Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security target decomposition and modeling method and related equipment

A target decomposition and modeling method technology, applied in the field of security target decomposition and modeling methods and related equipment, can solve problems such as inaccurate verification results and inability to describe security targets objectively and accurately, so as to avoid inaccurate results and improve Efficiency and the effect of avoiding waste of resources

Active Publication Date: 2019-06-28
HUAWEI TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the above-mentioned formal verification method based on mathematical logic, it is very important to decompose the safety goal and use mathematical logic formulas to describe it accurately. If the safety goal cannot accurately describe the safety goal described in natural language, then Inaccurate verification results using the above-mentioned formal verification method based on mathematical logic
[0004] In the field of security verification, for the transformation of security goals described in natural language into mathematical logic, it is generally summarized and analyzed based on security policies, and the security attributes corresponding to the security objectives are extracted, so that the obtained security attributes have great randomness. There is no clear correspondence between the goals, and it cannot objectively and accurately describe the security goals described in natural language

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security target decomposition and modeling method and related equipment
  • A security target decomposition and modeling method and related equipment
  • A security target decomposition and modeling method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]The present application provides a security target decomposition and modeling method, which is used to improve the accuracy of the mathematical logic description of the security target, so as to improve the verification accuracy of the security target. The technical solutions in this application will be clearly and completely described below in conjunction with the drawings in this application. Apparently, the described embodiments are only some of the embodiments of this application, not all of them.

[0045] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practiced in sequences other than those illustrated or described h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security target decomposition and modeling method and related equipment, which are used for improving the decomposition accuracy of a security target and improving the formalized verification reliability of the security target. The method comprises the steps that N types of entity information of the security policy is acquired according to at least one of a unified modeling language time sequence diagram and a state diagram of the security policy, N is a positive integer not smaller than 2, and the entity information is at least one of processes of the security policyand channels, data and activity processes among the processes; verifiable attributes of each type of entity information in the N types of entity information is determined according to verifiable attribute types in a security attribute description library; And a mathematical logic formula of each type of entity information is generated according to the mathematical logic formula template and eachtype of entity information, wherein the mathematical logic formula template corresponds to the verifiable attribute of each type of entity information.

Description

technical field [0001] The present application relates to the field of computer software, in particular to a method for decomposing and modeling security targets and related equipment. Background technique [0002] The security goal is the technical effect that needs to be achieved in terms of system security. Before software design and development, a security strategy (also known as a security protocol or a security technical solution) is put forward according to the desired security goal, and the security goal is decomposed into individual security attributes, and the security of the security attributes is verified to ensure that the security strategy can be implemented. Achieve safety goals. [0003] Aiming at the security attribute verification of security goals, a formal verification method based on mathematical logic is introduced in the field of software system design to analyze whether the security policy can meet the expected security goals. Security goals are gen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F8/20
Inventor 谢淼张良和邓义晖徐洋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products