Security policy setting and determining method, and method and device for executing operation by application program
A technology of security policy and application program, which is applied in the field of communication, can solve the problem of inflexibility in the scheme of assigning security policies, and achieve the effect of improving flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0029] When the inventor analyzed the security policy distribution scheme provided by the prior art, he found that its shortcomings are mainly reflected in the following two points:
[0030] 1. The static nature of the certificate system. After the application is signed by the signing certificate, a series of security attributes such as its security domain mapping and security authority are determined statically, which cannot be dynamically configurable and adjustable;
[0031] 2. The unity and simplicity of the security system. When the security policy distribution scheme provided by the prior art is adopted, it is selected from a plurality of preset security policies, which results in that the application program identifier will be mapped to a number of fixed security domains. Analysis shows that these security domains may not reflect all the operations that the application can perform.
[0032] In order to solve the above-mentioned problems in the solution of assigning a securit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap