Access control method and system based on security tag

A security label and access control technology, applied in the field of access control systems based on security labels, can solve the problem that information cannot be marked with security labels in real time, and achieve the effects of improving security and reliability, avoiding information leakage, and implementing a simple mechanism.

Active Publication Date: 2018-07-10
INST OF INFORMATION ENG CAS
View PDF10 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technology of the present invention solves the problem: overcomes the fact that the information generated in real time cannot be marked with a security label in real time and performs access control in the prior art, and provides an access control method and system based on a security label, which can control the information generated in real time in the network and the existing information Carry out security marking, mark its security level, security category and display attribute information, mark sec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system based on security tag
  • Access control method and system based on security tag

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0037] The invention will be described in detail below with reference to the drawings and embodiments.

[0038] Such as figure 1 It is a schematic diagram of an access control method based on security tags. When the subject processes the information, the access control decision unit will check whether the security permission can match the security label of the information according to the security policy. If it can match, the subject is allowed to access the information, otherwise the access is denied.

[0039] The core of the present invention is to control the subject's access authority to information according to a preset security policy. The specific implementation method is based on the security label, marking the information access subject with security permission, marking the information with security label, and generating an access control policy according to the security requirements. When information is in circulation, the access control mechanism is activated at the fou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an access control method and system based on a security tag; the method comprises the following steps of marking security permission for an information access subject, markinga security tag for the information, and generating a security policy according to a security requirement; when the information is in a circulation process, starting an access control mechanism in theinformation access subject to analyze the security tag in the information; matching the security permission and the security tag according to the security policy; and deciding the information flow direction according to a matched result, so as to achieve a purpose of controlling an information awareness range; and the security is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an access control system and method based on a security label. Background technique [0002] In the field of security, information is usually divided into different security levels, and personnel are also divided into different security clearance levels. Personnel with different security clearance levels have different access rights to information. For example, personnel with low security clearance levels cannot access high-level Information on security levels to comply with security requirements. When physical information is digitized and flows between different people, it is also necessary to mark the information with electronic security labels, and at the same time adopt an access control mechanism based on security labels to achieve the same flow rules of electronic information in cyberspace as in the real world. The rules of information circulation are exactly ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/60
CPCG06F21/604G06F2221/2141H04L63/0807H04L63/10H04L63/20
Inventor 王利明胡亚辉宋晨
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products