Operating system peripheral access permission control method based on users

An operating system and peripheral access technology, applied in the field of computer security, can solve the problems of single control method, inability to distinguish control, coarse control granularity, etc., and achieve the effects of strong scalability, strong peripheral recognition ability, and good stability

Active Publication Date: 2015-03-25
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires the driver to be compiled into a module and loaded into the system, and there are only two control modes for the use of the device, which are available and disabled. The granularity is relatively coarse, and it is impossible to differentiate the control according to the user.
To sum up, the existing equipment sealing and control methods have the problems of coarse control granularity and single control mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operating system peripheral access permission control method based on users
  • Operating system peripheral access permission control method based on users
  • Operating system peripheral access permission control method based on users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Such as figure 1 As shown, the implementation steps of the user-based operating system peripheral access authority control method in this embodiment are as follows:

[0044] 1) Establish a device feature database for classifying peripherals; classify users in the operating system into different user roles, establish a device usage policy for configuring whether each user role is allowed to use a specified device type, and control whether Each user role is allowed to use the mandatory access control switch of the specified device type, respectively establishes a user access control list including whether to enable user control and the user's access rights to the specified device type, including whether to enable user group control and the user group's access to the specified device type The user group access control list of access rights information, the user role access control list including whether user role control is enabled and the access rights information of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operating system peripheral access permission control method based on users. The method includes the steps of firstly, building an equipment feature database, classifying the users into different user roles, building equipment application strategies and mandatory access control switches, and respectively building a user access control list, a user group access control list, and a user role access control list; updating the states of all the mandatory access control switches; secondly building and maintaining a system dialogue list; thirdly, monitoring equipment change in an operating system; fourthly, determining final access permission information according to peripheral equipment types, and controlling users' peripheral application in the operating system according to the mandatory access control switches and the final access permission information. The method is high in peripheral identification capability, safe and reliable, good in stability, good in universality, high in expandability, high in malware destroying preventing capability, fine in control granularity, and high in overall flexibility.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a user-based method for controlling the access authority of operating system peripherals. Background technique [0002] With the popularity of portable storage devices and removable devices, data leakage poses an increasing threat to commercial companies and enterprises. Things like USB storage devices, scanners, and CD-ROM drives can be successfully connected to the company network without the IT administrator noticing, resulting in the disclosure of corporate confidential data. The use of portable devices also makes it easy for viruses and malware to infiltrate systems and ultimately compromise entire corporate networks. Companies and enterprises need to ensure that only trusted devices can access the system and authorized users can use devices while maintaining work efficiency, so as to ensure the security of corporate data. [0003] In the prior art, in the operat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45
CPCG06F21/604G06F2221/2141
Inventor 陈松政吴庆波宋川飞张卫华魏立峰董攀黄辰林罗军丁滟唐晓东
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products