18491421. Access Control Method and Related Device simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

Access Control Method and Related Device

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

Bingyang Liu of Shenzhen (CN)

Xue Yang of Shenzhen (CN)

Ting Xu of Nanjing (CN)

Chuang Wang of Shenzhen (CN)

Access Control Method and Related Device - A simplified explanation of the abstract

This abstract first appeared for US patent application 18491421 titled 'Access Control Method and Related Device

Simplified Explanation

The abstract of the patent application describes a policy enforcement device that receives a data packet from a source device. The data packet contains information about the security groups of both the source device and the destination device.

  • The source device belongs to a specific security group.
  • The destination device of the data packet belongs to a different security group.
  • The policy enforcement device is responsible for enforcing security policies between these security groups.

Potential applications of this technology:

  • Network security: The policy enforcement device can be used to enforce security policies between different security groups within a network, ensuring that only authorized communication takes place.
  • Access control: The technology can be applied to control access to sensitive resources or information based on the security groups of the source and destination devices.
  • Intrusion detection and prevention: By analyzing the security group information in data packets, the policy enforcement device can detect and prevent unauthorized access attempts.

Problems solved by this technology:

  • Unauthorized access: The technology helps prevent unauthorized access to sensitive resources by enforcing security policies between different security groups.
  • Network breaches: By controlling communication between security groups, the technology reduces the risk of network breaches and data leaks.
  • Policy enforcement complexity: The device simplifies the enforcement of security policies by automatically analyzing the security group information in data packets.

Benefits of this technology:

  • Enhanced network security: By enforcing security policies between security groups, the technology improves overall network security and reduces the risk of unauthorized access.
  • Simplified policy enforcement: The device automates the enforcement of security policies, reducing the complexity and manual effort required.
  • Efficient resource protection: By controlling access to sensitive resources based on security group information, the technology helps protect valuable assets from unauthorized access.


Original Abstract Submitted

A policy enforcement device receives a first data packet sent by a source device. The first data packet carries information about a source security group and information about a destination security group, where the source security group is a security group to which the source device belongs, and where the destination security group is a security group to which a destination device of the first data packet belongs.