Mobile thin terminal safety model establishing method and device based on Web operating system

An operating system and security model technology, applied in the computer field, can solve problems such as high server capacity requirements, different performance and response capabilities, and low security requirements, and achieve the effect of ensuring security

Active Publication Date: 2017-08-04
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the main problem of implementing thin terminals based on VDI is: high requirements on server capacity, for other server-based modes, performance and responsiveness will vary according to the number of users, physical location and application type
[0006] However, the current problems of thin terminals based on Web OS are: the design of Web OS focuses on mobility and cross-platform, does not have high requirements for security, and does not have higher requirements for confidentiality and integrity
The current Web OS lacks integrity verification. Web APIs are the only interface for applications to access system resources and the channel for process communication. Mandatory access control should be implemented to protect system resources and effectively isolate between processes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile thin terminal safety model establishing method and device based on Web operating system
  • Mobile thin terminal safety model establishing method and device based on Web operating system
  • Mobile thin terminal safety model establishing method and device based on Web operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0040] image 3 It shows a schematic flowchart of a method for establishing a security model of a mobile thin terminal based on a Web operating system provided in this embodiment, including:

[0041] S301. Map components in the Web operating system to corresponding symbols according to symbol mapping rules, and map operations in the Web operating system to corresponding access modes according to access mode mapping rules.

[0042] Wherein, the symbol mapping rule is a preset correspondence between components and symbols in the Web operating system.

[0043] The access mode mapping rule is a preset correspondence between operations and access modes in the Web operati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a mobile thin terminal safety model establishing method and device based on a Web operating system. The method comprises the steps of according to a symbol mapping rule, mapping a component in the system as a corresponding symbol, and according to an access mode mapping rule, mapping an operation in the system as a corresponding access mode; according to the access mode, determining a target access control strategy of the system; according to a confidentiality element in a confidentiality model and an integrity element in an integrity model, adopting the symbol of to determine the safety mark of the system; according to the access control strategy and the safety mark, establishing the mobile thin terminal safety model based on the Web system. According to the mobile thin terminal safety model establishing method and device based on the Web operating system, by symbolizing the component, introducing elements in the confidentiality model and the integrity model, and adopting the symbol to determine the safety mark of the system, and based on the target access control strategy of the system determined by the access mode, the problem is solved that information flows of the confidentiality model and the integrity model are opposite, the confidentiality and integrity of the system are taken into account simultaneously, and the system safety is guaranteed.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method and device for establishing a security model of a mobile thin terminal based on a Web operating system. Background technique [0002] With the development of mobile Internet, the penetration rate of mobile terminals has increased, which has promoted the development of emerging fields such as mobile office, mobile government affairs, e-commerce, and electronic payment. Because in these fields, personal sensitive information of mobile phone users or internal information of companies are involved, security issues have become a common concern. At present, Android, iOS and Windows Phone (WP) occupy most of the market share in the smart terminal operating system. The security of iOS and WP depends on its closed source and application traceability and other security mechanisms. Android is open source, making malware and hackers very difficult. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/08
CPCG06F21/57H04L67/02
Inventor 朱大立杨莹金昊李莹
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products