Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

58 results about "Multilevel security" patented technology

Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications (i.e., at different security levels), permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization. There are two contexts for the use of multilevel security. One is to refer to a system that is adequate to protect itself from subversion and has robust mechanisms to separate information domains, that is, trustworthy. Another context is to refer to an application of a computer that will require the computer to be strong enough to protect itself from subversion and possess adequate mechanisms to separate information domains, that is, a system we must trust. This distinction is important because systems that need to be trusted are not necessarily trustworthy.

Embedded system supporting dynamic loading operation of application programs

The invention relates to an embedded system supporting dynamic loading operation of application programs. The system comprises a frame management module, an application execution engine module, a basic functional unit library module and an API module, wherein the API module, the application execution engine module and the basic functional unit library module are orderly arranged from top to bottom; the frame management module is the core management unit and used for implementing the unified management and dispatching on the terminal software and hardware resources; the frame management moduleis used for providing a system resource acquisition and release interface for the loaded application program, thereby implementing the unified management and dispatching on the system software and hardware resources; the basic functional unit library module is used for being called by other units or application execution engine; and the basic functional unit is distributed onto the terminal accessible server, so that the frame management module can remotely load the basic functional unit according to user needs when the terminal operates. The embedded system of the invention also comprises a multilevel security management module which comprises process management submodules at three levels.
Owner:INST OF ACOUSTICS CHINESE ACAD OF SCI

Forced access control method and apparatus in virtual environment

The invention relates to a forced access control method and a device applied to a virtual environment in the technical field of computer application. The method comprises: designating a virtual machine in a virtual environment as a credible virtual machine with security management authority, in which, the credible virtual machine uses security classification and security category as a sensitive label to identify the security level of a single virtual machine; establishing an access matrix and setting the access type set of each virtual machine to other virtual machines; and when a certain virtual machine main body gets access to a certain virtual machine object in a certain access type, judging whether the access is permitted according to the sensitive label of both the main body and the object and the access type set of the main body to the object in the access matrix. The device comprises an access control initializing module, a virtual machine state monitoring module, an access judgment module, a security management assisting module and a virtual machine security information management module in the credible virtual machine. The forced access control method and the device can effectively control communication and resource sharing between virtual machines in a virtual environment of multilevel security.
Owner:SHANGHAI JIAO TONG UNIV

Security protection method and system for industrial control system using S7 protocol

The invention provides a security protection method for an industrial control system using an S7 protocol. The method includes the following steps that: TCP/IP layer protocol analysis is performed on an external access request from a client, the IP address and port number of the client are determined, so that the validity of the external access request can be determined according to a client address white list; the external access request is packetized, the integrity of frames formed by the external access request is detected; the validity of the external access request is determined according to an application function white list, and whether the application function of the external access request is a read-write function is determined; and when the application function of the external access request is a read-write function, the validity of the external access request is determined according to a second preset white the list. The invention also provides a corresponding security protection system. According to the security protection method and the security protection system of the invention, multilevel security protection is carried out in a TCP/IP layer and an application layer, and therefore, a variety of attacks at an industrial control device or system adopting an S7 protocol can be effectively resisted, and security risks caused by the lack of security prevention mechanisms in the prior art can be avoided effectively.
Owner:INSECTECH BEIJING CO LTD

Network access control system and method using adaptive proxies

A method, system and computer program for providing multilevel security to a computer network. The method comprises the step of receiving a first communication packet on at least one network interface port from an outside network. The method further includes the steps of filtering the first packet in one of at least two levels of security comprising a first level of security which examines the content information of the packet and a second level of security which examines the first packet excluding the content information of the packet. The system includes a first packet filter configured to filter its input packets by examining content information of its packets and a second packet filter configured to filter its input packets by examining the header information without examining the content information of its packets. The system further includes a third filter which is configured to forward a number of packets to one of the first and second filters, thereby providing security to the computer network. The computer program includes a first module located in an application layer, a second module located in a network layer, and a third module located in a kernel space and configured to examine a number of packets received by the computer network from at least one outside network and to forward the number of packets to one of the first and second modules after examining the number of packets.
Owner:MCAFEE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products