Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Level-driving security demand analysis method

A requirement analysis and leveling technology, applied in the field of trusted computing, can solve problems that affect the accuracy of software security requirements, unusable civilian systems, and frequent user participation, so as to reduce security vulnerabilities, reduce possibilities, and improve security.

Active Publication Date: 2013-07-03
江苏永达电力电信安装工程有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there are some problems in the process of security requirements analysis using CC: 1) The whole process requires the participation of security experts, especially in the process of security function selection, the quality of component selection directly affects the accuracy of software security requirements, This makes its use threshold relatively high, and most civilian systems will not be available; 2) The user's participation is too frequent, and interaction is required in the first three steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Level-driving security demand analysis method
  • Level-driving security demand analysis method
  • Level-driving security demand analysis method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The overall technical solution flow of the present invention is shown in accompanying drawing 1, comprises two processes, first is the division of safety requirement level and the establishment of the corresponding relationship between level and safety function component, this process is the construction of knowledge base, can be finished after Applied as empirical knowledge in concrete each concrete development. Then, in the development of a specific system, according to the level of security requirements put forward by the user for the system, the security function components selected according to the threat are screened, and then the security requirements analysts consider the specific technology and security strategy, and the final selection Defined security functional components are described as security profile specifications. The following is a detailed introduction in conjunction with accompanying drawing 2, which is specifically divided into two processes:

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of credible computing and relates to a level-driving security demand analysis method. The method comprises two aspects of establishing a level knowledge base and performing security demand analysis on a specific system. During development of a certain specific system, security function components selected according to threatens are screened according to a security demand level requirement of a user on the system; and a security demand analyzer describes a finally selected security function component as a security summary rule by taking a specific technology and a security strategy into consideration. The level-driving security demand analysis method is mainly applied to security demand analysis on software by using levels and a CC standard in a demand analysis stage, so that security flaws in the initial stage of software development can be reduced.

Description

technical field [0001] The invention belongs to the field of trusted computing, and is mainly used to analyze the security requirements of software by using grades and CC standards in the requirement analysis stage, so as to reduce the security loopholes in the early stage of software development. The invention provides support for the establishment of the credible demand standard system. Background technique [0002] Today, with the rapid development of computers, the security features of computer software are not only additional attributes of software, but also essential features. However, while the information industry makes more users feel convenient, it also leads to a large number of security risks. How to guarantee the service quality and service quality of the software has naturally become a major issue of concern to the majority of users. In this context, the importance of information security technology is self-evident, and the concept of trusted software and rel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
Inventor 李晓红许光全刘丰煦胡静冯志勇
Owner 江苏永达电力电信安装工程有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products