Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted policy update method and device, trusted security management platform

A technology of a security management platform and an update method, applied in the update method and device of a trusted policy, and the field of a trusted security management platform, can solve the problems of low update efficiency and the like

Active Publication Date: 2021-05-14
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a trusted policy update method and device, and a trusted security management platform, to at least solve the technical problem of low update efficiency caused by manual updating of trusted policies by security administrators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted policy update method and device, trusted security management platform
  • Trusted policy update method and device, trusted security management platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] According to an embodiment of the present invention, an embodiment of a method for updating a trusted policy is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0028] figure 1 is a flow chart of an optional trusted policy update method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0029] Step S102, counting the abnormal behavior rate of the target application in each of the first k cycles, wherein the abnormal behavior rate is the ratio of the number of abnormal behaviors to the total number of behaviors, and the abnormal behavior refers to the set of behaviors except those indicate...

Embodiment 2

[0058] figure 2 is a schematic diagram of an optional trusted policy update device according to an embodiment of the present invention, such as figure 2 As shown, the update device may include: a statistical unit 21, a calculation unit 23, a first determination unit 25, a second determination unit 27,

[0059] The statistical unit 21 is used to count the abnormal behavior rate of the target application program in each cycle in the first k cycles, wherein the abnormal behavior rate is the ratio of the number of abnormal behaviors to the total number of behaviors, and the abnormal behavior refers to Behaviors other than the indicated behavior set, the trusted strategy is the strategy learned from the access behavior data of the target application program in the previous k cycles;

[0060] Calculation unit 23, for calculating the mean value and variance value of the abnormal behavior rate of each cycle;

[0061] The first determination unit 25 is configured to determine a tar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted policy update method and device, and a trusted security management platform. Wherein, the method includes: counting the abnormal behavior rate of the target application program in each cycle in the first k cycles, wherein the abnormal behavior rate is the ratio of the number of abnormal behaviors to the total number of behaviors, and the abnormal behavior refers to Indicates behaviors outside the behavior set. The trusted strategy is a strategy learned from the access behavior data of the target application in the first k cycles; calculate the average and variance of the abnormal behavior rate of each cycle; based on each cycle The average value and variance value of the abnormal behavior rate of , determine the target interval, where the target interval is used to indicate whether the credible policy needs to be updated; based on the target interval, use the k+1th cycle and the kth cycle after the first k cycles Behavior anomaly rate for +2 cycles to determine if trusted policy needs to be updated.

Description

technical field [0001] The present invention relates to the technical field of trusted management, in particular to a trusted policy update method and device, and a trusted security management platform. Background technique [0002] In related technologies, trusted computing needs to be measured based on trusted policies. At present, trusted policies are usually manually configured by security administrators based on their knowledge of application access behaviors. If trusted policies need to be updated, the Updates are manually configured by a security administrator. However, this method of manually updating the trusted policy through the security administrator not only relies heavily on the subjective awareness of the security administrator, but also because the security administrator may have a one-sided cognition of the application access behavior, it will As a result, the update speed of the trusted policy is slow and the accuracy is low. The updated trusted policy is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 孙瑜洪宇田文慧
Owner BEIJING KEXIN HUATAI INFORMATION TECH