US 12,445,454 B2
Network security management method and computer device
Zhen Deng, Beijing (CN); Zhixin Lin, Beijing (CN); Qi Xiang, Beijing (CN); Quan Zhou, Beijing (CN); and Chanjuan Zhang, Beijing (CN)
Assigned to TENCENT CLOUD COMPUTING (BEIJING) CO., LTD, Beijing (CN)
Filed by TENCENT CLOUD COMPUTING (BEIJING) CO., LTD, Beijing (CN)
Filed on Mar. 20, 2023, as Appl. No. 18/123,622.
Application 18/123,622 is a continuation of application No. PCT/CN2021/107139, filed on Jul. 19, 2021.
Claims priority of application No. 202110555000.8 (CN), filed on May 20, 2021.
Prior Publication US 2023/0300141 A1, Sep. 21, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/105 (2013.01) [H04L 63/20 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A network security management method, comprising:
receiving configuration data that includes at least one access control policy for a network asset of a target cloud tenant, the network asset including a private network, a subnet of the private network, and a cloud instance of the subnet;
displaying a network security management interface, the network security management interface including a configuration area based on the configuration data;
determining, by processing circuitry and according to the configuration data, a network management and control unit and a first access control policy set corresponding to the network management and control unit, the network management and control unit including one or more of a private network-level management and control unit, a subnet-level management and control unit, and an instance-level management and control unit;
transmitting a policy acquisition request to a server in response to a policy viewing instruction received via the configuration area of the network security management interface, the policy acquisition request including an instance identifier of the cloud instance;
receiving a second access control policy set corresponding to the network management and control unit associated with the cloud instance; and
displaying, on the network security management interface, one or more access control policies included in the second access control policy set.