Invention Grant
US08955098B2 Establishing network security using internet protocol security policies 有权
使用互联网协议安全策略建立网络安全

Establishing network security using internet protocol security policies
Abstract:
Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from a layered service provider. Therefore, policies such as Internet Protocol security (IPsec) policies can be defined and implemented so that they more accurately reflect the network's security requirements.
Information query
Patent Agency Ranking
0/0