Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-security access strategy control method and computing equipment

A security access and policy control technology, applied in the field of Linux security access policy control, can solve problems such as difficult to ensure system security

Pending Publication Date: 2020-07-17
北京统信软件技术有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limitation of the operating system, there can only be at most one mandatory access policy module in the kernel, and correspondingly at most one hook function can be called, which makes it difficult to ensure system security in some cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-security access strategy control method and computing equipment
  • Multi-security access strategy control method and computing equipment
  • Multi-security access strategy control method and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0034] In order to implement multiple mandatory access policies in the kernel, the present invention provides a multiple security access policy control method and a security access method, and these methods are executed in computing equipment. The computing device of the present invention is a device equipped with a Linux operating system, which can be, for example, a personal configuration computer such as a desktop computer, a noteb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-security access strategy control method, which is executed in computing equipment and comprises the following steps of: setting a hook function for a target kernel function in a target security access strategy module; acquiring the hook function linked list address of the target kernel function, and inserting the address of the hook function into the tail part of the hook function linked list; and adding the callback information of the target kernel function to the callback information array of the target security access strategy module, wherein each element inthe callback information array corresponds to the callback information of one kernel function, and the callback information comprises the hook function linked list address of the kernel function, theposition of the hook function in the hook function linked list and the address of the hook function. The invention also discloses a corresponding security access method and computing equipment.

Description

technical field [0001] The invention relates to the technical field of Linux security access policy control, in particular to a control method for multiple security access policies, a security access method and a computing device. Background technique [0002] The Linux operating system is widely used in servers, mobile phones, and embedded systems. The security of the operating system is the basis of the security of the entire computer system. Without the support of a secure operating system, the security of the computer system and various application software running on the operating system cannot be guaranteed. [0003] Mandatory access policy is an access mechanism that restricts the access of subject and object to ensure system security. In the Linux operating system, the mandatory access policy is implemented through the kernel's Security Access Policy subsystem (Security Access Policy, SAP). The SAP subsystem is an access control framework that provides a series of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 洪浩
Owner 北京统信软件技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products