Access control method and system based on security tag
A security label and access control technology, applied in the field of access control systems based on security labels, can solve the problem that information cannot be marked with security labels in real time, and achieve the effects of improving security and reliability, avoiding information leakage, and implementing a simple mechanism.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0037] The invention will be described in detail below with reference to the drawings and embodiments.
[0038] Such as figure 1 It is a schematic diagram of an access control method based on security tags. When the subject processes the information, the access control decision unit will check whether the security permission can match the security label of the information according to the security policy. If it can match, the subject is allowed to access the information, otherwise the access is denied.
[0039] The core of the present invention is to control the subject's access authority to information according to a preset security policy. The specific implementation method is based on the security label, marking the information access subject with security permission, marking the information with security label, and generating an access control policy according to the security requirements. When information is in circulation, the access control mechanism is activated at the fou...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap