Unlock instant, AI-driven research and patent intelligence for your innovation.

Process access control method and device based on access control list

An access control list and access control technology, which is applied in the field of data security and can solve the problems of lack of resistance to attacks and process control that cannot access data.

Active Publication Date: 2019-05-17
江西前江信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional access control technologies based on user rights or user groups cannot control the process of accessing data, and lack the ability to resist attacks from hijacked processes and maliciously modified programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process access control method and device based on access control list
  • Process access control method and device based on access control list
  • Process access control method and device based on access control list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] refer to Figure 1 to Figure 3 , an embodiment of the present invention provides a process access control method based on an access control list, which sequentially includes authorization S 1 , certification S 2 , License S 3 and Audit S 4 four processes.

[0028] authorized 1 : First read the access rule list set by the user R={r 1 ,r 2 ,r 3 ,...,r n}; rule r in list k Described for controlled data D k , a specific program P k Access permission for the rule r k The composition includes T k 、D k ,P k ,P Shell k ,P Children k ; For each access rule r in the rule list R k , Calculation related program P k , script runner P Shell k , subroutine P Children k The MD5 characteristic value S of , set up the characteristic value list PS={[P 1 ,S 1 ],[P 2 ,S 2 ],[P 3 ,S 3 ],...,[P n ,S n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a process access control method and device based on an access control list. The method comprises an authorization step S1 of reading an access rule list R={r<1>, r<2>, r<3>, ..., r<n>} set by a user, wherein a rule r<k> in the list describes access permission of a special program P<k> for controlled data D<k>; an authentication step S2 of obtaining process information info<x> when a process X put forwards an access request for the controlled data D<x>, wherein the process information comprises PID<x> and P<x>, and searching the P<x> in a feature value list PS according to the P<x> in the info<x>; a permission step S3 of searching the rule r<x> containing [D<x>, P<x> ] in the access rule list R, and carrying out authentication S2 on the P<Sheel><x> / P<Children><x> when the r<x> exists and the X requires a script operator P<Shell><x> / sub-program P<Children><x>; and an audit step S4 of keeping access records for each time access of each process X. According to a program access control model based on the access control list provided by the method and the device, through definition of a blacklist / whitelist of program accessible data, the data access can be finely controlled.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a process access control method and device based on an access control list. Background technique [0002] In the field of computer security, there is a principle of least privilege, which requires that each module of a specific abstraction layer in the computing environment, such as a process, user, or computer program, can only access the information or resources necessary for the moment, and protect data and functions from errors or Malicious acts of sabotage. [0003] Traditional access control technologies based on user rights or user groups cannot control the process of accessing data, and lack the ability to resist attacks from hijacked processes and maliciously modified programs. Contents of the invention [0004] The main purpose of the present invention is to provide a process access control method and device based on the access control list. Based on the access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101
Inventor 彭日濂王界兵梁猛施莹张伟董迪马
Owner 江西前江信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More