Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method and an apparatus for verifying a security policy

A security strategy and verification result technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of difficult mass testing, integrity cannot be guaranteed, heavy workload, etc., to achieve convenient regression testing, improve verification efficiency and accuracy, Solve the effect of large amount of contrast

Active Publication Date: 2019-01-18
HANGZHOU DPTECH TECH
View PDF12 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this type of test has a certain degree of mechanicalness, repeatability, and heavy workload. It is difficult to conduct long-term reliability tests, and it is difficult to achieve a large number of tests in a short period of time. There are many strategies, which leads to the slow response of the device to process the page-turning query. At the same time, viewing the test results one by one strategy also leads to a large amount of tasks and is easy to make mistakes. The integrity cannot be guaranteed, which seriously affects the execution efficiency and accuracy of the test.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and an apparatus for verifying a security policy
  • A method and an apparatus for verifying a security policy
  • A method and an apparatus for verifying a security policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0022] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and an apparatus for verifying a security policy, wherein the method can be used for a test apparatus for verifying a plurality of security policies on a device under test. The method may include the steps of: sending a plurality of data streams to the device under test in a manner of sending one data stream at a time, wherein the plurality of data streamscorrespond to the plurality of security policies one-to-one; sending a plurality of data streams to the device under test in a manner of sending one data stream at a time; obtaining a matching resultof each security policy, wherein the matching result is a matching result recorded after the device under test matches the received data stream with the plurality of security policies one by one after receiving each data stream; determining a verification result of the plurality of security policies according to the matching result. In this way, the automatic verification of the security policy can be realized, and the automated processing process can check whether the security policy is effective or not, so that the overall verification efficiency and accuracy are improved, the regression testing of the software is more convenient, and the problems such as large contrast and easy to make mistakes in manual testing are solved.

Description

technical field [0001] The present application relates to the technical fields of network communication and software testing, in particular to a method and device for verifying security policies. Background technique [0002] Some devices, such as firewalls and other security devices, will configure security policies. In order to verify whether the security policies are effective, these security policies need to be tested. Taking a security device as an example, there are often a large number of similar security policies in the security device, and test cases for testing these security policies are indispensable in every software version of the security device. [0003] In the prior art, manual testing may be used to test these security policies. However, this type of test has a certain degree of mechanicalness, repeatability, and heavy workload. It is difficult to conduct long-term reliability tests, and it is difficult to achieve a large number of tests in a short period ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/20
Inventor 袁福鸿
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products