Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and system based on security tag

A security label and access control technology, applied in the field of access control systems based on security labels, can solve the problem that information cannot be marked with security labels in real time, and achieve the effects of improving security and reliability, avoiding information leakage, and implementing a simple mechanism.

Active Publication Date: 2018-07-10
INST OF INFORMATION ENG CAS
View PDF10 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technology of the present invention solves the problem: overcomes the fact that the information generated in real time cannot be marked with a security label in real time and performs access control in the prior art, and provides an access control method and system based on a security label, which can control the information generated in real time in the network and the existing information Carry out security marking, mark its security level, security category and display attribute information, mark security permission for information access subjects in the network, generate security policies based on security requirements, and match information security labels and subject security permissions based on security policies in the process of information circulation. So as to achieve fine-grained access control to information, ensure that the circulation rules of electronic information in cyberspace are completely consistent with the information circulation rules in the real world, and improve security and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system based on security tag
  • Access control method and system based on security tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0038] Such as figure 1 It is a schematic diagram of the access control method based on security labels. When the subject processes the information, the access control decision-making unit will check whether the security permission can match the security label of the information according to the security policy. If it can match, the subject is allowed to access the information, otherwise, the access is denied.

[0039] The core of the present invention is to control the subject's access to information according to the preset security policy. The specific implementation method is based on security labels, marking security permissions for information access subjects, marking security labels for information, and generating access control policies based on security requirements. When the information is in circulation, the access control mechanism is activated a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control method and system based on a security tag; the method comprises the following steps of marking security permission for an information access subject, markinga security tag for the information, and generating a security policy according to a security requirement; when the information is in a circulation process, starting an access control mechanism in theinformation access subject to analyze the security tag in the information; matching the security permission and the security tag according to the security policy; and deciding the information flow direction according to a matched result, so as to achieve a purpose of controlling an information awareness range; and the security is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an access control system and method based on a security label. Background technique [0002] In the field of security, information is usually divided into different security levels, and personnel are also divided into different security clearance levels. Personnel with different security clearance levels have different access rights to information. For example, personnel with low security clearance levels cannot access high-level Information on security levels to comply with security requirements. When physical information is digitized and flows between different people, it is also necessary to mark the information with electronic security labels, and at the same time adopt an access control mechanism based on security labels to achieve the same flow rules of electronic information in cyberspace as in the real world. The rules of information circulation are exactly ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/60
CPCG06F21/604G06F2221/2141H04L63/0807H04L63/10H04L63/20
Inventor 王利明胡亚辉宋晨
Owner INST OF INFORMATION ENG CAS
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More