN201910476518.5A priority Critical patent/CN110138878B/en
Publication of CN110138878A publication Critical patent/CN110138878A/en
Application granted granted Critical
Publication of CN110138878B publication Critical patent/CN110138878B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0002Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate
    • H04L1/0003Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission rate by switching between different modulation schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/101Server selection for load balancing based on network conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1029Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1031Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1036Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers

Abstract

The invention discloses a method and a system for network security, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network security device to receive access authentication requests sent by a plurality of mobile network elements in an adjacent area, the mobile network elements in the adjacent area are authenticated according to an authentication strategy issued by a server, and information such as historical authentication data and self load is reported to the server, the server can dynamically adjust the size of the adjacent area of each network intermediate device according to the information, update an access relation model and the authentication strategy and issue the information to the network intermediate device, so that the requirement of a mobile scene is met.

Description

Network security method and system
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a system for network security.
Background
In a scenario of mobile device authentication, because the device is mobile, it is sometimes difficult for the network security apparatus to balance load, that is, a plurality of mobile devices may concentrate near a certain network security apparatus for a period of time, which causes overload of the network security apparatus and affects authentication access of the mobile device. And due to the rapid change in the mobile scene, the existing authentication steps are too interactive, and improvement is urgently needed.
Disclosure of Invention
The invention aims to provide a method and a system for network security.A mobile network element integrates an authentication request and access interaction into a whole when requesting authentication, and network intermediate equipment is used as a network security device to authenticate the mobile network element in an adjacent area according to an authentication strategy issued by a server and reports information such as historical authentication data, self load and the like to the server, so that the server can be dynamically adjusted according to the information and the requirements of a mobile scene are met.
In a first aspect, the present application provides a method for network security, the method comprising:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, automatically deploys and expands the security service resources of the network elements, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server transmits the adjacent areas of the network intermediate devices to the display device in real time, transmits the attack situation and the attack path extracted according to the historical authentication data of the mobile network element to the display device, and the attack situation and the attack path are displayed on a large screen by the display device.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the automatically deploying and extending security service resources of a network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
With reference to the first aspect, in a second possible implementation manner of the first aspect, when the security detection is deployed on a neighboring other network intermediary device, the local network intermediary device obtains a determination result of the neighboring other network intermediary device, and uploads the determination result and a deployment result of the local network intermediary device to the server.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the transmitting service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
In a second aspect, the present application provides a system for network security, the system comprising:
the mobile network elements are used for sending an access authentication request, and the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, automatically deploying and expanding the security service resources of the network elements, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server transmits the adjacent areas of the network intermediate devices to the display device in real time, and transmits the attack situation and the attack path extracted according to the historical authentication data of the mobile network element to the display device;
and the display device is used for displaying the adjacent areas, the attack situations and the attack paths of the plurality of network intermediate devices on the large screen in real time.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the automatically deploying and extending security service resources of a network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
With reference to the second aspect, in a second possible implementation manner of the second aspect, when the security detection is deployed on the other neighboring network intermediate devices, the local network intermediate device obtains the determination result of the other neighboring network intermediate devices, and uploads the determination result and the deployment result of the local network intermediate device to the server.
With reference to the second aspect, in a third possible implementation manner of the second aspect, the transmitting service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
The invention provides a method and a system for network security, wherein a mobile network element integrates an authentication request and access interaction when requesting authentication, a network intermediate device is used as a network security device to receive access authentication requests sent by a plurality of mobile network elements in an adjacent area, the mobile network elements in the adjacent area are authenticated according to an authentication strategy issued by a server, and information such as historical authentication data and self load is reported to the server, the server can dynamically adjust the size of the adjacent area of each network intermediate device according to the information, update an access relation model and the authentication strategy and issue the information to the network intermediate device, so that the requirement of a mobile scene is met.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of a method of network security of the present invention;
fig. 2 is an architecture diagram of an embodiment of the network security system of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the scope of the present invention will be more clearly and clearly defined.
Fig. 1 is a flowchart of a method for network security provided in the present application, where the method includes:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, automatically deploys and expands the security service resources of the network elements, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server transmits the adjacent areas of the network intermediate devices to the display device in real time, transmits the attack situation and the attack path extracted according to the historical authentication data of the mobile network element to the display device, and the attack situation and the attack path are displayed on a large screen by the display device.
In some preferred embodiments, the automatically deploying and extending security service resources of the network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
In some preferred embodiments, when the security detection is deployed on the other network intermediate device in the vicinity, the local network intermediate device obtains the determination result of the other network intermediate device in the vicinity, and uploads the determination result and the deployment result of the local network intermediate device to the server.
In some preferred embodiments, the transmission service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
Fig. 2 is an architecture diagram of a system for network security provided by the present application, the system comprising:
the mobile network element is used for sending an access authentication request, wherein the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of the mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to the server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, automatically deploying and expanding the security service resources of the network elements, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server transmits the adjacent areas of the network intermediate devices to the display device in real time, and transmits the attack situation and the attack path extracted according to the historical authentication data of the mobile network element to the display device;
and the display device is used for displaying the adjacent areas, the attack situations and the attack paths of the plurality of network intermediate devices on the large screen in real time.
In some preferred embodiments, the automatically deploying and extending security service resources of the network element includes: and according to the loads and the network states of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state.
In some preferred embodiments, when the security detection is deployed on the neighboring other network intermediate device, the local network intermediate device obtains a determination result of the neighboring other network intermediate device, and uploads the determination result and a deployment result of the local network intermediate device to the server.
In some preferred embodiments, the transmission service includes:
one or a plurality of combinations of multimedia data, audio data, video data and text data.
In specific implementation, the present invention further provides a computer storage medium, where the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments of the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM) or a Random Access Memory (RAM).
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The same and similar parts in the various embodiments of the present specification may be referred to each other. In particular, for the embodiments, since they are substantially similar to the method embodiments, the description is simple, and the relevant points can be referred to the description in the method embodiments.
The above-described embodiments of the present invention do not limit the scope of the present invention.

Claims (2)

1. A method of network security, the method comprising:
the mobile network elements send access authentication requests, wherein the access authentication requests comprise network data and user identities collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment receives access authentication requests sent by a plurality of mobile network elements in an adjacent area, and extracts network data and user identity of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request;
the network intermediate equipment periodically reports the number of mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to a server; the server dynamically adjusts the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, automatically deploys and expands the security service resources of the network elements, updates the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issues the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server transmits the adjacent areas of the network intermediate devices to the display device in real time, transmits the attack situation and the attack path extracted according to the historical authentication data of the mobile network element to the display device, and the attack situation and the attack path are displayed on a large screen by the display device;
the automatically deploying and expanding security service resources of the network element comprises the following steps: according to the load and the network state of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state;
when the security detection is deployed on other adjacent network intermediate equipment, the local network intermediate equipment acquires the judgment result of the other adjacent network intermediate equipment and uploads the judgment result and the deployment result of the local network intermediate equipment to a server;
the transmission service comprises the following steps: one or a plurality of combinations of multimedia data, audio data, video data and text data.
2. A system for network security, the system comprising:
the mobile network element is used for sending an access authentication request, wherein the access authentication request comprises network data and user identity collected by each mobile network element; the mobile network element estimates a first CSI value of a transmission channel, adaptively selects a modulation order according to the first CSI value, modulates the access authentication request into an information symbol according to a specified modulation mode and the modulation order, and sends the information symbol to network intermediate equipment through a transmission network;
the network intermediate equipment is used for receiving access authentication requests sent by a plurality of mobile network elements in an adjacent area and extracting network data and user identities of each mobile network element from each access authentication request; the network intermediate equipment estimates a second CSI value of a transmission channel, adaptively selects a modulation order according to the second CSI value, and demodulates the received information symbols into data streams according to the selected demodulation mode and the modulation order;
the network intermediate equipment authenticates a plurality of mobile network elements in the adjacent area according to an authentication strategy issued by the server, matches the user identity with an access relation model of a local specific object and judges the corresponding role of the user; analyzing the network data, judging whether the network access behavior and the access object are matched with the role corresponding to the user, if so, passing the authentication request of the mobile network element, and if not, rejecting the authentication request; the network intermediate equipment periodically reports the number of the mobile network elements in the adjacent area, historical authentication data of the mobile network elements, self load and network state to the server;
the server is used for dynamically adjusting the size of the adjacent area of each network intermediate device according to the information reported by the network intermediate devices, automatically deploying and expanding the security service resources of the network elements, updating the local access relation model of the server and the authentication strategy corresponding to each network intermediate device, and issuing the adjacent area adjustment information, the updated model and the authentication strategy to the network intermediate devices;
the server transmits the adjacent areas of the network intermediate devices to the display device in real time, and transmits the attack situation and the attack path extracted according to the historical authentication data of the mobile network element to the display device;
the display device is used for displaying the adjacent areas, attack situations and attack paths of the plurality of network intermediate devices on a large screen in real time;
the automatically deploying and expanding security service resources of the network element comprises the following steps: according to the load and the network state of the network intermediate equipment and the adjacent network intermediate equipment, deploying the security detection on the network intermediate equipment with the lightest load or the best network state;
when the security detection is deployed on other adjacent network intermediate equipment, the local network intermediate equipment acquires the judgment result of the other adjacent network intermediate equipment and uploads the judgment result and the deployment result of the local network intermediate equipment to a server;
the transmission service comprises the following steps: multimedia data, audio data, video data, text data or a combination of several of them.
CN201910476518.5A 2019-06-03 2019-06-03 Network security method and system Active CN110138878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910476518.5A CN110138878B (en) 2019-06-03 2019-06-03 Network security method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910476518.5A CN110138878B (en) 2019-06-03 2019-06-03 Network security method and system

Publications (2)

Publication Number Publication Date
CN110138878A CN110138878A (en) 2019-08-16
CN110138878B true CN110138878B (en) 2022-06-24

Family

ID=67579771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910476518.5A Active CN110138878B (en) 2019-06-03 2019-06-03 Network security method and system

Country Status (1)

Country Link
CN (1) CN110138878B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231693A (en) * 2010-04-22 2011-11-02 北京握奇数据系统有限公司 Method and apparatus for managing access authority
CN106559895A (en) * 2015-09-30 2017-04-05 北京展讯高科通信技术有限公司 Base station, MSA and its communication signal processing method and communication system
CN106603513A (en) * 2016-11-30 2017-04-26 中国人民解放军理工大学 Host identifier-based resource access control method and system
CN107426168A (en) * 2017-05-23 2017-12-01 国网山东省电力公司电力科学研究院 A kind of Secure Network Assecc processing method and processing device
CN108924169A (en) * 2018-09-17 2018-11-30 武汉思普崚技术有限公司 A kind of visual network security system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2485552B (en) * 2010-11-17 2014-11-12 Evolved Intelligence Ltd Mobile device roaming

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231693A (en) * 2010-04-22 2011-11-02 北京握奇数据系统有限公司 Method and apparatus for managing access authority
CN106559895A (en) * 2015-09-30 2017-04-05 北京展讯高科通信技术有限公司 Base station, MSA and its communication signal processing method and communication system
CN106603513A (en) * 2016-11-30 2017-04-26 中国人民解放军理工大学 Host identifier-based resource access control method and system
CN107426168A (en) * 2017-05-23 2017-12-01 国网山东省电力公司电力科学研究院 A kind of Secure Network Assecc processing method and processing device
CN108924169A (en) * 2018-09-17 2018-11-30 武汉思普崚技术有限公司 A kind of visual network security system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"高速移动场景自适应传输优化研究";高乾;《中国博士学位论文全文数据库工程科技Ⅱ辑》;20181130;第40、41、44、54、58、76、90页 *

Also Published As

Publication number Publication date
CN110138878A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
EP1737165A1 (en) Modification of IEEE 802.11e EDCA admission control parameters
CN111614657B (en) Mobile edge security service method and system based on mode selection
CN107566429A (en) Base station, the response method of access request, apparatus and system
CN110190998B (en) Network situation visualization method and system
CN102368714A (en) Network alarm processing method, apparatus and system thereof
CN104301395A (en) Method, electronic equipment and system for upgrading devices automatically
CN103326882A (en) Video monitoring network management method and video monitoring network management device
CN104811439A (en) Portal authentication method and device
CN114422201A (en) Network target range large-scale user remote access method and system
US9525897B2 (en) Insertion of a content item to a media stream
CN105657711B (en) A kind of method for connecting network and electronic equipment
US9094817B2 (en) Mobile device location authentication
CN104796383A (en) Method and device for preventing terminal information from being tempered
CN110381047B (en) Network attack surface tracking method, server and system
CN110138878B (en) Network security method and system
US20150036660A1 (en) Method, Device, and System for Identifying Traffic Type Across Devices
CN104581424A (en) Method, related equipment and system for streaming media transmission
CN110213269B (en) Network behavior data authentication method and system
CN113242301A (en) Method and device for selecting real server, computer equipment and storage medium
CN108377245A (en) A kind of optimizing demonstration method and system of network insertion request
CN110138804A (en) A kind of method and system of network security certification
CN106488530A (en) Presentation of information and sending method, focus cut-in method and system
CN110213768A (en) A kind of network behavior data-reusing authentication method and system
CN105554753B (en) Mobile communications network access system and method
Lähetkangas et al. Licensed shared access system possibilities for public safety

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant