A security mechanism dynamic management method and device

A security mechanism and dynamic management technology, applied in the field of information security, can solve problems such as poor security protection performance and lack of targeted protection capabilities in protection methods, and achieve the effects of improving security protection capabilities, optimizing assignment relationships, and optimizing algorithm efficiency

Active Publication Date: 2020-01-14
THE PLA INFORMATION ENG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides a security mechanism dynamic management method and device, which solves the problem in the prior art that the static and single protection means do not have targeted protection capabilities and poor security protection performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security mechanism dynamic management method and device
  • A security mechanism dynamic management method and device
  • A security mechanism dynamic management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0053] refer to figure 1, which shows a schematic flowchart of a method for dynamically managing a security mechanism provided by an embodiment of the present invention. In this embodiment, the method includes:

[0054] S101: Extract subject attributes and object attributes in the access data stream;

[0055] In this example, if figure 2 As shown, in the Internet business, there are subjects and objects in the generation of access data streams, wherein the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic management method and device of a security mechanism. The method includes the steps of extracting subject attributes and object attributes of an access data stream; according to a preset ternary relationship and the subject attributes and object attributes of the access data stream, determining security mechanism components required by the access data stream, wherein the ternary relationship is a relationship among the subject attributes, the object attributes and security mechanism attributes; recombining the determined security mechanism components to generate a security protection system. In this way, the dynamic protection of internet services is achieved, accordingly the internet services and the security protection mechanism of an internet-based information system are more targeted, and the security protection capability of the internet services or the internet-based information system is also improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a dynamic management method and device for a security mechanism. Background technique [0002] The Internet is a key global information infrastructure, and important information systems based on the Internet are related to the national economy and people's livelihood. Among them, important information systems refer to information systems that do not involve state secrets and play an important role in national security and economy, such as taxation, public security, fire protection, etc. Important information systems contain important information or provide important government services. If an important information system is damaged, it will have a great negative impact on institutional property and government functions. Therefore, some protection mechanisms are needed to protect important information systems based on the Internet. . [0003] In the prior art, a static and si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/45G06F21/31
CPCG06F21/31G06F21/45G06F21/604G06F21/6218
Inventor 陈性元杜学绘任志宇周超曹利峰孙奕杨智韩冰赵建成
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products