Mobile storage system access control method and device supporting service security mark

A technology of security marking and mobile storage, applied in the computer field, can solve the problems of unsupported access environment control and fine-grained data control, and achieve the effect of improving access control and data control capabilities

Inactive Publication Date: 2019-11-15
INST OF INFORMATION ENG CAS
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the current security-hardened mobile storage system does not support access environment control and fine-grained data management and control, the purpose of the present invention is to provide a mobile storage system access control method and device that supports service security marks, and check mobile storage media through matching The business security mark of the business security mark and the business security mark of the connected computer environment, to ensure that the mobile storage medium is connected to the computer environment that meets the constraints of the relevant business security attributes, and fine-grained control over data storage and access behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile storage system access control method and device supporting service security mark
  • Mobile storage system access control method and device supporting service security mark
  • Mobile storage system access control method and device supporting service security mark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0019] In order to achieve the above object, the present invention provides a mobile storage system access and data control method that supports service security marking, the method includes the following steps:

[0020] Business Security Tag Definitions:

[0021] The service security mark M is a tuple group including various service security attributes, M=. Where C is the security level; G is multiple business security attributes G i set of , G={g 1 , g 2 ,... g n}, g i It can be business security attributes such as business categories, work groups, roles, and environmental requirements; F is the operation control attribute f j set of , F={f 1 ,f 2 ,... f m}, f j It ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile storage system access control method and device supporting a service security mark. The method comprises the following steps: 1) setting a service security mark of themobile storage system, and marking the service security attribute of the mobile storage system, wherein the service security mark of the mobile storage system comprises a security level and a servicecategory; 2) when the mobile storage system is accessed to a computer environment, acquiring a service security mark of the computer environment and performing matching check on the service securitymark of the computer environment and the service security mark of the mobile storage system; if the two service security marks are matched, allowing the mobile storage system to access the computer environment; otherwise, prohibiting access to the computer environment. According to the invention, the access control and data management and control capabilities of the mobile storage system are greatly improved.

Description

technical field [0001] The invention relates to a mobile data storage system access and data control method and device, in particular to a data storage system supporting business security marks and storage and access methods, which belong to the field of computer technology. Background technique [0002] At present, in order to improve the security of mobile storage media, corresponding security measures are mainly taken in aspects such as access authentication, access control, and data encryption. However, the existing mobile storage devices cannot identify whether the computing environment it accesses has the same or higher security level, and cannot prohibit the storage of data higher than the security level of the mobile storage device. It is difficult to provide fine-grained Data management and control capabilities. Contents of the invention [0003] Aiming at the problem that the current security-hardened mobile storage system does not support access environment con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78
CPCG06F21/78
Inventor 于海波祁峰刘坤颖邵飞孙永
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products