Supercharge Your Innovation With Domain-Expert AI Agents!

A security protocol javascript language implementation analysis method and a security protocol javascript language implementation analysis device based on model extraction

A security protocol and analysis method technology, applied in the direction of platform integrity maintenance, software testing/debugging, etc., can solve problems such as insecure implementation of security protocols, and achieve the effect of ensuring data security

Pending Publication Date: 2019-06-28
SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the present invention provides an analysis method and device based on a model extraction-based security protocol javascript language implementation, to solve or at least partially solve the technical problem that the security protocol implementation in the analysis method in the prior art is not safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security protocol javascript language implementation analysis method and a security protocol javascript language implementation analysis device based on model extraction
  • A security protocol javascript language implementation analysis method and a security protocol javascript language implementation analysis device based on model extraction
  • A security protocol javascript language implementation analysis method and a security protocol javascript language implementation analysis device based on model extraction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] This embodiment provides a method for analyzing the implementation of security protocol javascript language based on model extraction, please refer to figure 1 , the method includes:

[0048] Step S1: Select the core sentences required for the implementation of the security protocol from the preset sentence library, and obtain the implementation subset SubJS of the security protocol javascript language and the BNF corresponding to the implementation subset SubJS based on the core sentences.

[0049] Specifically, the inventors of the present application have discovered through a large amount of research and practice that no complex statements are used in the implementation of the security protocol Javascript language. As a formal language, calculus is mainly used to model the communication between concurrent processes. Its grammatical structure is relatively simple. If all statements of javascript language are taken into consideration, it is too cumbersome and it is dif...

Embodiment 2

[0191] This embodiment provides an analysis device based on model extraction for the implementation of security protocol javascript language, please refer to Figure 15 , the device consists of:

[0192] The implementation subset obtaining module 201 is used to select the core statements required for the implementation of the security protocol from the preset statement library, and obtain the security protocol javascript language implementation subset SubJS and the BNF corresponding to the implementation subset SubJS based on the core statement;

[0193] The Applied PI calculation obtaining module 202 is used to obtain the Applied PI calculation and the BNF corresponding to the Applied PI calculation;

[0194] The mapping model acquisition module 203 is used to map the statements in the security protocol Javascript language to the corresponding statements of the Applied PI calculation based on the semantic consistency, according to the BNF corresponding to SubJS and t...

Embodiment 3

[0203] See Figure 16 , based on the same inventive concept, the present application also provides a computer-readable storage medium 300, on which a computer program 311 is stored. When the program is executed, the method as described in the first embodiment is implemented.

[0204] Since the computer-readable storage medium introduced in the third embodiment of the present invention is a computer device used to implement the analysis method implemented in the javascript language of the security protocol based on model extraction in the first embodiment of the present invention, it is based on the introduction in the first embodiment of the present invention method, those skilled in the art can understand the specific structure and deformation of the computer-readable storage medium, so details are not repeated here. All computer-readable storage media used in the method in Embodiment 1 of the present invention fall within the scope of protection intended by the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the method, a mapping model between a javascript language and a formalized language Applied PI algorithm is established based on model extraction. The invention relates to establishment of a javascript language security protocol implementation subset, the BNF of the javascript language is given out, and the BNF of the javascript language is obtained; a BNF calculated by Applied PI isgiven out; according to the javascript language and the BNF of the Applied PI, a mapping relation between a security protocol javascript language and Applied PI calculation is constructed; a securityprotocol javascript language is obtained to implement a corresponding abstract model representation method, and a formalized authentication tool ProVerif is used. According to the invention, the security can be verified at the security protocol source code level, and the data security of the network space is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an analysis method and device for implementing a security protocol javascript language based on model extraction. Background technique [0002] With the rapid development of network communication technology, the security of web applications has increasingly become the focus of researchers. In order to protect the security and data integrity of security protocols implemented in web applications, security protocols are usually used for security protection. [0003] As a communication protocol that provides security services in cyberspace, a security protocol is an important part of network security. As a carrier for people to protect private data, security protocols are used to perform authentication between entities and secure distribution of keys. Protocols play a vital role in keeping users' information safe. Many researchers have spent a lot of thought on designin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36G06F21/57
Inventor 孟博陈双王德军覃俊
Owner SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More