Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted third-party software building method

A construction method and credible technology, applied in the fields of information security and trusted computing, can solve the problems that users cannot trust security requirements, cannot prove authenticity, and monitoring methods are not credible, etc.

Active Publication Date: 2015-01-28
BEIJING UNIV OF TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing methods only obtain information such as the user who uses the software, the operating system, and basic software access control (such as user name, operating system version number, software usage rights, etc.), and cannot implement finer-grained software access control during the running of the software. Specific Behavior Monitoring
[0006] (3) The monitoring method is unreliable
Since users lack a way to monitor third-party software in real time, users cannot trust that software developers' software can meet their security needs; existing monitoring methods cannot prove the authenticity of monitored behavior information, resulting in software credibility that cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted third-party software building method
  • Trusted third-party software building method
  • Trusted third-party software building method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The present invention will be further described below in combination with embodiments.

[0074] For third-party software whose security is unknown, users can use the method involved in the present invention to build trusted software that meets their security requirements. The flow chart of the implementation method is as follows: figure 1 shown, including the following steps:

[0075] Step 1, generate the syntax and semantics description of the XACML trusted software policy, as shown in Table 1 and Table 2, to help users formulate trusted software policies that meet their own needs.

[0076] Step 2, generating a trusted software policy. Generate baseline policies, custom parameter extensions, custom policies.

[0077] 1) Baseline policy generation, according to the trusted software policy semantic description in step 1, write the corresponding content of the general policy listed in the trusted software policy semantic description into the corresponding la...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security and trusted computing, and relates to a trusted third-party software building method. The method includes: generating trusted software strategy grammar semantics based on an XACML language according to security requirements of trusted software building; a user generating a trusted software strategy library of third-party software according to the trusted software strategy grammar semantics provided by the method and referring to parameter expansion strategies and provided and self-defined strategies by software developers; using trusted software generation tools to automatically build trusted software. The trusted third-party software building method is high in flexibility; fine-grained software behaviors can be monitored, monitoring codes can be generated through the trusted software strategies, and effective control over the software behaviors is realized. Monitoring requirements of the users are described through the trusted software strategies on the bases of the XACML language, and good universality and expandability are achieved; the monitoring codes are automatically generated on the basis of the trusted software strategies, and influence of the users on security of the third-party software is enhanced.

Description

technical field [0001] The invention belongs to the technical field of information security and trusted computing, and in particular relates to a third-party software trusted construction method. Background technique [0002] With the rapid development of computing resources, users are increasingly dependent on software, and the expression of their large computing needs is usually realized through various software. However, at this stage, it is difficult to guarantee the security of third-party software that provides assistance to users. It is not uncommon for users to experience system exceptions and personal data leakage in the process of using these software, which makes users unable to fully trust the services provided by third-party software. [0003] Trusted software construction refers to building software that conforms to predetermined security policies by adding security modules inside or outside the software. It is an important means to improve software credibilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 詹静蔡磊梁毅
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products