Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication security processing method, apparatus and system

A communication security and processing method technology, which is applied in the field of communication security processing methods, devices and systems, and can solve problems such as inability to be safely isolated

Active Publication Date: 2014-04-09
HUAWEI TECH CO LTD
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The characteristics of cloud computing are: "sharing", "boundaryless" and "dynamic". Security isolation during communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication security processing method, apparatus and system
  • Communication security processing method, apparatus and system
  • Communication security processing method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0106] The communication security processing method of the embodiment of the present invention can be applied to the communication between devices in various communication systems, especially the communication between virtual machines and physical machines in the current cloud computing system.

[0107] figure 1 is an application scenario diagram of a communication security processing method according to an embodiment of the present invention, such as figure 1 As shown, the system in this application scenario includes hosts 21, 22, 31, and 32, and a security gateway 1. The host includes physical devices such as computers, and multiple virtual machines can be run on t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a communication security processing method, a relevant apparatus and a system, wherein the method comprises the steps of a security gate receiving a report transferred by a host, and the report is transmitted from a source device to a target device; determining a security domain that a first user belongs to when logging in the source device, and a security domain that a second user belongs to when logging in the target device. If the security domain that a first user belongs to is the same to the security domain that a second user belongs to, conduct security processing to the report according to domain-inside security policy; and if the security domain that a first user belongs to is different from the security domain that a second user belongs to, conduct security processing to the report according to inter-domain security policy. According to the embodiment of the invention, the security domain that a user belongs to can be determined according to the user information, and different security processing policies can be conducted based on whether the security domains are the same or not, therefore, safe isolation is realized, and communication security among users are guaranteed.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a communication security processing method, device and system. Background technique [0002] In the traditional communication system, the isolation method used for communication between different users is physical isolation, that is, the traffic data of users in each department will be transmitted through a certain interface or sub-interface, and these interfaces or sub-interfaces will be directly Join the security domain corresponding to the department, and then configure security policies based on interfaces or sub-interfaces for security isolation. [0003] With the development of electronic technology and Internet technology, the way to realize the communication system is becoming more and more complex, and cloud computing is gradually emerging. Cloud computing is the increase, use and delivery mode of related services based on the Internet, usually involving t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 赵鸽
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products