Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for dynamically generating network layer tags

A network layer, marking technology, used in transmission systems, electrical components, etc.

Active Publication Date: 2020-10-27
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the network environment, it is difficult for traditional access control methods to realize that after the relevant data enters other systems through the network, it can still instruct other systems to correctly understand the nature of the business security of the data, so that it can be accessed according to business security requirements in network transmission and other environments. Carry out full life cycle management and control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for dynamically generating network layer tags
  • A method and system for dynamically generating network layer tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0020] figure 1 For the dynamic generation flow chart of the network layer label adapting to the service security attribute of the information object according to the present invention, reference will be made below figure 1 The method for dynamically generating network layer marks adapted to the service security attributes of information objects of the present invention is described in detail:

[0021] 1. Business security flag configuration

[0022] The service security mark M is a tuple group including various service security attributes, M=. Where C is the security level; G is multiple business security attributes G i set of , G={g 1 , g 2 ,...g n}, g i It can be busine...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network layer mark dynamic generation method and system adapting to information object service security attributes. The method comprises the following steps: 1) setting a service security mark of a system object, and marking a service security attribute of the system object, wherein the service security mark comprises a security level and a service attribute; 2) enablingthe system object to be connected with a protocol stack and requesting to send network data; 3) enablingthe protocol stack to convert the service security mark in the request and generate a network layer service security mark, and encapsulate the network layer service security mark into the IP data packet, wherein the network layer service security mark indicates the security level and the servicetype of the data in the IP data packet. According to the method and system, related security mechanisms can be supported to implement fine-grained control in related network nodes or environments, and full-life-cycle management and control are realized according to data-oriented service security requirements in network transmission and other environments.

Description

technical field [0001] The invention relates to a method for marking data at the network layer according to the service security attribute of the data, and belongs to the technical field of network and information security. Background technique [0002] Access control is the main security mechanism in the field of information security. Traditional access control mainly solves the problem of access control between subject and object in a certain system. However, in the network environment, it is difficult for traditional access control methods to realize that after the relevant data enters other systems through the network, it can still instruct other systems to correctly understand the business security nature of the data, so that it can be accessed according to business security requirements in network transmission and other environments. Carry out full life cycle control. Contents of the invention [0003] Aiming at the requirement of full lifecycle management and cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/102H04L63/105
Inventor 于海波刘坤颖
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products