Character constant weight method

A role-determining, role-based technology, applied in the fields of instruments, electrical digital data processing, digital data processing components, etc., can solve problems such as rough security, complex configuration and management, and poor versatility

Inactive Publication Date: 2006-05-17
NAT UNIV OF DEFENSE TECH
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is that for existing technical solutions, either the granularity of permission definition is coarse and the “least privilege” cannot be achieved, resulting in poor security, or the security is good but the configuration and management are too complicated, and the existing solutions are common. In order to solve the problem of poor security, a method of role determination is proposed: build an RBA implementation system on the MAC of the mandatory access control framework of the operating system. This system has nothing to do with security policies and can be applied to any oper...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Character constant weight method
  • Character constant weight method
  • Character constant weight method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] As shown in Figure 1, the content in the dotted box is the RBA implementation system. The RBA implementation system consists of RBA configuration files, kernel implementation modules, system call interfaces, library functions, and configuration and management tools.

[0065] The kernel implementation module is composed of static authorization and management module, dynamic authorization module and MAC extension module. These modules work on the MAC of the operating system's mandatory access control framework.

[0066] The administrator can use the configuration and management tool to call the service of the static authorization and management module through the system call interface to perform static authorization and management on the user, and the user's static authorization information is stored in the RBA configuration file. The static authorization and management module invokes the MAC extension module to process the permission-related information of the system, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an actor authority defining method. Its technical scheme includes the following contents: on the forced access frame MAC of operation system constructing a RBA implement system to make authorization for main body in safety operation system adopting forced access control MAC mechanism and configure management. The RBA implement system is formed from internal kernel implement module, RBA configuration file, system calling interface, library function and configuration and management tool. Besides, said invention also provides the concrete implement steps of said method by adopting said RBA implement system.

Description

technical field [0001] The invention relates to a method for improving computer security, especially a role-based authorization (Role Based Authorization, abbreviated as RBA) method for improving the security of a computer operating system and the manageability of the security of the operating system. Background technique [0002] As people pay more and more attention to information security, the security of the operating system, which is the basis for all application software, has received more and more attention. In order to improve the security of the operating system, the security of the operating system must be enhanced from many aspects, and the authorization method is one of the key technologies to ensure and improve the security of the operating system. [0003] The so-called authorization refers to properly granting the authority in the operating system to the main body of the operating system (that is, the user and the process of the application program), so that t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00
Inventor 易晓东何连跃罗军
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products