Unlock instant, AI-driven research and patent intelligence for your innovation.

Security access control method and device

A security access control and security technology, applied in the computer field, to overcome the dynamic perception ability and improve the security effect

Active Publication Date: 2017-08-15
SHENZHEN ZHENGTONG ELECTRONICS
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The main purpose of the present invention is to provide a security access control method and device, which aims to solve the technical problem that the BLP model in the existing application lacks the dynamic perception ability of the system security status and risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access control method and device
  • Security access control method and device
  • Security access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] refer to figure 2 , the first embodiment of the present invention provides a security access control method, the method comprising:

[0053] S10: Obtain the current access request;

[0054] It should be noted that the execution body of the method in this embodiment may be a server, and of course, it may also be a device with similar functions, which is not limited in this embodiment.

[0055] It can be understood that the current access request is the access request just received.

[0056] S20: Predict the security of the current access request according to a preset security model to obtain a current security probability, and the preset security model is used to reflect the correspondence between the access request and the security probability;

[0057] In a specific implementation, security prediction may b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security access control method. The method comprises the following steps: acquiring a current access request; performing security prediction on the current access request according to a preset security model to obtain a current security probability, wherein the preset security model is used for reflecting a corresponding relationship between the access request and the security probability; and controlling the access of the current access request according to the current security probability. The invention also discloses a security access control device. In the security access control method and device, security prediction is performed on the current access request through the preset security model, and access of the current access request is controlled according to the predicted current security probability, so that the defect that a BLP (Bell-LaPadula) model in current application lacks the ability of dynamically sensing the security state and risk of a system is overcome, and the security is enhanced.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a security access control method and device. Background technique [0002] With the continuous emergence of various new information publishing methods and the rapid development of the computer industry, the business processed on the computer has changed from primitive mathematical operations and file processing (stand-alone) to internal business processing simply connected to the internal LAN. , automated office and other applications have developed to enterprise-level computer processing systems based on the complex internal network (Intranet) of the enterprise, the external network (Extranet) connected to the enterprise, and the globally connected Internet (Internet), as well as business processing and information worldwide. shared. [0003] For systems with high security requirements, such as government, military or banking systems, resources are mostly divided in the form ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/105
Inventor 杨黎
Owner SHENZHEN ZHENGTONG ELECTRONICS