A Message Access Control Method Based on Network Mark
A technology of access control and access control strategy, applied in electrical components, transmission systems, etc., can solve the problem that network security cannot be better guaranteed, and achieve the goal of marking and implementing isolation, protecting network security, and high network security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] like figure 1 As shown, the implementation steps of the packet access control method based on network marking in this embodiment are as follows:
[0020] 1) Set the access control policy in the operating system in advance and add a mandatory access control module based on the access control policy. Each entry in the access control policy includes the application program, security network identifier and access status; at the network layer Added the function of setting the security network identification for the filtered packets in the firewall;
[0021] 2) Screen and filter each message in the network message flow entering and leaving the firewall through the firewall according to the preset firewall rules and the network information of the message, and set a security network identifier for the message that passes the filter;
[0022] 3) For each current message that passes the screening, the mandatory access control module checks the access control policy according to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


