Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cluster virtual user system implementation method based on sandbox mechanism

A technology of virtual user and sandbox mechanism, applied in computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as data leakage, damage, system security threats, etc., to meet normal resource access, good closure and isolation, the effect of preventing information overreach

Pending Publication Date: 2020-12-15
TIANJIN 712 COMM & BROADCASTING CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The same device will have different usage rules in different application scenarios. When the device works in a multi-mode and multi-level network, because the network is not controlled and the network devices are mixed, the command system does not have complete control over the network. The device may have other authentication forms or lack of authentication capabilities. If an application can access any resource, it may damage other resources in use or cause data damage, data leakage, etc., and the security of the system will be affected. Therefore, it is necessary to take some measures to ensure that the information will not be tampered with or leaked by unauthorized persons

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster virtual user system implementation method based on sandbox mechanism
  • Cluster virtual user system implementation method based on sandbox mechanism
  • Cluster virtual user system implementation method based on sandbox mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described below in conjunction with drawings and embodiments.

[0019] Such as figure 1 As shown, the system has several switchable modes, such as mode 1, mode 2, ..., mode n, and different modes belong to different security levels. At the same time, the system has two priority levels: high priority and low priority. The high priority permission belongs to the high security level, and the low priority permission belongs to the low security level. Program resources with a high security level of the system can access program resources with a low security level, while program resources with a low security level are enclosed in a sandbox and cannot access external resources.

[0020] The system will make a high or low security judgment and judge whether to restart and load. The specific process is: when switching between different security levels, the system needs to be restarted to complete the destruction and establishment of the san...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cluster virtual user system implementation method based on a sandbox mechanism. A sandbox mechanism is applied to a cluster communication system composed of a plurality of terminal devices and a base station to form a cluster virtual user system; wherein the cluster virtual user system has a plurality of switchable modes, and different modes belong to different securitylevels respectively; meanwhile, the cluster virtual user system has a high priority level and a low priority level, the high priority authority belongs to a high security level, and the low priority authority belongs to a low security level; high-security-level program resources of the cluster virtual user system can access low-security-level program resources, and the low-security-level program resources are closed in a sandbox and cannot access external resources. The sandbox mechanism is applied to the trunking communication system, so that the potential safety hazard existing when the system is switched in networks of different modes or the priority of a user is switched can be well solved, and better protection is provided for data.

Description

technical field [0001] The invention relates to a cluster communication system, in particular to a method for realizing a cluster virtual user system based on a sandbox mechanism. Background technique [0002] The trunking communication system mainly provides production scheduling and command and control services for professionals working outdoors. It has been widely used in many fields such as railway transportation, communication, electric power, petroleum, forestry, and public security. Group calls and emergency calls can also be connected to the public network for communication. At the same time, it also provides users with reliable communication channels, different priority levels, dynamic networking and other functions. Different fields of use can be flexibly configured and used according to their own needs. , with great convenience. The same device will have different usage rules in different application scenarios. When the device works in a multi-mode and multi-leve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/55G06F21/62
CPCG06F21/53G06F21/6218G06F21/55G06F2221/2141
Inventor 刘霞秦嗣波雷志芳刘冰炎汪轩
Owner TIANJIN 712 COMM & BROADCASTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products