Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Decomposition and modeling method of safety target and related equipment

A technology of target decomposition and modeling method, which is applied in the field of security target decomposition and modeling methods and related equipment, can solve problems such as inaccurate verification results and inability to describe security targets objectively and accurately, and achieve strong objectivity and improve verification Accuracy, general applicability and strong effect

Active Publication Date: 2021-10-15
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the above-mentioned formal verification method based on mathematical logic, it is very important to decompose the safety goal and use mathematical logic formulas to describe it accurately. If the safety goal cannot accurately describe the safety goal described in natural language, then Inaccurate verification results using the above-mentioned formal verification method based on mathematical logic
[0004] In the field of security verification, for the transformation of security goals described in natural language into mathematical logic, it is generally summarized and analyzed based on security policies, and the security attributes corresponding to the security objectives are extracted, so that the obtained security attributes have great randomness. There is no clear correspondence between the goals, and it cannot objectively and accurately describe the security goals described in natural language

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decomposition and modeling method of safety target and related equipment
  • Decomposition and modeling method of safety target and related equipment
  • Decomposition and modeling method of safety target and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]The present application provides a security target decomposition and modeling method, which is used to improve the accuracy of the mathematical logic description of the security target, so as to improve the verification accuracy of the security target. The technical solutions in this application will be clearly and completely described below in conjunction with the drawings in this application. Apparently, the described embodiments are only some of the embodiments of this application, not all of them.

[0045] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practiced in sequences other than those illustrated or described h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a security target decomposition and modeling method and related equipment, which are used to improve the accuracy of the security target decomposition and improve the reliability of the formal verification of the security target. The method of the present application includes: according to at least one of the unified modeling language sequence diagram and the state diagram of the security policy, obtaining N-type entity information of the security policy, the N is a positive integer not less than 2, and the entity information is Each process of the security policy and at least one of the channels between processes, data and activity flow; determine the verifiability of each type of entity information in the N types of entity information according to the verifiable attribute type in the security attribute description library Attributes: generate a mathematical logic formula for each type of entity information according to a mathematical logic formula template and each type of entity information, and the mathematical logic formula template corresponds to the verifiable attributes of each type of entity information.

Description

technical field [0001] The present application relates to the field of computer software, in particular to a method for decomposing and modeling security targets and related equipment. Background technique [0002] The security goal is the technical effect that needs to be achieved in terms of system security. Before software design and development, a security strategy (also known as a security protocol or a security technical solution) is put forward according to the desired security goal, and the security goal is decomposed into individual security attributes, and the security of the security attributes is verified to ensure that the security strategy can be implemented. Achieve safety goals. [0003] Aiming at the security attribute verification of security goals, a formal verification method based on mathematical logic is introduced in the field of software system design to analyze whether the security policy can meet the expected security goals. Security goals are gen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/20
Inventor 谢淼张良和邓义晖徐洋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products