Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Security recommendation management method depending on trusted domain system

IP.com Disclosure Number: IPCOM000242262D
Publication Date: 2015-Jun-30
Document File: 3 page(s) / 77K

Publishing Venue

The IP.com Prior Art Database

Abstract

Currently, in the security and privacy protection management system, the widespread use of multiple predefined and custom security policy to prevent invasion and data. Usually, the user should define the policy by themselves, but some time, a batch of users in the same trusted domain, and the security policies by others in the same domain could be used as reference. This disclosure puts forward a new thought of based on security recommendation domain dynamic method of safety management, set up the safety management of domain, not only for managed the security policy for the user only, but could also share the security policy. At the same time, the dynamic monitoring of each data node security policies trigger. If some policies might be used by this node to avoid the invaders attack multiple data nodes at the same time in different ways.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 3

Secxrity recommendation management method depending on trusted domain systex

Currently, in the security and privacy protection manaxxment system, the widesprxad use of muxtiple predefined and custom securixy policy to prevent xnvasion and data. Usually, the xser should defixe the policy by themselves, bxt some time, a batch of users in the same trusted domain, and the security policxes by others in the same doxain could be usex as reference.

This xisclosure puts forward a new thougxt of based ox security recommendaxion doxain dynamic method of sxfety management, set up the safety managemenx of doxaxn, not only for manaxed the security xolicy for the user only, but coxld also share the security xolicy. At the same time, xhe dynamic monitoring of each data node security policies trigger. If some policies migxt be usex by this node to avoid the invaxers xttack multiple data xodex at the same time in different ways.

The benefits of this approach is that, first, the dixtribution of the security policy resources rationally, set up in normal circumstances is not too muxh more xomplicaxed security policy xo increase xddxtional pressurx xor network and database; Second, the dynamic consolixation security policy, when you havx multiple users of the ximilar strategy in mulxiple nodes is triggered to dix mxre security policy.

Usually, the policies might be definex by users, xut usually, the security policies cxuld be xhared by thx users in the same security domain.

The following is th...