Security policy version generation method

A technology of security policy and version, which is applied in the field of computer technology and information security, can solve the problems of poor security of security policy and low level of anti-cracking difficulty

Inactive Publication Date: 2019-12-31
咪付(广西)网络技术有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention provides a method for generating a security policy version to solve the prob...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy version generation method
  • Security policy version generation method
  • Security policy version generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the examples, but the protection scope of the present invention is not limited to the following specific examples.

[0023] This embodiment provides a method for generating a security policy version, the method including:

[0024] The security policy version is composed of multiple security policy rules, and the security policy rules are composed of algorithms, keys, and policy identifiers;

[0025] It should be noted that the plurality of security policy rules may be three or more security policy rules, and each of the security policy rules may be formed using a different algorithm; although the algorithm is a known algorithm, However, because the algorithm selected in this embodiment is not fixed, it increases the difficulty of being cracked.

[0026] The security policy version is divided into a security policy initial version and a security policy usage version;

[0027] The usage version of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security policy version generation method, which belongs to the field of computer technology and information security, and comprises the following steps that: a security policy version consists of a plurality of security policy rules, and each security policy rule consists of an algorithm, a secret key and a policy identifier; wherein the security policy version is dividedinto a security policy initial version and a security policy use version; wherein the security policy use version is generated through a security policy initial version, an increment factor and a PCode operation; wherein the PCode comprises a PCode algorithm function and a PCode operating environment, so that the security policy using version is generated by operation of the security policy initial version, the increment factor and the PCode algorithm function in the PCode operating environment. The security policy version provided by the invention can be dynamically changed and updated, is high in security, is difficult to crack even if the key is intercepted, can be widely applied to subway ticket checking terminals, POS terminals and the like, is also suitable for other automatic terminals with similar key systems, has good commercial value, and is worth popularizing.

Description

technical field [0001] The invention belongs to the fields of computer technology and information security, and in particular relates to a method for generating a security policy version. Background technique [0002] A security policy is a set of rules for all security-related activities within a security zone (a security zone, usually, refers to a set of processing and communication resources belonging to an organization). As computer systems and mobile Internet applications become more and more widely used, a large amount of key data and key businesses are managed and supported by computer systems, and computer system security issues are becoming increasingly serious and complex. Traditional computer security system protection mechanisms generally rely on manual judgment methods to establish security policies. In the patent published in China, a security policy generation method and equipment are proposed. This method is to capture data in the business system to form orig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08G06F8/71G06F8/65
CPCG06F8/65G06F8/71H04L9/0869H04L63/20
Inventor 代豪梁安宁梁景策
Owner 咪付(广西)网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products