IMA processor system information security management method

A technology of security management and system information, which is applied in the field of information security management of IMA processor system, and can solve the problems of information security storage and access, etc.

Active Publication Date: 2016-04-27
XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the technical problems existing in the background technology, the present invention proposes an information security management method for an IMA processor system, which can effectively manage informa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IMA processor system information security management method
  • IMA processor system information security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention proposes an information security management method for an IMA processor system, which divides the information of the IMA processor system into four security levels of top secret, confidential, secret, and common for management. It can be stored in the processor system, but the top secret and confidential information are prohibited from being stored in the processor system in total, and only temporarily loaded through the data loader; top secret information, confidential information, and secret information are identified and encrypted according to the level; system applications are classified according to the corresponding security level To manage and control information access rights, high security level users can access low security level information, and low security level users are prohibited from accessing high security level information. The secret information stored in the IMA processor system is automatically encrypted by hardware, and the el...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IMA processor system information security management method, comprising following steps: 1), information security management total method: 1.1), dividing IMA processor system information into four security levels of top secret, confidential, secret and ordinary information, managing the information; setting the security level of the top secret information to be highest, setting the security level of the ordinary information to be lowest; 1.2), storing the secret and ordinary information in a processor system, forbidding storing the top secret and confidential information in the processor system, only temporarily loading the top secret and confidential information through a data loader; 1.3), identifying and encrypting the top secret, confidential and secret information according to the levels; 1.4), carrying out information access authority management and control according to corresponding security levels. According to the IMA processor system information security management method provided by the invention, the information using authority is effectively managed; the information transmission flow direction is controlled; and the information security storage access problem of the IMA processor system resulted from high resource sharing and high data fusion is solved.

Description

technical field [0001] The invention belongs to the technical field of embedded computer system design, and in particular relates to an information security management method of an IMA processor system. Background technique [0002] The IMA processor system has the characteristics of highly shared resources, highly integrated data and highly intensive software, so it processes and shares information of different security levels, which brings about the problem of safe and timely information sharing among different users. Aiming at this problem, an IMA processor system information security management method is proposed. The IMA processor system information is divided into top secret, confidential, secret and ordinary four security levels for management. Information can be stored in the processor system, while top-secret and confidential information are prohibited from being stored in the processor system in total, and only temporarily loaded through the data loader; top-secret...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/28G06F21/62
CPCG06F21/6236H04L9/14
Inventor 李成文湛文韬汤艳飞王纯委何小亚姜琳琳
Owner XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products