A method and device for controlling mandatory access

A technology of mandatory access and control methods, applied in the computer field, which can solve problems such as the inability to meet a variety of application scenarios

Active Publication Date: 2021-08-17
BEIJING CHANGYANG TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is that it cannot meet various application scenarios of users. Aiming at the defects in the prior art, a method and device for controlling compulsory access are provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for controlling mandatory access
  • A method and device for controlling mandatory access
  • A method and device for controlling mandatory access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0055] figure 1 A flowchart showing a method for controlling mandatory access according to an embodiment. It can be understood that the method can be executed by any device, device, platform, or device cluster that has computing and processing capabilities. The method will be described below by using a terminal device (such as a computer) t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method and device for controlling mandatory access. The method includes: configuring the access authority of the subject and object of the terminal equipment being accessed to obtain a configuration file; the configuration file includes a subject field and an object field, and the subject field corresponds to a There is at least one subject, and the object field corresponds to at least one object; obtain the user's access request to the accessed terminal device; the access request carries the user's access right, the first attribute information used to characterize the access subject, and the first attribute information used to characterize the accessed terminal device. The second attribute information of the object; load the configuration file, and determine the target subject domain and target object domain corresponding to the user according to the preset mapping relationship and the first attribute information and second attribute information included in the access request; based on the The user's access rights and the target subject domain's access rights to the target object domain determine whether the user's access request is allowed. The solution of the present invention can satisfy various application scenarios of users.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for controlling mandatory access. Background technique [0002] A conventional model, such as the windows access control model (AccessControlModel), is divided into two parts: access token (AccessToken) and security descriptor (SecurityDescriptor), which are things owned by the visitor and the visitor respectively. The access token is associated with a specific Windows account, so when the same account accesses other files with the same security descriptor, the permissions on the accessed objects are the same, which cannot meet the mandatory access control requirements. [0003] The traditional mandatory access security model (such as BLP, BIBA model) simply divides users and accessed files into extremely high, high, medium, low, and very low levels, and the permissions are relatively single, so they cannot satisfy users. various application scenarios. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6218G06F21/604G06F2221/2141G06F2221/2113
Inventor 王吉勇范雷姜海昆范宇
Owner BEIJING CHANGYANG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products