Trust access control method for comprehensive avionics system

An avionics system and access control technology, applied in the direction of digital data authentication, platform integrity maintenance, etc., can solve problems such as aircraft safety and reliability hazards, to prevent leakage of sensitive information, ensure controllability and safety, The effect of credibility assurance

Inactive Publication Date: 2015-03-25
AVIC NO 631 RES INST +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a highly integrated avionics system, resources are highly shared, data is highly fused, and software is highly intensive. Different levels of tasks share a unified hardware platform, which brings major hidden dangers to the safety and reliability of aircraft.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust access control method for comprehensive avionics system
  • Trust access control method for comprehensive avionics system
  • Trust access control method for comprehensive avionics system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In the integrated avionics system, each call to system services or access to system resources must be authorized to ensure that only calls or access that comply with the control strategy can be performed. The access control based on the trusted access control system ensures the controllability and security of the application partition's access to system services and system resources, prevents malicious code from leaking sensitive information, and provides a strong guarantee for the credibility of the integrated avionics system. The access control model based on the trusted access control system draws on the ideas of the Bell-LaPadula (BLP) model and the BIBA model, considers the issues of confidentiality and integrity, and establishes a trusted authorization strategy.

[0033] according to figure 1 Concrete method of the present invention is described:

[0034] The steps of the trusted access control method are as follows:

[0035] 1) Build a trusted access control sy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the information security technology field of a comprehensive avionics system, and particularly relates to a trust access control method for the comprehensive avionics system. The method comprises the following steps: firstly constructing a trust access control system; then carrying out access control of the comprehensive avionics system on the basis of the trust access control system. Through the method disclosed by the invention, the controllability and security of application partitioning for system service and system resource access are guaranteed, malicious codes are prevented from leaking sensitive information, and a powerful safeguard is provided for the credibility of the comprehensive avionics system.

Description

technical field [0001] The invention belongs to the technical field of information security of an integrated avionics system, and in particular relates to a trusted access control method for an integrated avionics system. Background technique [0002] Aviation information security is one of the most challenging issues in the integrated avionics system. Strengthen the active defense level of the airborne embedded system, build and improve the security system of the integrated avionics system, protect the equipment system from external threats and improve The invulnerability of aviation equipment systems is of great significance and has attracted widespread attention at home and abroad. In a highly integrated avionics system, resources are highly shared, data is highly fused, and software is highly intensive. Different levels of tasks share a unified hardware platform, which brings major hidden dangers to the safety and reliability of aircraft. Contents of the invention [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/57
CPCG06F21/31G06F21/57
Inventor 崔西宁周银萍牟明李亚晖张志为王宁韩春阳习宁张树兵
Owner AVIC NO 631 RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products