Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data access control method and system based on mimicry defense

A technology of data access control and data access, which is applied in the field of network security, can solve the problems that the security cannot be greatly improved, and the stability of the system is damaged, so as to improve robustness and security, improve stability and security, and scalability strong effect

Active Publication Date: 2020-07-31
NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Technical purpose: Aiming at the defect that the security of the data access control system in the prior art cannot be greatly improved, the present invention discloses a data access control method and system based on mimicry defense, which mimics the access control strategy and can effectively Prevent hackers from attacking an access control strategy, and at the same time, mimic the data access layer, which can effectively prevent hackers from attacking a database, thereby destroying the stability of the system, and further improving the robustness and security of the system sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access control method and system based on mimicry defense
  • Data access control method and system based on mimicry defense
  • Data access control method and system based on mimicry defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] A data access control method and system based on mimic defense in this scheme will be further described and explained below in conjunction with the accompanying drawings.

[0054] attached figure 1 It is a typical dynamic heterogeneous redundant structure diagram of the mimic defense system, as shown in the attached figure 1 As shown, the basic principle of mimic defense is: when there is a message input, it is transmitted to each heterogeneous executive in the heterogeneous pool through the input agent, and all heterogeneous executives process the message and transmit the result to the multi-mode arbitration module. If the processing results of heterogeneous executives are consistent, they will output. If they are not consistent, it can identify the abnormal output message of a certain heterogeneous executive, and then realize the security defense of the system.

[0055] as attached figure 2 As shown, a data access control system based on mimicry defense includes: v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data access control method and system based on mimicry defense, and is applied to the technical field of network security. The method comprises the steps that a user initiates a request to a data access control system, a view layer processes the request, a control layer calls a control layer heterogeneous execution body, a mimicry judgment layer I judges an access permission processing result, a data access layer calls a data access layer heterogeneous execution body, and a mimicry judgment layer II judges a data access processing result and sends the data access processing result to the user. According to the method, mimicry is carried out on the access control strategy, hackers can be effectively prevented from attacking an access control strategy, meanwhile, mimicry is carried out on the data access layer, the hackers can be effectively prevented from attacking a database, and therefore the stability of the system can be prevented from being damaged, and the robustness and safety of the system can be further improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data access control method and system based on mimic defense. Background technique [0002] The basic principle of mimic defense technology is: when there is a message input, it is transmitted to each heterogeneous executive in the heterogeneous pool through the input agent, and all heterogeneous executives process the message and transmit the result to the multi-mode arbitration module. If the result is consistent, then If the output is inconsistent, it is possible to identify the abnormal output message of a certain executive body, and then realize the security defense of the system. [0003] Access control technology has always been an important means to protect data security. It mainly uses preset access control policies to ensure that users with different permissions can only access information with corresponding permissions and prevent illegal access to informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/45
CPCG06F21/45G06F21/604G06F2221/2141
Inventor 王泽雨陈垚赵海宁羊子煜郁晨陈立全冯海生
Owner NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products