Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for obtaining software security requirement by using module security analysis

A security and demand technology, applied in the field of obtaining software security requirements by module security analysis, can solve the problems of lack of tracking relationship, non-disclosure of information, and lack of standardized expression of information interface, so as to achieve good management of information data and good security. Sexual needs analysis, the effect of convenient communication

Active Publication Date: 2015-09-09
BEIHANG UNIV
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Lack of establishing and maintaining the tracking relationship between software security requirements and system functional requirements
[0007] (3) In the process of complex system development, information is not disclosed due to restrictions such as contracts
Due to the contractual relationship, there is no standardized expression of the information interface between each other, so that in the process of security requirements analysis, the input is not perfect, resulting in incomplete requirement capture
[0008] (4) Lack of reasonable summary and classification of software security requirements
However, this classification ignores the consideration of safety integrity requirements and design constraints

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining software security requirement by using module security analysis
  • Method for obtaining software security requirement by using module security analysis
  • Method for obtaining software security requirement by using module security analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and are used together with the embodiments of the present invention to explain the principles of the present invention.

[0057] Such as figure 1 as shown, figure 1 It is a schematic flow chart of the method described in the embodiment of the present invention, which may specifically include:

[0058] Step 101: For each subsystem, develop a module according to the requirement of safety analysis in the subsystem, and establish a corresponding safety analysis module;

[0059] Such as figure 2 As shown, the security analysis process is carried out in parallel with the system requirements development and design development process, and has a close corresponding relationship with it. After the requirements development has been carried out to a certain extent, design is car...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for obtaining a software security requirement by using module security analysis. The method comprises the following steps: establishing a corresponding security analysis module in a computer terminal aiming at each subsystem according to a requirement development module to be subjected to security analysis in the subsystem; performing security analysis on system software or specific software of the subsystem according to functional information and design decision information input by a database to generate a hazard analysis model; outputting the software security functional requirement and the corresponding design decision to the requirement development module and a design development module to form a new requirement development module and design development module. One information interface, which is suitable for coordinately developing a security-critical system by multiple mechanisms, is established; a system hazard analysis field model template is constructed in reference to related security standard to support security analysis personnel to analyze system hazard and capture specific software security requirement in a systematic and structural mode.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a method for acquiring software safety requirements by module safety analysis. Background technique [0002] Software requirements describe the behavior, characteristics or attributes required by the system from the user's point of view, and are the bridge between users and developers. Accurate and complete requirements are the fundamental basis for guiding the subsequent analysis, modeling, development and testing of the system. Especially in the field of aviation, the incomplete capture of safety requirements for airborne software may cause significant property damage, damage the environment, and even endanger human life. Therefore, it is very necessary and urgent to study the security requirements acquisition of airborne software. [0003] There are certain similarities in the identification process of security requirements defined in existing research and standard...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06Q10/06
Inventor 刘超郑培真杨海燕吴际
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products