Security-marker-based access control method and related system

A security mark and access control technology, applied in transmission systems, electrical components, etc., can solve problems such as the inability to manage the unified management of subject access control, and the inability to adapt to the development needs of building a security mark protection level information system

Inactive Publication Date: 2012-04-11
SHANDONG CVIC SOFTWARE ENG +1
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, according to the current access control method that is operated by the application itself, each application needs to be developed for application and authorization, and it is impossible to manage the access control of the subject at the middleware layer in a unified manner, and it is also unable to adapt to the construction of security. Marking the need for development of protection-level information systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security-marker-based access control method and related system
  • Security-marker-based access control method and related system
  • Security-marker-based access control method and related system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The embodiment of the present invention provides an access control method based on a security mark, which is used to apply MAC technology to the middleware layer, so that the access control of the subject can be managed uniformly at the middleware layer, and at the same time, it is adapted to the construction of security mark protection level information. system development needs. Embodiments of the present invention also provide related systems, which will be described in detail below.

[0028] Please refer to figure 1 , mainly including steps:

[0029] 101. The middleware suite acquires a web access request message.

[0030] Wherein, before the subject accesses the object, it sends a web access request message to the middleware, and the middleware package can obtain the web access request message. The web access request message includes information such as the subject security mark and the name of the object.

[0031] 102. The middleware suite acquires the security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a security-marker-based access control method and a related system, which are used for performing unified management on the access control of a middleware layer over a subject. The method comprises that: a middleware kit acquires a web access request message; the middleware kit acquires a security marker of the subject and the name of an object from the web access request message, wherein the subject is an accessing party, and the object is an accessed party; the middleware kit queries the name of the object, and acquires a security marker of the object; and the middleware kit performs the access control on web accessing according to the security markers of the subject and the object. By the technical scheme, the unified management over the access control of the middleware layer over the subject can be realized; moreover, the method is implemented on the basis of the security markers, and is adapted to the development requirements of construction of a security marker protection level information system at the same time.

Description

technical field [0001] The invention relates to the technical field of middleware, in particular to an access control method and a related system based on a security mark. Background technique [0002] An important technology to protect information security is access control technology. The so-called access control refers to restricting the subject's access to certain objects according to the subject's identity and a predefined group to which it belongs. The implementation of access control has three main purposes: 1. To prevent illegal subjects from accessing protected objects. 2. Allow legal subjects to access protected objects. 3. Prevent unauthorized access to protected objects by legal subjects. [0003] In order to strengthen the work of information security protection, my country has promulgated the "Computer Information System Security Level Classification Criteria" and "Information System Security Level Protection Requirements", and established the information sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L29/06
Inventor 赵欣刘欢迎车帅刘春
Owner SHANDONG CVIC SOFTWARE ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products