Mandatory access control method and system based on fusion of multiple protection strategies

A mandatory access control and multi-protection technology, applied in transmission systems, electrical components, etc., can solve problems such as data access security improvement

Inactive Publication Date: 2016-09-21
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current mandatory access control model, only a single protection strategy is usually used to control access, which limits the further improvement of data access security to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mandatory access control method and system based on fusion of multiple protection strategies
  • Mandatory access control method and system based on fusion of multiple protection strategies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] The embodiment of the present invention discloses a mandatory access control method based on the fusion of multiple protection policies, see figure 1 As shown, the method includes:

[0044] Step S11: When receiving the access request sent by the subject for the object, extract the pre-embedded security mark on the subject and the pre-embedded security mark on the object; wherein, both the subject's security mark and the object's security m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a mandatory access control method and system based on fusion of multiple protection strategies. The method comprises the steps of: when receiving an access request which is sent by a subject and aims at an object, extracting security labels embedded in advance on the subject and extracting security labels embedded in advance on the object, wherein both the security labels of the subject and the security labels of the object comprise confidentiality labels and completeness labels; by utilizing the security labels of the subject and the security labels of the object, judging whether the access request meets a preset confidentiality control rule and a preset completeness control rule, if yes, carrying out authorization on the access request, and if no, refusing the access request. According to the application, the confidentiality protection strategy and the completeness protection strategy are fused to carry out access control on the access request, so that data access security can be effectively promoted.

Description

technical field [0001] The invention relates to the technical field of data access, in particular to a mandatory access control method and system based on the fusion of multiple protection policies. Background technique [0002] With the rapid development of computer applications, information security becomes more and more important. Access control is an important way to protect data from being intentionally deleted and destroyed in a computer, and mandatory access control is one of the most important methods. [0003] Mandatory access control is "imposed" on the access subject, that is, the system forces the subject to obey the access control policy. The main feature of mandatory access control is to implement mandatory access control for all subjects and the objects they control (such as processes, files or equipment, etc.). Mandatory access control is generally used in combination with voluntary access control. A subject can only access an object after passing the volun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/101H04L63/102H04L63/105
Inventor 马文涛
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products