Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Checkig method for protecting integrality of outline based on products of information technology of relational database

An integrity inspection and information technology technology, applied in the field of information technology product safety testing and evaluation equipment, which can solve problems such as difficulty in ensuring the consistency and scientificity of evaluation results, lack of strict evaluation process and methods, etc.

Inactive Publication Date: 2008-07-09
NANJING UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The main purpose of the present invention is to provide a protection profile based on a relational database in view of the problems that the evaluation process of the current protection profile relies on experience and manual operations, the evaluation process and methods lack strict specifications, and it is difficult to ensure the consistency and scientificity of the evaluation results. Integrity checking method to improve the evaluation efficiency of safety evaluation equipment, standardize the evaluation process, and ensure the correctness of evaluation results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Checkig method for protecting integrality of outline based on products of information technology of relational database
  • Checkig method for protecting integrality of outline based on products of information technology of relational database
  • Checkig method for protecting integrality of outline based on products of information technology of relational database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] As shown in Figure 1, the safety detection and evaluation equipment inputs the protection profile to be evaluated through the keyboard, and uses the normalization module to convert the protection profile into structured organizational information that is easy to handle, including main data such as environmental analysis, safety purpose, and safety requirements. Then, the integrity check of the protection profile is performed by the verification check mechanism, and the threat policy mapping table (referred to as the threat mapping table) and the security purpose mapping table are queried and compared during the checking process.

[0022]The method of the present invention is shown in FIG. 2 . Step 10 is the initial action. Step 11 is to input the protection profile to be evaluated. The protection profile includes protection profile identification, description, environment, security purpose, security requirements, and principles. Relevant to inspection and verification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following steps: (1) inputting protected outline to be evaluated; when inputting protected outline, the method logs in item of input data as unit item by item, and the logged items are stored in data sheet in memory; (2) carrying out normalizing and structurizing process for protected outline; and storing the processed result in each table of database; according to content, storing set of data item in memory to respective table of database; (3) carrying out integrity checking for target of safety; using map of threat strategy validates whether target of safety in protected outline is complete; (4) inspecting integrity for safety requirement; comparing with map of target of safety validates whether safety requirement in protected outline is complete; (5) forming validated and inspected report; (6) ending. The invention raises efficiency for evaluating devices and normative evaluating procedure.

Description

technical field [0001] The invention relates to information technology product safety detection and evaluation equipment, in particular to a relational database-based integrity inspection method for integrity evaluation of information technology product protection profiles. Background technique [0002] Security assessment is an important basis for information technology products to be put into use and selected for use in information systems. Information technology product safety testing and evaluation equipment is an important component widely used in safety evaluation systems, and can be widely used in the design, development, use and maintenance of important information systems in political, national defense, commercial, cultural and other application fields. It plays an important role in improving the security guarantee capability of the information system. [0003] CN129852 discloses a method for matching security type attributes in a database, the database includes a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
Inventor 曾庆凯
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products