Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-domain access control method and system based on combination of marking and auditing

An access control and cross-domain technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as non-repudiation

Active Publication Date: 2018-11-23
SHENZHEN Y& D ELECTRONICS CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing method realizes the intrusion access of illegal users and the misoperation of legitimate users, which can achieve a certain security access control effect, but still faces the denial behavior of legitimate users, does not have anti-repudiation, and may bypass protection mechanism of intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain access control method and system based on combination of marking and auditing
  • Cross-domain access control method and system based on combination of marking and auditing
  • Cross-domain access control method and system based on combination of marking and auditing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0038] figure 1 Shown is a schematic flowchart of the cross-domain access control method based on the combination of marking and auditing provided by the embodiment of the present invention. according to figure 1 As shown, the cross-domain access control method based on the combination of marking and auditing includes the following steps:

[0039] Step S1: When the accessing subject in the first security level domain sends an access request to the visited subject in the second security level domain, authenticate and examine the attributes of the visiting subject and the visited subject to determine whether the visiting subject and the visited subject are related. The legitimacy of the subject being accessed; the attributes include: role and secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer information security, in particular to a cross-domain access control method and system based on marking and auditing combination. The method and the system can be applied to cross-domain security protection and interconnection and interworking of electronic transaction systems such as medium and large enterprise systems including railway ticketing systems, air ticket systems, electronic government affairs and electronic commerce systems and the like. An access process and an access result are recorded and audited by performing security level marking and authentication on an access main body, a role and an accessed main body; security access having behavior traceability and non-repudiation is realized; and the aims of interconnection and interworking of a cross-domain boundary application system under a security condition are fulfilled.

Description

technical field [0001] The present invention relates to the field of computer information security, in particular to a cross-domain access control method and system based on the combination of marking and auditing, which can be applied to electronic transaction systems, such as railway ticket systems, air ticketing systems, e-government and e-commerce systems, etc. Cross-domain security protection and interconnection of medium-sized enterprise systems. Background technique [0002] With the continuous development of computer and network technology, the process of informationization at home and abroad is developing rapidly, and the application of e-commerce, e-commerce, and information systems of large and medium-sized enterprises has gradually become widespread and complicated. With the convenience and speed of information brought by the application of information network systems, the issue of information security has become the main problem faced by application development....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L9/3247H04L63/0428H04L63/0876H04L63/102
Inventor 郑伟范戚建淮彭华姚兆东刘建辉
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More