Computer system safety protection method and device

A security protection device and computer system technology, applied in the computer field, can solve problems such as difficulty in guaranteeing the security of computer operating systems

Inactive Publication Date: 2015-06-17
INSPUR GROUP CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the increasing complexity of computer operating systems, the types of peripheral terminals and applications are increasing, especially with the popularity of the Internet, the pressure of network threats faced by computer operating systems is increasing day by day, making...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system safety protection method and device
  • Computer system safety protection method and device
  • Computer system safety protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] Such as figure 1 As shown, the embodiment of the present invention provides a computer system security protection method, the method may include the following steps:

[0032] Step 101: Abstract each operation object related to access as a node in the data space, and each node has a coordinate value in the data space.

[0033] Step 102: Determine the access track corresponding to each node according to the coordinate value of each node in the dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computer system safety protection method and device. The method includes the steps that all operation objects related to visit are abstracted to nodes in data space, and all the nodes are provided with coordinate values in the data space; the visit tracks corresponding to all the nodes are determined according to the coordinate values of all the nodes in the data space; a visit request of the first node is received, whether the visit is allowed or not is judged according to the corresponding visit track of the first node, and if yes, the visit is allowed; the safety protection of a computer system is achieved according to the scheme.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a computer system security protection method and device. Background technique [0002] With the increasing complexity of computer operating systems, the types of peripheral terminals and applications are increasing, especially with the popularity of the Internet, the pressure of network threats faced by computer operating systems is increasing day by day, making the security of computer operating systems more and more Difficult to guarantee. [0003] At present, the authorization management mode can be used to set the authority between the visitor and the visited, however, there are some common loopholes in the current authorization management mode. For example, set user Person A to have permission to access Table B in database 1, set application APP C to have permission to access Table D in database 1, but Person A does not have permission to access Table D, if Person A can r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31
Inventor 张家重董毅李光瑞王玉奎张涛
Owner INSPUR GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products