CN118784299A - Security access policy matching method, device, computer equipment and storage medium - Google Patents
Security access policy matching method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN118784299A CN118784299A CN202410864893.8A CN202410864893A CN118784299A CN 118784299 A CN118784299 A CN 118784299A CN 202410864893 A CN202410864893 A CN 202410864893A CN 118784299 A CN118784299 A CN 118784299A
- Authority
- CN
- China
- Prior art keywords
- path
- information
- target
- matching
- feature value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 230000015654 memory Effects 0.000 claims description 28
- 230000011218 segmentation Effects 0.000 claims description 18
- 238000006243 chemical reaction Methods 0.000 claims description 14
- 238000001914 filtration Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 5
- 238000012216 screening Methods 0.000 description 18
- 230000008569 process Effects 0.000 description 17
- 238000012360 testing method Methods 0.000 description 9
- 230000006399 behavior Effects 0.000 description 8
- 230000000694 effects Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 230000004044 response Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 239000003795 chemical substances by application Substances 0.000 description 5
- 238000004590 computer program Methods 0.000 description 5
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 4
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 4
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 4
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000001052 transient effect Effects 0.000 description 2
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
本发明涉及网络安全技术领域,公开了安全访问策略匹配方法、装置、计算机设备及存储介质,方法包括:获取主机的访问信息,其中,访问信息包括第一路径信息和第二路径信息,第一路径信息为访问主体的路径信息,第二路径信息为访问客体的路径信息;基于预设文件名称与文件标识的对应关系表,将第一路径信息转换为数字形式的第一目标路径信息,并将第二路径信息转换为数字形式的第二目标路径信息;基于第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略;基于目标安全访问策略,确定访问主体对访问客体的访问权限。本发明通过将访问主体和访问客体的路径信息转换为数字形式,提高了安全访问策略的匹配效率。
The present invention relates to the field of network security technology, and discloses a security access policy matching method, device, computer equipment and storage medium. The method comprises: obtaining access information of a host, wherein the access information comprises first path information and second path information, the first path information is the path information of an access subject, and the second path information is the path information of an access object; based on a correspondence table of preset file names and file identifiers, converting the first path information into first target path information in digital form, and converting the second path information into second target path information in digital form; matching a target security access policy from a security access policy library based on the first target path information and the second target path information; and determining the access rights of the access subject to the access object based on the target security access policy. The present invention improves the matching efficiency of security access policies by converting the path information of the access subject and the access object into digital form.
Description
技术领域Technical Field
本发明涉及网络安全技术领域,具体涉及安全访问策略匹配方法、装置、计算机设备及存储介质。The present invention relates to the field of network security technology, and in particular to a security access policy matching method, device, computer equipment and storage medium.
背景技术Background Art
随着数字化转型和网络的发展,主机安全在网络安全中的地位越发重要。为保证主机及业务安全,安全访问策略必不可少,其实现的关键在于提升主体与客体的匹配效率。With the digital transformation and the development of the network, host security is becoming more and more important in network security. To ensure the security of the host and business, a secure access strategy is essential, and the key to its implementation lies in improving the matching efficiency between the subject and the object.
相关技术中,为提升主机安全访问策略的匹配效率,可将策略中的资源路径构建为树状结构。当处理安全访问策略匹配请求时,运用树的匹配算法进行匹配,以提升效率。In the related art, in order to improve the matching efficiency of host security access policies, the resource path in the policy can be constructed into a tree structure. When processing security access policy matching requests, the tree matching algorithm is used for matching to improve efficiency.
然而,相关技术的匹配仍然为资源路径的匹配,在安全访问策略多且资源路径长的情况下,存在匹配效率仍旧不高,系统响应速度较慢,无法实时防护的问题。However, the matching of related technologies is still the matching of resource paths. When there are many security access policies and long resource paths, there are problems such as low matching efficiency, slow system response speed, and inability to provide real-time protection.
发明内容Summary of the invention
有鉴于此,本发明提供了一种安全访问策略匹配方法、装置、计算机设备及存储介质,以解决相关技术中安全访问策略匹配效率低,系统响应速度慢,实时防护效果差的问题。In view of this, the present invention provides a security access policy matching method, apparatus, computer equipment and storage medium to solve the problems of low security access policy matching efficiency, slow system response speed and poor real-time protection effect in the related art.
第一方面,本发明提供了一种安全访问策略匹配方法,所述方法包括:In a first aspect, the present invention provides a security access policy matching method, the method comprising:
获取主机的访问信息,其中,所述访问信息包括第一路径信息和第二路径信息,所述第一路径信息为访问主体的路径信息,第二路径信息为访问客体的路径信息;Acquire access information of the host, wherein the access information includes first path information and second path information, the first path information is path information of the access subject, and the second path information is path information of the access object;
基于预设文件名称与文件标识的对应关系表,将所述第一路径信息转换为数字形式的第一目标路径信息,并将所述第二路径信息转换为数字形式的第二目标路径信息;Based on a preset table of correspondence between file names and file identifiers, converting the first path information into first target path information in digital form, and converting the second path information into second target path information in digital form;
基于所述第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略;Matching a target security access policy from a security access policy library based on the first target path information and the second target path information;
基于所述目标安全访问策略,确定所述访问主体对所述访问客体的访问权限。Based on the target security access policy, the access authority of the access subject to the access object is determined.
本实施例提供的安全访问策略匹配方法,通过将第一路径信息和第二路径信息转换为数字形式的第一目标路径信息和第二目标路径信息,根据第一目标路径信息和第二目标路径信息从安全访问策略库中匹配目标安全访问策略,提高了匹配效率,进而提高了系统响应速度,实现实时防护的效果。The security access policy matching method provided in this embodiment improves the matching efficiency by converting the first path information and the second path information into the first target path information and the second target path information in digital form, and matches the target security access policy from the security access policy library according to the first target path information and the second target path information, thereby improving the system response speed and achieving the effect of real-time protection.
在一种可选的实施方式中,所述基于预设文件名称与文件标识的对应关系表,将所述第一路径信息转换为数字形式的第一目标路径信息,并将所述第二路径信息转换为数字形式的第二目标路径信息,包括:In an optional implementation, the converting the first path information into first target path information in digital form and the converting the second path information into second target path information in digital form based on a preset file name and file identifier correspondence table includes:
基于文件分割标识,将所述第一路径信息和所述第二路径信息拆分为多个文件名;Based on the file segmentation identifier, split the first path information and the second path information into multiple file names;
判断预设文件名称与文件标识的对应关系表中是否包含多个所述文件名;Determine whether the correspondence table between preset file names and file identifiers contains multiple file names;
在预设文件名称与文件标识的对应关系表中包含多个所述文件名的情况下,基于所述预设文件名称与文件标识的对应关系表,获取多个所述文件名对应的文件标识;In the case where the correspondence table between preset file names and file identifiers contains a plurality of the file names, obtaining the file identifiers corresponding to the plurality of the file names based on the correspondence table between the preset file names and file identifiers;
在预设文件名称与文件标识的对应关系表中未包含多个所述文件名中的至少一个文件名的情况下,基于未包含的至少一个文件名,更新所述预设文件名称与文件标识的对应关系表,以基于更新后的所述预设文件名称与文件标识的对应关系表,获取多个所述文件名对应的文件标识;In a case where at least one of the multiple file names is not included in the correspondence table between preset file names and file identifiers, updating the correspondence table between preset file names and file identifiers based on the at least one file name that is not included, so as to obtain file identifiers corresponding to the multiple file names based on the updated correspondence table between preset file names and file identifiers;
将第一路径信息中的多个所述文件名之间的文件分割标识转换为数字连接标识,并将第一路径信息中的多个所述文件名替换为所述文件名对应的文件标识,获得所述第一目标路径信息;Convert the file segmentation identifiers between the multiple file names in the first path information into digital connection identifiers, and replace the multiple file names in the first path information with the file identifiers corresponding to the file names, to obtain the first target path information;
将第二路径信息中的多个所述文件名之间的文件分割标识转换为数字连接标识,并将第二路径信息中的多个所述文件名替换为所述文件名对应的文件标识,获得所述第二目标路径信息。The file segmentation identifiers between the multiple file names in the second path information are converted into digital connection identifiers, and the multiple file names in the second path information are replaced with file identifiers corresponding to the file names to obtain the second target path information.
本实施例提供的安全访问策略匹配方法,通过将第一路径信息和第二路径信息中的文件名转换为对应的文件标识,将第一路径信息和第二路径信息中的文件分割标识转化为数字连接标识,获得第一目标路径信息和第二目标路径信息,提高了匹配效率,进而提高了系统响应速度,实现实时防护的效果。The security access policy matching method provided in this embodiment improves the matching efficiency, thereby improving the system response speed and achieving the effect of real-time protection by converting the file name in the first path information and the second path information into a corresponding file identifier, and converting the file segmentation identifier in the first path information and the second path information into a digital connection identifier, thereby obtaining the first target path information and the second target path information.
在一种可选的实施方式中,所述基于所述第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略,包括:In an optional implementation, matching a target security access policy from a security access policy library based on the first target path information and the second target path information includes:
获取所述第一目标路径信息和所述第二目标路径信息的路径匹配特征值;Obtaining path matching feature values of the first target path information and the second target path information;
基于所述路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集;Based on the path matching feature value, a target path matching information set is screened out from a security access policy library;
基于所述目标路径匹配信息集,从安全访问策略库中获取目标安全访问策略集;Based on the target path matching information set, obtaining a target security access policy set from a security access policy library;
基于所述第一目标路径信息和所述第二目标路径信息,从所述目标安全访问策略集中匹配出目标安全访问策略。Based on the first target path information and the second target path information, a target security access policy is matched from the target security access policy set.
本实施例提供的安全访问策略匹配方法,通过获取第一目标路径信息和第二目标路径信息的路径匹配特征值,基于路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集,基于目标路径匹配信息集,从安全访问策略库中获取目标安全访问策略集,排除大量的不匹配项,提升访问主体和访问客体的匹配度,再基于第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。减少了访问主体和访问客体路径的精确匹配的次数,从而大幅度提升匹配效率。The security access policy matching method provided in this embodiment obtains the path matching feature value of the first target path information and the second target path information, and based on the path matching feature value, selects the target path matching information set from the security access policy library, obtains the target security access policy set from the security access policy library based on the target path matching information set, excludes a large number of unmatched items, improves the matching degree of the access subject and the access object, and then matches the target security access policy from the target security access policy set based on the first target path information and the second target path information. The number of accurate matchings of the access subject and the access object path is reduced, thereby greatly improving the matching efficiency.
在一种可选的实施方式中,所述获取所述第一目标路径信息和所述第二目标路径信息的路径匹配特征值,包括:In an optional implementation, the acquiring the path matching feature value of the first target path information and the second target path information includes:
基于所述第一目标路径信息中数字连接标识的个数,确定第一路径匹配特征值表征的第一目标路径的层级;Determining, based on the number of digital connection identifiers in the first target path information, a level of the first target path represented by the first path matching feature value;
基于所述第一目标路径信息中的文件标识和数字连接标识的总数,确定第二路径匹配特征值表征的第一目标路径的中间值;Determine, based on the total number of file identifiers and digital connection identifiers in the first target path information, an intermediate value of the first target path represented by the second path matching feature value;
基于所述第一目标路径信息中的文件标识,确定第三路径匹配特征值表征的第一目标路径的文件标识总和;Based on the file identifier in the first target path information, determine the sum of the file identifiers of the first target path represented by the third path matching feature value;
基于所述第二目标路径信息中数字连接标识的个数,确定第四路径匹配特征值表征的第二目标路径的层级;Determining, based on the number of digital connection identifiers in the second target path information, a level of the second target path represented by the fourth path matching feature value;
基于所述第二目标路径信息中的文件标识和数字连接标识的总数,确定第五路径匹配特征值表征的第二目标路径的中间值;Determine, based on the total number of file identifiers and digital connection identifiers in the second target path information, an intermediate value of the second target path represented by the fifth path matching feature value;
基于所述第二目标路径信息中的文件标识,确定第六路径匹配特征值表征的第二目标路径的文件标识总和。Based on the file identifier in the second target path information, a sum of the file identifiers of the second target path represented by the sixth path matching feature value is determined.
本实施例提供的安全访问策略匹配方法,通过获取访问主体的三个路径匹配特征值和访问客体的三个路径匹配特征值,进而实现路径匹配特征值的优先匹配,排除安全访问策略库中大量的不匹配项,提升访问主体与访问客体的匹配度,减少访问主体和访问客体路径的精确匹配的次数,从而大幅度提升匹配效率。The security access policy matching method provided in this embodiment obtains the three path matching feature values of the access subject and the three path matching feature values of the access object, thereby realizing priority matching of the path matching feature values, eliminating a large number of mismatched items in the security access policy library, improving the matching degree between the access subject and the access object, and reducing the number of precise matches of the access subject and access object paths, thereby greatly improving the matching efficiency.
在一种可选的实施方式中,所述基于所述路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集,包括:In an optional implementation, the step of filtering out a target path matching information set from a security access policy library based on the path matching feature value includes:
基于所述第一路径匹配特征值和第四路径匹配特征值,从安全访问策略库中筛选出访问主体的第一特征值不大于所述第一路径匹配特征值,且访问客体的第一特征值不大于所述第四路径匹配特征值的第一路径匹配信息集;Based on the first path matching feature value and the fourth path matching feature value, a first path matching information set whose first feature value of the access subject is not greater than the first path matching feature value and whose first feature value of the access object is not greater than the fourth path matching feature value is screened out from the security access policy library;
基于所述第二路径匹配特征值,从第一路径匹配信息集中筛选出访问主体的第二特征值与所述第二路径匹配特征值相同的第二路径匹配信息集;Based on the second path matching feature value, filter out a second path matching information set from the first path matching information set, the second feature value of the access subject being the same as the second path matching feature value;
在所述第二路径匹配信息集为空的情况下,对所述第一目标路径信息进行层级更新操作,获得更新后的第二路径匹配特征值和更新后的第三路径匹配特征值,基于更新后的第二路径匹配特征值,从第一路径匹配信息集中筛选出访问主体的第二特征值与更新后的第二路径匹配特征值相同的第二路径匹配信息集;In the case where the second path matching information set is empty, performing a hierarchical update operation on the first target path information to obtain an updated second path matching feature value and an updated third path matching feature value, and based on the updated second path matching feature value, filtering out from the first path matching information set a second path matching information set whose second feature value of the access subject is the same as the updated second path matching feature value;
在所述第二路径匹配信息集为空且所述第一目标路径信息层次更新至根目录的情况下,确定目标路径匹配信息集匹配失败;In the case where the second path matching information set is empty and the first target path information level is updated to the root directory, determining that the target path matching information set fails to match;
在所述第二路径匹配信息集不为空且所述第一目标路径信息未进行层次更新的情况下,基于第三路径匹配特征值,从所述第二路径匹配信息集中筛选出访问主体的第三特征值与所述第三路径匹配特征值相同的第三路径匹配信息集;In the case where the second path matching information set is not empty and the first target path information has not been hierarchically updated, based on the third path matching feature value, a third path matching information set whose third feature value of the access subject is the same as the third path matching feature value is filtered out from the second path matching information set;
在所述第二路径匹配信息集不为空且所述第一目标路径信息进行层次更新的情况下,基于更新后的第三路径匹配特征值,从所述第二路径匹配信息集中筛选出访问主体的第三特征值与更新后的第三路径匹配特征值相同的第三路径匹配信息集;In the case where the second path matching information set is not empty and the first target path information is hierarchically updated, based on the updated third path matching feature value, a third path matching information set whose third feature value of the access subject is the same as the updated third path matching feature value is filtered out from the second path matching information set;
基于所述第五路径匹配特征值,从第三路径匹配信息集中筛选出访问客体的第二特征值与所述第五路径匹配特征值相同的第四路径匹配信息集;Based on the fifth path matching feature value, a fourth path matching information set whose second feature value of the access object is the same as the fifth path matching feature value is selected from the third path matching information set;
在所述第四路径匹配信息集为空的情况下,对所述第二目标路径信息进行层级更新操作,获得更新后的第五路径匹配特征值和更新后的第六路径匹配特征值,基于更新后的第五路径匹配特征值,从第三路径匹配信息集中筛选出访问客体的第二特征值与更新后的第五路径匹配特征值相同的第四路径匹配信息集;In the case where the fourth path matching information set is empty, performing a hierarchical update operation on the second target path information to obtain an updated fifth path matching feature value and an updated sixth path matching feature value, and based on the updated fifth path matching feature value, filtering out a fourth path matching information set whose second feature value of the access object is the same as the updated fifth path matching feature value from the third path matching information set;
在所述第四路径匹配信息集为空且所述第二目标路径信息层次更新至根目录的情况下,确定目标路径匹配信息集匹配失败;In the case where the fourth path matching information set is empty and the second target path information level is updated to the root directory, determining that the target path matching information set fails to match;
在所述第四路径匹配信息集不为空且所述第二目标路径信息未进行层次更新的情况下,基于第六路径匹配特征值,从所述第四路径匹配信息集中筛选出访问客体的第三特征值与所述第六路径匹配特征值相同的目标路径匹配信息集;In the case where the fourth path matching information set is not empty and the second target path information has not been hierarchically updated, based on the sixth path matching feature value, a target path matching information set having a third feature value of the access object that is the same as the sixth path matching feature value is screened out from the fourth path matching information set;
在所述第四路径匹配信息集不为空且所述第二目标路径信息进行层次更新的情况下,基于更新后的第六路径匹配特征值,从所述第四路径匹配信息集中筛选出访问客体的第三特征值与更新后的第六路径匹配特征值相同的目标路径匹配信息集。When the fourth path matching information set is not empty and the second target path information is hierarchically updated, based on the updated sixth path matching feature value, a target path matching information set whose third feature value of the access object is the same as the updated sixth path matching feature value is filtered out from the fourth path matching information set.
本实施例提供的安全访问策略匹配方法,通过将访问主体的三个路径匹配特征值与安全访问策略库中的访问主体的三个特征值进行匹配,将访问客体的三个路径匹配特征值与安全访问策略库中的访问客体的三个特征值进行匹配,进而获得目标路径匹配信息集。实现了路径匹配特征值的优先匹配,排除安全访问策略库中大量的不匹配项,提升访问主体与访问客体的匹配度,减少访问主体和访问客体路径的精确匹配的次数,从而大幅度提升匹配效率。The security access policy matching method provided in this embodiment matches the three path matching feature values of the access subject with the three feature values of the access subject in the security access policy library, and matches the three path matching feature values of the access object with the three feature values of the access object in the security access policy library, thereby obtaining a target path matching information set. The priority matching of the path matching feature values is achieved, a large number of mismatched items in the security access policy library are eliminated, the matching degree of the access subject and the access object is improved, and the number of accurate matchings of the access subject and the access object path is reduced, thereby greatly improving the matching efficiency.
在一种可选的实施方式中,所述基于所述第一目标路径信息和所述第二目标路径信息,从所述目标安全访问策略集中匹配出目标安全访问策略,包括:In an optional implementation, matching a target security access policy from the target security access policy set based on the first target path information and the second target path information includes:
获取触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息;Acquire first target path information and second target path information that trigger successful matching of the target path matching information set;
基于触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息,从所述目标安全访问策略集中匹配出目标安全访问策略。Based on the first target path information and the second target path information that trigger the successful matching of the target path matching information set, a target security access policy is matched from the target security access policy set.
本实施例提供的安全访问策略匹配方法,通过基于触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息,可以更准确地确定目标安全访问策略,确保了系统的安全性。The security access policy matching method provided in this embodiment can more accurately determine the target security access policy by triggering the first target path information and the second target path information that successfully match the target path matching information set, thereby ensuring the security of the system.
在一种可选的实施方式中,所述基于所述目标路径匹配信息集,从安全访问策略库中获取目标安全访问策略集,包括:In an optional implementation, the acquiring a target security access policy set from a security access policy library based on the target path matching information set includes:
获取所述目标路径匹配信息集中的关联标识;Obtaining an association identifier in the target path matching information set;
基于所述关联标识,从安全访问策略库中获取目标安全访问策略集。Based on the association identifier, a target security access policy set is obtained from a security access policy library.
本实施例提供的安全访问策略匹配方法,通过基于目标路径匹配信息集中的关联标识,从安全访问策略库中获取目标安全访问策略集,保证了获取到的目标安全访问策略集的准确性。The security access policy matching method provided in this embodiment obtains the target security access policy set from the security access policy library by matching the association identifier in the target path information set, thereby ensuring the accuracy of the obtained target security access policy set.
第二方面,本发明提供了一种安全访问策略匹配装置,所述装置包括:In a second aspect, the present invention provides a security access policy matching device, the device comprising:
获取模块,用于获取主机的访问信息,其中,所述访问信息包括第一路径信息和第二路径信息,所述第一路径信息为访问主体的路径信息,第二路径信息为访问客体的路径信息;An acquisition module, used to acquire access information of a host, wherein the access information includes first path information and second path information, the first path information is path information of an access subject, and the second path information is path information of an access object;
转换模块,用于基于预设文件名称与文件标识的对应关系表,将所述第一路径信息转换为数字形式的第一目标路径信息,并将所述第二路径信息转换为数字形式的第二目标路径信息;a conversion module, configured to convert the first path information into first target path information in digital form, and convert the second path information into second target path information in digital form, based on a preset table of correspondence between file names and file identifiers;
匹配模块,用于基于所述第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略;A matching module, configured to match a target security access policy from a security access policy library based on the first target path information and the second target path information;
确定模块,用于基于所述目标安全访问策略,确定所述访问主体对所述访问客体的访问权限。The determination module is used to determine the access rights of the access subject to the access object based on the target security access policy.
第三方面,本发明提供了一种计算机设备,包括:存储器和处理器,存储器和处理器之间互相通信连接,存储器中存储有计算机指令,处理器通过执行计算机指令,从而执行上述第一方面或其对应的任一实施方式的安全访问策略匹配方法。In a third aspect, the present invention provides a computer device, comprising: a memory and a processor, the memory and the processor being communicatively connected to each other, the memory storing computer instructions, and the processor executing the security access policy matching method of the first aspect or any corresponding implementation method thereof by executing the computer instructions.
第四方面,本发明提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机指令,计算机指令用于使计算机执行上述第一方面或其对应的任一实施方式的安全访问策略匹配方法。In a fourth aspect, the present invention provides a computer-readable storage medium having computer instructions stored thereon, the computer instructions being used to enable a computer to execute the security access policy matching method of the first aspect or any corresponding embodiment thereof.
第五方面,本发明提供了一种计算机程序产品,包括计算机指令,计算机指令用于使计算机执行上述第一方面或其对应的任一实施方式的安全访问策略匹配方法。In a fifth aspect, the present invention provides a computer program product, including computer instructions, which are used to enable a computer to execute the security access policy matching method of the first aspect or any corresponding implementation method thereof.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本发明具体实施方式或相关技术中的技术方案,下面将对具体实施方式或相关技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the specific embodiments of the present invention or the technical solutions in the related technologies, the drawings required for use in the specific embodiments or the related technical descriptions will be briefly introduced below. Obviously, the drawings described below are some embodiments of the present invention. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.
图1是根据本发明实施例的安全访问策略匹配方法的流程示意图;FIG1 is a schematic flow chart of a security access policy matching method according to an embodiment of the present invention;
图2是根据本发明实施例的另一安全访问策略匹配方法的流程示意图;FIG2 is a schematic diagram of a flow chart of another security access policy matching method according to an embodiment of the present invention;
图3是根据本发明实施例的安全访问策略匹配系统的结构示意图;3 is a schematic diagram of the structure of a security access policy matching system according to an embodiment of the present invention;
图4是根据本发明实施例的存储安全访问策略的流程示意图;FIG4 is a schematic diagram of a process for storing a security access policy according to an embodiment of the present invention;
图5是根据本发明实施例的又一安全访问策略匹配方法的流程示意图;FIG5 is a schematic flow chart of another security access policy matching method according to an embodiment of the present invention;
图6是根据本发明实施例的安全访问策略匹配装置的结构框图;6 is a structural block diagram of a security access policy matching device according to an embodiment of the present invention;
图7是本发明实施例的计算机设备的硬件结构示意图。FIG. 7 is a schematic diagram of the hardware structure of a computer device according to an embodiment of the present invention.
具体实施方式DETAILED DESCRIPTION
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solution and advantages of the embodiments of the present invention clearer, the technical solution in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work are within the scope of protection of the present invention.
随着网络的发展,网络安全越来越重要。主机是存储和处理敏感信息的关键设备,因此,主机安全在网络安全中扮演着非常重要的角色。为了保证主机以及主机上运行的业务的安全,会人为下发很多安全访问策略,也可以称为安全访问控制策略。With the development of the Internet, network security is becoming more and more important. Hosts are key devices for storing and processing sensitive information. Therefore, host security plays a very important role in network security. In order to ensure the security of hosts and the services running on them, many security access policies are manually issued, which can also be called security access control policies.
需要说明的是,安全访问控制策略是一种人为配置的安全规则,经过网页管理端或者主机的命令行界面下发到主机上安装的代理(Agent)端,经过安全规则解析后,最终在主机生效,旨在提高主机本地资源访问的安全性。示例性地,Linux上安全访问控制策略可以如表1所示。It should be noted that the security access control policy is a manually configured security rule, which is sent to the agent installed on the host through the web management terminal or the command line interface of the host. After the security rule is parsed, it finally takes effect on the host, aiming to improve the security of local resource access on the host. For example, the security access control policy on Linux can be shown in Table 1.
表1Table 1
代理端指的是在主机中,负责执行特定任务、收集数据、与用户交互或与其他系统组件通信的软件组件、应用程序、中间件或其他类型的程序。An agent is a software component, application, middleware, or other type of program that resides on a host computer and is responsible for performing specific tasks, collecting data, interacting with users, or communicating with other system components.
其中,安全访问控制策略中的三个字段的解释如下:The three fields in the security access control policy are explained as follows:
主体:指一个主动的实体,是访问的发起者。一般指进程、服务、程序或者访问用户等,造成了信息的流动和系统状态的改变。Subject: refers to an active entity, the initiator of access. Generally refers to a process, service, program or access user, which causes the flow of information and the change of system status.
需要说明的是,主体可以配置目录,配置目录时,主体包含此目录下或者子目录中的所有进程、服务或者程序。It should be noted that the subject can configure a directory. When configuring a directory, the subject includes all processes, services or programs under this directory or in its subdirectories.
客体:指包含或接受信息的被动实体,它在信息流动中的地位是被动的,处于主体的作用之下。客体可以是被调用的程序或被存取的数据,也可以是一个目录。对客体的访问意味着对客体所包含信息的访问。Object: refers to a passive entity that contains or receives information. Its position in the flow of information is passive and is under the influence of the subject. The object can be a called program or accessed data, or a directory. Access to the object means access to the information contained in the object.
权限:指主体对客体中受保护资源的访问或者执行权利。Permission: refers to the subject's access or execution rights to the protected resources in the object.
如表1,在主体为/etc/bin,客体为/usr/local/check的情况下,主体对客体有读写权限,也即主体可以对客体执行读操作或写操作。As shown in Table 1, when the subject is /etc/bin and the object is /usr/local/check, the subject has read and write permissions on the object, that is, the subject can perform read or write operations on the object.
在主体为/usr/local/ZeC,客体为/usr/local/ZeC/bin的情况下,主体对客体有执行权限,也即主体可以对客体执行各种操作。When the subject is /usr/local/ZeC and the object is /usr/local/ZeC/bin, the subject has execution permission on the object, that is, the subject can perform various operations on the object.
在用户配置完安全访问控制策略后,安全访问控制策略下发到主机的代理端,主机的代理端将安全访问控制策略进行解析,获得上述格式的安全访问控制策略。After the user configures the security access control policy, the security access control policy is sent to the agent of the host, and the agent of the host parses the security access control policy to obtain the security access control policy in the above format.
当主机中主体(用户或者进程)想要访问客体(主机资源)时,就会触发安全访问策略匹配,匹配成功的情况下,主体只能对客体执行对应安全访问策略中匹配的权限,执行未配置的权限时将被拒绝。主体或者客体匹配对应的安全访问策略失败的情况下,将不做处置,即不做权限限制,主体对客体的访问无权限限制。When the subject (user or process) in the host wants to access the object (host resources), it will trigger the security access policy match. If the match is successful, the subject can only execute the permissions matched in the corresponding security access policy on the object, and the execution of unconfigured permissions will be denied. If the subject or object fails to match the corresponding security access policy, no action will be taken, that is, no permission restriction will be made, and the subject's access to the object will not be restricted.
需要说明的是,安全访问策略的匹配是指,主机上实际执行的主体与安全访问控制策略中的主体,主机上被访问的客体与安全访问控制策略中的客体进行一一匹配,匹配成功后,再进行权限的控制。It should be noted that the matching of security access policies refers to the one-to-one matching of the subject actually executed on the host with the subject in the security access control policy, and the object accessed on the host with the object in the security access control policy. After the matching is successful, permission control is performed.
当用户操作主机资源或者其他进程访问主机资源时会触发安全访问策略的匹配,为了提高用户的易用性、不影响主机上运行的业务的稳定性并实时保护主机资源,提升主机安全访问控制策略的匹配效率成为关键。而主机安全访问策略的匹配效率归根结底是安全访问控制策略中主体与客体的匹配效率,而主体与客体的匹配效率本质上就是主机上资源路径的匹配效率。When users operate host resources or other processes access host resources, the matching of security access policies will be triggered. In order to improve user usability, not affect the stability of the business running on the host, and protect host resources in real time, improving the matching efficiency of host security access control policies becomes the key. The matching efficiency of host security access policies is ultimately the matching efficiency of the subject and object in the security access control policy, and the matching efficiency of the subject and object is essentially the matching efficiency of the resource path on the host.
相关技术中,为提升主机安全访问策略的匹配效率,可将策略中的资源路径构建为树状结构。当处理安全访问策略匹配请求时,也即处理主体与客体的匹配时,运用树的匹配算法进行匹配也即树的匹配,以提升效率。In the related art, in order to improve the matching efficiency of host security access policy, the resource path in the policy can be constructed into a tree structure. When processing security access policy matching requests, that is, when processing the matching of subjects and objects, a tree matching algorithm is used for matching, that is, tree matching, to improve efficiency.
然而,相关技术的匹配仍然为主机上资源路径的匹配,在安全访问策略多且主体与客体的资源路径长的情况下,触发安全访问策略匹配时,即使使用树的数据结构匹配算法提升的效率也不明显,导致系统的响应速度较慢且实时防护效果较差。However, the matching of related technologies is still the matching of resource paths on the host. When there are many security access policies and the resource paths of the subject and the object are long, when the security access policy matching is triggered, even if the efficiency is improved by using the tree data structure matching algorithm, it is not obvious, resulting in slow system response speed and poor real-time protection effect.
当然,在安全访问策略多且主体与客体的资源路径长的情况下,存储安全访问策略占用的磁盘空间也很大。Of course, when there are many security access policies and the resource paths between the subject and the object are long, the disk space occupied by storing the security access policies is also very large.
本发明实施例提供了一种安全访问策略匹配方法,通过根据预设文件名称与文件标识的对应关系表,将第一路径信息转换为数字形式的第一目标路径信息,将第二路径信息转换为数字形式的第二路径信息,基于第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略以达到提高安全访问策略匹配效率,实现实时防护的效果。An embodiment of the present invention provides a security access policy matching method, which converts the first path information into first target path information in digital form and converts the second path information into second path information in digital form according to a correspondence table between preset file names and file identifiers. Based on the first target path information and the second target path information, the target security access policy is matched from a security access policy library to improve the security access policy matching efficiency and achieve real-time protection effects.
根据本发明实施例,提供了一种安全访问策略匹配方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。According to an embodiment of the present invention, an embodiment of a security access policy matching method is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer executable instructions, and although a logical order is shown in the flowchart, in some cases, the steps shown or described can be executed in an order different from that shown here.
在本实施例中提供了一种安全访问策略匹配方法,可用于移动终端,如服务器,中央处理单元等,图1是根据本发明实施例的安全访问策略匹配方法的流程图,如图1所示,该流程包括如下步骤:In this embodiment, a security access policy matching method is provided, which can be used in a mobile terminal, such as a server, a central processing unit, etc. FIG. 1 is a flow chart of a security access policy matching method according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps:
步骤S101,获取主机的访问信息。Step S101, obtaining access information of the host.
其中,访问信息包括第一路径信息和第二路径信息,第一路径信息为访问主体的路径信息,第二路径信息为访问客体的路径信息。其中,访问主体与前述描述的主体相同,访问客体与前述描述的客体相同。The access information includes first path information and second path information, the first path information is the path information of the access subject, and the second path information is the path information of the access object. The access subject is the same as the subject described above, and the access object is the same as the object described above.
该访问信息为主机上的访问主体(用户或者进行或者服务等)访问客体(主机资源)的信息。The access information is information about the access subject (user or process or service, etc.) on the host accessing the object (host resource).
需要说明的是,当用户操作主机资源或者其他进程访问主机资源时,会生成访问信息,服务器获取主机的访问信息。It should be noted that when a user operates a host resource or other processes access a host resource, access information is generated and the server obtains the access information of the host.
步骤S102,基于预设文件名称与文件标识的对应关系表,将第一路径信息转换为数字形式的第一目标路径信息,并将第二路径信息转换为数字形式的第二目标路径信息。Step S102: based on a preset correspondence table between file names and file identifiers, convert the first path information into first target path information in digital form, and convert the second path information into second target path information in digital form.
其中,预设文件名称与文件标识的对应关系表由用户置入服务器,包含文件名称与文件标识的对应关系。示例性地,预设文件名称与文件标识的对应关系表可以如表2所示。The correspondence table between the preset file names and file identifiers is placed in the server by the user and includes the correspondence between the file names and file identifiers. For example, the correspondence table between the preset file names and file identifiers may be as shown in Table 2.
表2Table 2
其中,文件标识可以由身份标识(Identification,简称:ID)进行表征。如表2所示,文件名称为usr,对应的文件标识为1。文件名称为root,对应的文件标识为2等。The file identifier can be represented by an identity identifier (ID). As shown in Table 2, the file name is usr, and the corresponding file identifier is 1. The file name is root, and the corresponding file identifier is 2, and so on.
在获取到第一路径信息和第二路径信息后,根据预设文件名称与文件标识的对应关系表,将第一路径信息转换为数字形式的第一目标路径信息,将第二路径信息转换为数字形式的第二目标路径信息。After the first path information and the second path information are acquired, the first path information is converted into first target path information in digital form, and the second path information is converted into second target path information in digital form according to a preset correspondence table between file names and file identifiers.
步骤S103,基于第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略。Step S103: Match a target security access policy from a security access policy library based on the first target path information and the second target path information.
其中,安全访问策略库设置在主机代理端,用于存储用户下发的安全访问策略。需要说明的是,安全访问策略库中的安全访问策略可以以表3所示形式存在。The security access policy library is set at the host agent end and is used to store the security access policies issued by the user. It should be noted that the security access policies in the security access policy library can exist in the form shown in Table 3.
表3Table 3
可见,安全访问策略库中的安全访问策略中的主体和客体的路径信息也是以数字形式存在的。It can be seen that the path information of the subject and object in the security access policy in the security access policy library also exists in digital form.
在获取到第一目标路径信息和第二目标路径信息后,根据第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略。After the first target path information and the second target path information are acquired, a target security access policy is matched from a security access policy library according to the first target path information and the second target path information.
步骤S104,基于目标安全访问策略,确定访问主体对访问客体的访问权限。Step S104: Determine the access rights of the access subject to the access object based on the target security access policy.
其中,在从安全访问策略库中匹配出目标安全访问策略的情况下,根据目标安全访问策略,确定出访问主体对访问客体的访问权限。When a target security access policy is matched from the security access policy library, the access authority of the access subject to the access object is determined according to the target security access policy.
本实施例提供的安全访问策略匹配方法,通过将第一路径信息和第二路径信息转换为数字形式的第一目标路径信息和第二目标路径信息,根据第一目标路径信息和第二目标路径信息从安全访问策略库中匹配目标安全访问策略,提高了匹配效率,进而提高了系统响应速度,实现实时防护的效果。且安全访问策略库中存储的安全访问策略的主体和客体也是数字形式的,因此节省了存储安全访问策略占用的磁盘空间。The security access policy matching method provided in this embodiment improves the matching efficiency and thus improves the system response speed by converting the first path information and the second path information into the first target path information and the second target path information in digital form, and matching the target security access policy from the security access policy library according to the first target path information and the second target path information, thereby achieving the effect of real-time protection. Moreover, the subject and object of the security access policy stored in the security access policy library are also in digital form, thus saving the disk space occupied by storing the security access policy.
在本实施例中提供了一种安全访问策略匹配方法,可用于移动终端,如服务器、中央处理单元等,图2是根据本发明实施例的安全访问策略匹配方法的流程图,如图2所示,该流程包括如下步骤:In this embodiment, a security access policy matching method is provided, which can be used in a mobile terminal, such as a server, a central processing unit, etc. FIG. 2 is a flow chart of the security access policy matching method according to an embodiment of the present invention. As shown in FIG. 2 , the process includes the following steps:
步骤S201,获取主机的访问信息。详细请参见图1所示实施例的步骤S101,在此不再赘述。Step S201, obtaining access information of the host. Please refer to step S101 of the embodiment shown in FIG1 for details, which will not be described in detail here.
步骤S202,基于预设文件名称与文件标识的对应关系表,将第一路径信息转换为数字形式的第一目标路径信息,并将第二路径信息转换为数字形式的第二目标路径信息。Step S202: based on a preset correspondence table between file names and file identifiers, convert the first path information into first target path information in digital form, and convert the second path information into second target path information in digital form.
具体地,上述步骤S202包括:Specifically, the above step S202 includes:
步骤S2021,基于文件分割标识,将第一路径信息和第二路径信息拆分为多个文件名。Step S2021: split the first path information and the second path information into multiple file names based on the file segmentation identifier.
其中,在获取到第一路径信息和第二路径信息后,根据第一路径信息和第二路径信息中的文件分割标识,将第一路径信息和第二路径信息拆分为多个文件名。After the first path information and the second path information are acquired, the first path information and the second path information are split into a plurality of file names according to the file segmentation identifiers in the first path information and the second path information.
需要说明的是,文件分割标识可以是“/”。示例性地,第一路径信息为/usr/local/bin,根据文件分割标识,将第一路径信息拆分为usr、local和bin。It should be noted that the file segmentation mark may be “/”. Exemplarily, the first path information is /usr/local/bin, and the first path information is split into usr, local, and bin according to the file segmentation mark.
同理,将第二路径信息拆分为多个文件名。Similarly, the second path information is split into multiple file names.
步骤S2022,判断预设文件名称与文件标识的对应关系表中是否包含多个文件名。Step S2022, determining whether the correspondence table between preset file names and file identifiers contains multiple file names.
其中,在将第一路径信息拆分为多个文件名,将第二路径信息拆分为多个文件名之后,判断预设文件名称与文件标识的对应关系表中是否包含第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名。After splitting the first path information into multiple file names and splitting the second path information into multiple file names, it is determined whether the preset file name and file identifier correspondence table contains the multiple file names split from the first path information and the multiple file names split from the second path information.
步骤S2023,在预设文件名称与文件标识的对应关系表中包含多个文件名的情况下,基于预设文件名称与文件标识的对应关系表,获取多个文件名对应的文件标识。Step S2023, when the preset file name and file identifier correspondence table contains multiple file names, based on the preset file name and file identifier correspondence table, obtain the file identifiers corresponding to the multiple file names.
其中,预设文件名称与文件标识的对应关系表中包含第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名,说明基于预设文件名称与文件标识的对应关系表,可以获取到第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名对应的文件标识。Among them, the correspondence table between preset file names and file identifiers includes multiple file names split from the first path information and multiple file names split from the second path information, indicating that based on the correspondence table between preset file names and file identifiers, the file identifiers corresponding to the multiple file names split from the first path information and the multiple file names split from the second path information can be obtained.
则基于预设文件名称与文件标识的对应关系表,获取第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名对应的文件标识。Based on the preset correspondence table between file names and file identifiers, file identifiers corresponding to the multiple file names split from the first path information and the multiple file names split from the second path information are obtained.
步骤S2024,在预设文件名称与文件标识的对应关系表中未包含多个文件名中的至少一个文件名的情况下,基于未包含的至少一个文件名,更新预设文件名称与文件标识的对应关系表,以基于更新后的预设文件名称与文件标识的对应关系表,获取多个文件名对应的文件标识。Step S2024, when at least one of the multiple file names is not included in the correspondence table between preset file names and file identifiers, the correspondence table between preset file names and file identifiers is updated based on the at least one file name that is not included, so as to obtain file identifiers corresponding to the multiple file names based on the updated correspondence table between preset file names and file identifiers.
其中,预设文件名称与文件标识的对应关系表中未包含第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名中的至少一个文件名,说明基于预设文件名称与文件标识的对应关系表无法获取第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名对应的文件标识。Among them, the correspondence table between preset file names and file identifiers does not include at least one of the multiple file names split from the first path information and the multiple file names split from the second path information, indicating that the file identifiers corresponding to the multiple file names split from the first path information and the multiple file names split from the second path information cannot be obtained based on the correspondence table between preset file names and file identifiers.
则需要更新预设文件名称与文件标识的对应关系表,具体地,将未包含的至少一个文件名与该文件名对应的文件标识按照如表2所示形式添加至预设文件名称与文件标识的对应关系表中。可以理解的是,未包含的文件名对应的文件标识可以由用户设置,也可以是服务器按照预设文件名称与文件标识的对应关系表中ID的当前最大值依次加1生成。示例性地,当前ID的最大值为500,若未包含的文件名为2个,则未包含的文件名中的其中一个文件名对应的文件标识为501,另一个文件名对应的文件标识为502。Then it is necessary to update the correspondence table of preset file names and file identifiers. Specifically, add at least one file name that is not included and the file identifier corresponding to the file name to the correspondence table of preset file names and file identifiers in the form shown in Table 2. It can be understood that the file identifier corresponding to the file name that is not included can be set by the user, or it can be generated by the server according to the current maximum value of the ID in the correspondence table of preset file names and file identifiers plus 1 in sequence. Exemplarily, the maximum value of the current ID is 500. If there are 2 file names that are not included, the file identifier corresponding to one of the file names that are not included is 501, and the file identifier corresponding to the other file name is 502.
示例性地,更新后的预设文件名称与文件标识的对应关系表可以如表4所示。Exemplarily, the updated correspondence table between preset file names and file identifiers may be as shown in Table 4.
表4Table 4
示例性地,第一路径信息为/root/test时,由于表2所示预设文件名称与文件标识的对应关系表中未包含test文件名,则需要更新预设文件名称与文件标识的对应关系表,更新后如表4所示,添加了test文件名以及test对应的文件标识即501。Exemplarily, when the first path information is /root/test, since the test file name is not included in the correspondence table of preset file names and file identifiers shown in Table 2, it is necessary to update the correspondence table of preset file names and file identifiers. After the update, as shown in Table 4, the test file name and the file identifier corresponding to test, namely 501, are added.
基于更新后的预设文件名称与文件标识的对应关系表,获取第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名对应的文件标识。Based on the updated correspondence table between preset file names and file identifiers, file identifiers corresponding to the multiple file names split from the first path information and the multiple file names split from the second path information are obtained.
步骤S2025,将第一路径信息中的多个文件名之间的文件分割标识转换为数字连接标识,并将第一路径信息中的多个文件名替换为文件名对应的文件标识,获得第一目标路径信息。Step S2025: convert the file segmentation identifiers between the multiple file names in the first path information into digital connection identifiers, and replace the multiple file names in the first path information with the file identifiers corresponding to the file names to obtain the first target path information.
其中,在获取到第一路径信息拆分出的多个文件名和第二路径信息拆分出的多个文件名对应的文件标识之后,将第一路径信息中多个文件名之间的文件分割标识转化为数字连接标识。After obtaining the file identifiers corresponding to the multiple file names split from the first path information and the multiple file names split from the second path information, the file segmentation identifiers between the multiple file names in the first path information are converted into digital connection identifiers.
需要说明的是,数字连接标识可以是“-”。示例性地,第一路径信息为/usr/local/bin,则将第一路径信息中多个文件名之间的文件分割标识转化为数字连接标识,第一路径信息变为usr-local-bin。It should be noted that the digital connection identifier may be “-”. Exemplarily, if the first path information is /usr/local/bin, the file separation identifiers between multiple file names in the first path information are converted into digital connection identifiers, and the first path information becomes usr-local-bin.
将第一路径信息中的多个文件名替换为文件名对应的文件标识,示例性地,如表2所示,usr对应的文件标识为1,local对应的文件标识为45,bin对应的文件标识为46。则第一目标路径信息为1-45-46。The multiple file names in the first path information are replaced with the file identifiers corresponding to the file names. For example, as shown in Table 2, the file identifier corresponding to usr is 1, the file identifier corresponding to local is 45, and the file identifier corresponding to bin is 46. Then the first target path information is 1-45-46.
步骤S2026,将第二路径信息中的多个文件名之间的文件分割标识转换为数字连接标识,并将第二路径信息中的多个文件名替换为文件名对应的文件标识,获得第二目标路径信息。Step S2026: convert the file segmentation identifiers between the multiple file names in the second path information into digital connection identifiers, and replace the multiple file names in the second path information with the file identifiers corresponding to the file names to obtain the second target path information.
如前述获取第一目标路径信息的流程,同理可以得到第二目标路径信息。As in the aforementioned process of obtaining the first target path information, the second target path information can be obtained similarly.
步骤S203,基于第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略。详细请参见图1所示实施例的步骤S103,在此不再赘述。Step S203: Match the target security access policy from the security access policy library based on the first target path information and the second target path information. For details, please refer to step S103 of the embodiment shown in FIG1 , which will not be described in detail here.
步骤S204,基于目标安全访问策略,确定访问主体对访问客体的访问权限。详细请参见图1所示实施例的步骤S104,在此不再赘述。Step S204: Determine the access rights of the access subject to the access object based on the target security access policy. Please refer to step S104 of the embodiment shown in FIG1 for details, which will not be described in detail here.
本实施例提供的安全访问策略匹配方法,通过将第一路径信息和第二路径信息中的文件名转换为对应的文件标识,将第一路径信息和第二路径信息中的文件分割标识转化为数字连接标识,获得第一目标路径信息和第二目标路径信息,提高了匹配效率,进而提高了系统响应速度,实现实时防护的效果。The security access policy matching method provided in this embodiment improves the matching efficiency, thereby improving the system response speed and achieving the effect of real-time protection by converting the file name in the first path information and the second path information into a corresponding file identifier, and converting the file segmentation identifier in the first path information and the second path information into a digital connection identifier, thereby obtaining the first target path information and the second target path information.
在一些可选的实施方式中,上述步骤S203包括:In some optional implementations, the above step S203 includes:
步骤a1,获取第一目标路径信息和第二目标路径信息的路径匹配特征值。Step a1: Obtain path matching feature values of first target path information and second target path information.
其中,在获取到第一目标路径信息和第二目标路径信息后,获取第一目标路径信息的路径匹配特征值和第二目标路径信息的路径匹配特征值。After the first target path information and the second target path information are obtained, the path matching feature value of the first target path information and the path matching feature value of the second target path information are obtained.
步骤a2,基于路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集。Step a2: based on the path matching feature value, filter out the target path matching information set from the security access policy library.
其中,在获取到第一目标路径信息的路径匹配特征值和第二目标路径信息的路径匹配特征值之后,根据第一目标路径信息的路径匹配特征值和第二目标路径信息的路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集。After obtaining the path matching feature value of the first target path information and the path matching feature value of the second target path information, the target path matching information set is filtered out from the security access policy library according to the path matching feature value of the first target path information and the path matching feature value of the second target path information.
步骤a3,基于目标路径匹配信息集,从安全访问策略库中获取目标安全访问策略集。Step a3: based on the target path matching information set, obtain the target security access policy set from the security access policy library.
其中,在筛选出目标路径匹配信息集后,根据目标路径匹配信息集,从安全访问策略库中获取目标安全访问策略集。After the target path matching information set is screened out, the target security access policy set is obtained from the security access policy library according to the target path matching information set.
步骤a4,基于第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。Step a4: matching a target security access policy from a target security access policy set based on the first target path information and the second target path information.
其中,在获取到目标安全访问策略集之后,根据第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。After the target security access policy set is acquired, the target security access policy is matched from the target security access policy set according to the first target path information and the second target path information.
本实施例提供的安全访问策略匹配方法,通过获取第一目标路径信息和第二目标路径信息的路径匹配特征值,基于路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集,基于目标路径匹配信息集,从安全访问策略库中获取目标安全访问策略集,排除大量的不匹配项,提升访问主体和访问客体的匹配度,再基于第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。减少了访问主体和访问客体路径的精确匹配的次数,从而大幅度提升匹配效率。The security access policy matching method provided in this embodiment obtains the path matching feature value of the first target path information and the second target path information, and based on the path matching feature value, selects the target path matching information set from the security access policy library, obtains the target security access policy set from the security access policy library based on the target path matching information set, excludes a large number of unmatched items, improves the matching degree of the access subject and the access object, and then matches the target security access policy from the target security access policy set based on the first target path information and the second target path information. The number of accurate matchings of the access subject and the access object path is reduced, thereby greatly improving the matching efficiency.
在一些可选的实施方式中,上述步骤a1包括:In some optional implementations, the above step a1 includes:
步骤a11,基于第一目标路径信息中数字连接标识的个数,确定第一路径匹配特征值表征的第一目标路径的层级。Step a11: determining the level of the first target path represented by the first path matching feature value based on the number of digital connection identifiers in the first target path information.
其中,第一路径匹配特征值表征的第一目标路径的层级通过第一目标路径信息中数字连接标识的个数加1得到。The level of the first target path represented by the first path matching feature value is obtained by adding 1 to the number of digital connection identifiers in the first target path information.
示例性地,第一目标路径信息为1-45-46,其中数字连接标识的个数为2,则第一路径匹配特征值为3。Exemplarily, the first target path information is 1-45-46, where the number of digital connection identifiers is 2, and the first path matching feature value is 3.
步骤a12,基于第一目标路径信息中的文件标识和数字连接标识的总数,确定第二路径匹配特征值表征的第一目标路径的中间值。Step a12: determining the middle value of the first target path represented by the second path matching feature value based on the total number of file identifiers and digital connection identifiers in the first target path information.
其中,第二路径匹配特征值表征的第一目标路径的中间值通过获取第一目标路径信息中文件标识和数字连接标识的总数,进而获得该总数的中位数,通过中位数确定第一目标路径信息中中位数对应的中间值,即第一目标路径的中间值。Among them, the middle value of the first target path represented by the second path matching feature value is obtained by obtaining the total number of file identifiers and digital connection identifiers in the first target path information, and then obtaining the median of the total number, and the middle value corresponding to the median in the first target path information is determined by the median, that is, the middle value of the first target path.
示例性地,第一目标路径信息为1-45-46,文件标识和数字连接标识的总数为5,该总数的中位数为3,则中位数3对应的中间值为45,也即第一目标路径的中间值为45,第二路径匹配特征值为45。Exemplarily, the first target path information is 1-45-46, the total number of file identifiers and digital connection identifiers is 5, the median of the total is 3, and the median value corresponding to the median 3 is 45, that is, the median value of the first target path is 45, and the second path matching feature value is 45.
步骤a13,基于第一目标路径信息中的文件标识,确定第三路径匹配特征值表征的第一目标路径的文件标识总和。Step a13: determining the sum of the file identifiers of the first target path represented by the third path matching feature value based on the file identifiers in the first target path information.
其中,第三路径匹配特征值表征的第一目标路径的文件标识总和通过第一目标路径信息中的所有文件标识相加得到。The sum of the file identifiers of the first target path represented by the third path matching feature value is obtained by adding all the file identifiers in the first target path information.
示例性地,第一目标路径信息为1-45-46,所有文件标识的总和为1+45+46=92,则第三路径匹配特征值为92。Exemplarily, the first target path information is 1-45-46, the sum of all file identifiers is 1+45+46=92, and the third path matching feature value is 92.
步骤a14,基于第二目标路径信息中数字连接标识的个数,确定第四路径匹配特征值表征的第二目标路径的层级。Step a14: determining the level of the second target path represented by the fourth path matching feature value based on the number of digital connection identifiers in the second target path information.
其中,第四路径匹配特征值表征的第二目标路径的层级通过第二目标路径信息中数字连接标识的个数加1得到。The level of the second target path represented by the fourth path matching feature value is obtained by adding 1 to the number of digital connection identifiers in the second target path information.
示例性地,第二目标路径信息为2-501,其中数字连接标识的个数为1,则第四路径匹配特征值为2。Exemplarily, the second target path information is 2-501, wherein the number of digital connection identifiers is 1, and the fourth path matching feature value is 2.
步骤a15,基于第二目标路径信息中的文件标识和数字连接标识的总数,确定第五路径匹配特征值表征的第二目标路径的中间值。Step a15: determining the middle value of the second target path represented by the fifth path matching feature value based on the total number of file identifiers and digital connection identifiers in the second target path information.
其中,第五路径匹配特征值表征的第二目标路径的中间值通过获取第二目标路径信息中文件标识和数字连接标识的总数,进而获得该总数的中位数,通过中位数确定第二目标路径信息中中位数对应的中间值,即第二目标路径的中间值。Among them, the middle value of the second target path represented by the fifth path matching feature value is obtained by obtaining the total number of file identifiers and digital connection identifiers in the second target path information, and then obtaining the median of the total number, and the middle value corresponding to the median in the second target path information is determined by the median, that is, the middle value of the second target path.
示例性地,第二目标路径信息为2-501,文件标识和数字连接标识的总数为3,该总数的中位数为2,则中位数3对应的中间值为-,也即第二目标路径的中间值为-,第五路径匹配特征值为-。Exemplarily, the second target path information is 2-501, the total number of file identifiers and digital connection identifiers is 3, the median of the total is 2, and the median value corresponding to the median 3 is -, that is, the median value of the second target path is -, and the fifth path matching feature value is -.
步骤a16,基于第二目标路径信息中的文件标识,确定第六路径匹配特征值表征的第二目标路径的文件标识总和。Step a16: determining the sum of the file identifiers of the second target path represented by the sixth path matching feature value based on the file identifiers in the second target path information.
其中,第六路径匹配特征值表征的第二目标路径的文件标识总和通过第二目标路径信息中的所有文件标识相加得到。The sum of the file identifiers of the second target path represented by the sixth path matching feature value is obtained by adding all the file identifiers in the second target path information.
示例性地,第二目标路径信息为2-501,所有文件标识的总和为2+501=503,则第六路径匹配特征值为503。Exemplarily, the second target path information is 2-501, the sum of all file identifiers is 2+501=503, and the sixth path matching feature value is 503.
本实施例提供的安全访问策略匹配方法,通过获取访问主体的三个路径匹配特征值和访问客体的三个路径匹配特征值,进而实现路径匹配特征值的优先匹配,排除安全访问策略库中大量的不匹配项,提升访问主体与访问客体的匹配度,减少访问主体和访问客体路径的精确匹配的次数,从而大幅度提升匹配效率。The security access policy matching method provided in this embodiment obtains the three path matching feature values of the access subject and the three path matching feature values of the access object, thereby realizing priority matching of the path matching feature values, eliminating a large number of mismatched items in the security access policy library, improving the matching degree between the access subject and the access object, and reducing the number of precise matches of the access subject and access object paths, thereby greatly improving the matching efficiency.
在一些可选的实施方式中,上述步骤a2包括:In some optional implementations, the above step a2 includes:
步骤a21,基于第一路径匹配特征值和第四路径匹配特征值,从安全访问策略库中筛选出访问主体的第一特征值不大于第一路径匹配特征值,且访问客体的第一特征值不大于第四路径匹配特征值的第一路径匹配信息集。Step a21, based on the first path matching feature value and the fourth path matching feature value, filter out from the security access policy library the first path matching information set whose first feature value of the access subject is not greater than the first path matching feature value and whose first feature value of the access object is not greater than the fourth path matching feature value.
其中,在获取到第一目标路径信息的三个路径匹配特征值和第二目标路径信息的三个路径匹配特征值之后,根据第一路径匹配特征值和第四路径匹配特征值,从安全访问策略库中筛选出访问主体的第一特征值不大于第一路径匹配特征值,且访问客体的第一特征值不大于第四路径匹配特征值的第一路径匹配信息集。Among them, after obtaining the three path matching feature values of the first target path information and the three path matching feature values of the second target path information, according to the first path matching feature value and the fourth path matching feature value, the first path matching information set in which the first feature value of the access subject is not greater than the first path matching feature value and the first feature value of the access object is not greater than the fourth path matching feature value is screened out from the security access policy library.
需要说明的是,因为主机安全访问策略中的访问主体、访问客体可以配置目录,配置目录时,此目录下的所有子文件均受此目录的安全访问策略限制,即触发安全访问策略的访问主体、访问客体只能与安全访问策略的访问主体、访问客体同级目录或者是其子目录时才会收到安全访问策略的影响,因此触发安全访问策略的访问主体、访问客体的路径的目录层级要大于或等于安全访问策略中的访问主体、访问客体的目录层级。It should be noted that, because the access subject and access object in the host security access policy can configure the directory, when the directory is configured, all sub-files under this directory are subject to the security access policy of this directory, that is, the access subject and access object that trigger the security access policy can only be affected by the security access policy when they are in the same directory as the access subject and access object of the security access policy or its subdirectory. Therefore, the directory level of the path of the access subject and access object that triggers the security access policy must be greater than or equal to the directory level of the access subject and access object in the security access policy.
进一步需要说明的是,安全访问策略库中包括特征值存储表和安全访问策略存储表,该特征值存储表存储有下发的每一个安全访问策略中的访问主体的特征值和访问客体的特征值。其中,每一个安全访问策略中的访问主体的特征值和访问客体的特征值对应于一个特征值标识即特征值ID。示例性地,特征值存储表可以如表5所示。It should be further explained that the security access policy library includes a feature value storage table and a security access policy storage table, and the feature value storage table stores the feature value of the access subject and the feature value of the access object in each security access policy issued. Among them, the feature value of the access subject and the feature value of the access object in each security access policy correspond to a feature value identifier, i.e., a feature value ID. Exemplarily, the feature value storage table can be shown in Table 5.
表5Table 5
下发的每一个安全访问策略中的访问主体转换为数字形式的访问主体即数字形式的主体路径信息,访问客体转换为数字形式的访问客体即数字形式的客体路径信息,将每一个安全访问策略中数字形式的访问主体、数字形式的访问客体以及访问主体对访问客体的权限信息存储在安全访问策略存储表中。其中,每一个安全访问策略中的数字形式的访问主体、数字形式的访问客体以及访问主体对访问客体的权限信息对应于一个安全访问策略ID。示例性地,安全访问策略存储表可以如表6所示。The access subject in each security access policy issued is converted into the digital access subject, i.e., the digital subject path information, and the access object is converted into the digital access object, i.e., the digital object path information. The digital access subject, the digital access object, and the access subject's authority information to the access object in each security access policy are stored in the security access policy storage table. Among them, the digital access subject, the digital access object, and the access subject's authority information to the access object in each security access policy correspond to a security access policy ID. Exemplarily, the security access policy storage table can be shown in Table 6.
表6Table 6
示例性地,当用户操作或者进程访问主机资源时,触发主机安全访问控制策略匹配。例如,/usr/local/bin/vim进程想要访问/root/test/bin目录下的数据时,触发安全访问策略匹配行为的访问主体、访问客体如表7所示。For example, when a user operates or a process accesses a host resource, a host security access control policy match is triggered. For example, when the /usr/local/bin/vim process wants to access data in the /root/test/bin directory, the access subject and access object that trigger the security access policy match behavior are shown in Table 7.
表7Table 7
将访问主体的路径信息,访问客体的路径信息转换为数字形式的路径信息。如表8所示。The path information of the access subject and the path information of the access object are converted into digital path information, as shown in Table 8.
表8Table 8
此时,访问主体的路径匹配特征值和访问客体的路径匹配特征值如表9所示。At this time, the path matching feature values of the access subject and the path matching feature values of the access object are shown in Table 9.
表9Table 9
此时,需要根据路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集。At this time, it is necessary to filter out the target path matching information set from the security access policy library according to the path matching feature value.
首先,从安全访问策略库中的特征值存储表中筛选出访问主体的第一特征值小于等于4、且访问客体的第一特征值小于等于3的数据,即第一路径匹配信息集。筛选出的数据如表10所示。First, data whose first characteristic value of the access subject is less than or equal to 4 and whose first characteristic value of the access object is less than or equal to 3 is screened out from the characteristic value storage table in the security access policy library, that is, the first path matching information set. The screened data is shown in Table 10.
表10Table 10
其中,主体特征值1对应访问主体的第一特征值,主体特征值2对应访问主体的第二特征值,主体的特征值3对应访问主体的第三特征值。客体特征值1对应访问客体的第一特征值,客体特征值2对应访问客体的第二特征值,客体的特征值3对应访问客体的第三特征值。Among them, the subject feature value 1 corresponds to the first feature value of the access subject, the subject feature value 2 corresponds to the second feature value of the access subject, and the subject feature value 3 corresponds to the third feature value of the access subject. The object feature value 1 corresponds to the first feature value of the access object, the object feature value 2 corresponds to the second feature value of the access object, and the object feature value 3 corresponds to the third feature value of the access object.
步骤a22,基于第二路径匹配特征值,从第一路径匹配信息集中筛选出访问主体的第二特征值与第二路径匹配特征值相同的第二路径匹配信息集。Step a22: based on the second path matching feature value, filter out from the first path matching information set a second path matching information set whose second feature value of the access subject is the same as the second path matching feature value.
其中,在筛选出第一路径匹配信息集后,根据第二路径匹配特征值,从第一路径匹配信息集中筛选出访问主体的第二特征值与第二路径匹配特征值相同的第二路径匹配信息集。After the first path matching information set is screened out, a second path matching information set having the same second characteristic value of the access subject as the second path matching characteristic value is screened out from the first path matching information set according to the second path matching characteristic value.
示例性地,筛选出的第一路径匹配信息集如表10所示,第二路径匹配特征值为-,而第一路径匹配信息集中访问主体的第二特征值为45,不匹配,确定第二路径匹配信息集为空。Exemplarily, the filtered first path matching information set is shown in Table 10, the second path matching feature value is -, and the second feature value of the access subject in the first path matching information set is 45, which does not match, and it is determined that the second path matching information set is empty.
步骤a23,在第二路径匹配信息集为空的情况下,对第一目标路径信息进行层级更新操作,获得更新后的第二路径匹配特征值和更新后的第三路径匹配特征值,基于更新后的第二路径匹配特征值,从第一路径匹配信息集中筛选出访问主体的第二特征值与更新后的第二路径匹配特征值相同的第二路径匹配信息集。Step a23, when the second path matching information set is empty, perform a hierarchical update operation on the first target path information to obtain an updated second path matching feature value and an updated third path matching feature value, and based on the updated second path matching feature value, filter out a second path matching information set from the first path matching information set whose second feature value of the access subject is the same as the updated second path matching feature value.
其中,第二路径匹配信息集为空,说明第二路径匹配信息集匹配失败,对第一目标路径信息进行层级更新操作后继续进行匹配。The second path matching information set is empty, indicating that the second path matching information set fails to match, and the matching continues after performing a hierarchical update operation on the first target path information.
需要说明的是,层级更新操作为层级减1操作。示例性地,第一目标路径信息为1-45-46-47,层级减1操作后第一目标路径信息变为1-45-46,更新后的第二路径匹配特征值为45,更新后的第三路径匹配特征值为92。而筛选出的第一路径匹配信息集中的访问主体的第二特征值为45,则确定匹配,第二路径匹配信息集如表10所示。It should be noted that the level update operation is a level minus 1 operation. For example, the first target path information is 1-45-46-47, and after the level minus 1 operation, the first target path information becomes 1-45-46, the updated second path matching feature value is 45, and the updated third path matching feature value is 92. If the second feature value of the access subject in the filtered first path matching information set is 45, then a match is determined, and the second path matching information set is shown in Table 10.
步骤a24,在第二路径匹配信息集为空且第一目标路径信息层次更新至根目录的情况下,确定目标路径匹配信息集匹配失败。Step a24, when the second path matching information set is empty and the first target path information level is updated to the root directory, it is determined that the target path matching information set fails to match.
需要说明的是,第二路径匹配信息集为空,说明第二路径匹配信息集匹配失败,第一目标路径信息层次更新至根目录,说明无法继续进行层次更新。无法继续进行层级更新,且仍旧未筛选出第二路径匹配信息集,确定目标路径匹配信息集匹配失败。It should be noted that the second path matching information set is empty, indicating that the second path matching information set fails to match, and the first target path information level is updated to the root directory, indicating that the level update cannot continue. If the level update cannot continue, and the second path matching information set is still not screened out, it is determined that the target path matching information set fails to match.
步骤a25,在第二路径匹配信息集不为空且第一目标路径信息未进行层次更新的情况下,基于第三路径匹配特征值,从第二路径匹配信息集中筛选出访问主体的第三特征值与第三路径匹配特征值相同的第三路径匹配信息集。Step a25, when the second path matching information set is not empty and the first target path information has not been hierarchically updated, based on the third path matching feature value, filter out the third path matching information set whose third feature value of the access subject is the same as the third path matching feature value from the second path matching information set.
其中,第二路径匹配信息集不为空且第一目标路径信息未进行层次更新,说明第一次筛选出的第二路径匹配信息集不为空,则可以根据第三路径匹配特征值继续进行目标路径匹配信息集的筛选。Among them, the second path matching information set is not empty and the first target path information has not been hierarchically updated, which means that the second path matching information set screened for the first time is not empty, and the target path matching information set can be further screened according to the third path matching feature value.
步骤a26,在第二路径匹配信息集不为空且第一目标路径信息进行层次更新的情况下,基于更新后的第三路径匹配特征值,从第二路径匹配信息集中筛选出访问主体的第三特征值与更新后的第三路径匹配特征值相同的第三路径匹配信息集。Step a26, when the second path matching information set is not empty and the first target path information is hierarchically updated, based on the updated third path matching feature value, a third path matching information set whose third feature value of the access subject is the same as the updated third path matching feature value is filtered out from the second path matching information set.
其中,第二路径匹配信息集不为空且第一目标路径信息进行层次更新,说明第三路径匹配特征值也进行更新,则根据更新后的第三路径匹配特征值,从第二路径匹配信息集中筛选出访问主体的第三特征值与更新后的第三路径匹配特征值相同的第三路径匹配信息集。Among them, the second path matching information set is not empty and the first target path information is hierarchically updated, indicating that the third path matching feature value is also updated. Then, based on the updated third path matching feature value, the third path matching information set whose third feature value of the access subject is the same as the updated third path matching feature value is filtered out from the second path matching information set.
示例性地,层级减1操作后第一目标路径信息变为1-45-46,更新后的第二路径匹配特征值为45,更新后的第三路径匹配特征值为92,第二路径匹配信息集如表10所示。第二路径匹配信息集中的访问主体的第三特征值为92,与更新后的第三路径匹配特征值相同,则确定第三路径匹配信息集如表10所示。Exemplarily, after the level reduction operation, the first target path information becomes 1-45-46, the updated second path matching feature value is 45, the updated third path matching feature value is 92, and the second path matching information set is shown in Table 10. The third feature value of the access subject in the second path matching information set is 92, which is the same as the updated third path matching feature value, and the third path matching information set is determined as shown in Table 10.
可以理解的是,第三路径匹配信息集为空则确定目标路径匹配信息集匹配失败。It can be understood that if the third path matching information set is empty, it is determined that the target path matching information set fails to match.
至此,访问主体的路径匹配特征值与安全访问策略中的访问主体的特征值匹配成功,筛选掉大量不符合匹配的安全访问策略,减少后续匹配次数。可以理解的是,若第一目标路径信息层次更新至根目录仍未匹配成功,则确定匹配失败。At this point, the path matching feature value of the access subject successfully matches the feature value of the access subject in the security access policy, and a large number of unmatched security access policies are screened out to reduce the number of subsequent matches. It is understandable that if the first target path information level is updated to the root directory and still fails to match successfully, it is determined that the match fails.
步骤a27,基于第五路径匹配特征值,从第三路径匹配信息集中筛选出访问客体的第二特征值与第五路径匹配特征值相同的第四路径匹配信息集。Step a27: based on the fifth path matching feature value, a fourth path matching information set whose second feature value of the access object is the same as the fifth path matching feature value is selected from the third path matching information set.
其中,在筛选出第三路径匹配信息集后,根据第五路径匹配特征值,从第三路径匹配信息集中筛选出访问客体的第二特征值与第五路径匹配特征值相同的第四路径匹配信息集。After the third path matching information set is screened out, a fourth path matching information set having the same second characteristic value of the access object as the fifth path matching characteristic value is screened out from the third path matching information set according to the fifth path matching characteristic value.
示例性地,筛选出的第三路径匹配信息集如表10所示,第五路径匹配特征值为501,而第三路径匹配信息集中访问客体的第二特征值为-,不匹配,确定第四路径匹配信息集为空。Exemplarily, the screened third path matching information set is shown in Table 10, the fifth path matching feature value is 501, and the second feature value of the access object in the third path matching information set is -, which means no match, and the fourth path matching information set is determined to be empty.
步骤a28,在第四路径匹配信息集为空的情况下,对第二目标路径信息进行层级更新操作,获得更新后的第五路径匹配特征值和更新后的第六路径匹配特征值,基于更新后的第五路径匹配特征值,从第三路径匹配信息集中筛选出访问客体的第二特征值与更新后的第五路径匹配特征值相同的第四路径匹配信息集。Step a28, when the fourth path matching information set is empty, perform a hierarchical update operation on the second target path information to obtain an updated fifth path matching feature value and an updated sixth path matching feature value, and based on the updated fifth path matching feature value, select a fourth path matching information set from the third path matching information set whose second feature value of the access object is the same as the updated fifth path matching feature value.
其中,第四路径匹配信息集为空,说明第四路径匹配信息集匹配失败,对第二目标路径信息进行层级更新操作后继续进行匹配。The fourth path matching information set is empty, indicating that the fourth path matching information set fails to match, and the matching continues after performing a hierarchical update operation on the second target path information.
需要说明的是,层级更新操作为层级减1操作。示例性地,第二目标路径信息为2-501-46,层级减1操作后第二目标路径信息变为2-501,更新后的第五路径匹配特征值为-,更新后的第三路径匹配特征值为503。而筛选出的第三路径匹配信息集中的访问客体的第二特征值为-,则确定匹配,第四路径匹配信息集如表10所示。It should be noted that the level update operation is a level minus 1 operation. Exemplarily, the second target path information is 2-501-46, and after the level minus 1 operation, the second target path information becomes 2-501, the updated fifth path matching feature value is -, and the updated third path matching feature value is 503. If the second feature value of the access object in the screened third path matching information set is -, then a match is determined, and the fourth path matching information set is shown in Table 10.
步骤a29,在第四路径匹配信息集为空且第二目标路径信息层次更新至根目录的情况下,确定目标路径匹配信息集匹配失败。Step a29: when the fourth path matching information set is empty and the second target path information level is updated to the root directory, it is determined that the target path matching information set fails to match.
需要说明的是,第四路径匹配信息集为空,说明第四路径匹配信息集匹配失败,第二目标路径信息层次更新至根目录,说明无法继续进行层次更新。无法继续进行层级更新,且仍旧未筛选出第四路径匹配信息集,确定目标路径匹配信息集匹配失败。It should be noted that the fourth path matching information set is empty, indicating that the fourth path matching information set fails to match, and the second target path information level is updated to the root directory, indicating that the level update cannot continue. If the level update cannot continue, and the fourth path matching information set is still not screened out, it is determined that the target path matching information set fails to match.
步骤a210,在第四路径匹配信息集不为空且第二目标路径信息未进行层次更新的情况下,基于第六路径匹配特征值,从第四路径匹配信息集中筛选出访问客体的第三特征值与第六路径匹配特征值相同的目标路径匹配信息集。Step a210, when the fourth path matching information set is not empty and the second target path information has not been hierarchically updated, based on the sixth path matching feature value, a target path matching information set having the same third feature value of the access object as the sixth path matching feature value is selected from the fourth path matching information set.
其中,第四路径匹配信息集不为空且第二目标路径信息未进行层次更新,说明第一次筛选出的第四路径匹配信息集不为空,则可以根据第六路径匹配特征值继续进行目标路径匹配信息集的筛选。Among them, the fourth path matching information set is not empty and the second target path information is not hierarchically updated, which means that the fourth path matching information set screened for the first time is not empty, and the target path matching information set can be further screened according to the sixth path matching feature value.
步骤a211,在第四路径匹配信息集不为空且第二目标路径信息进行层次更新的情况下,基于更新后的第六路径匹配特征值,从第四路径匹配信息集中筛选出访问客体的第三特征值与更新后的第六路径匹配特征值相同的目标路径匹配信息集。Step a211, when the fourth path matching information set is not empty and the second target path information is hierarchically updated, based on the updated sixth path matching feature value, a target path matching information set whose third feature value of the access object is the same as the updated sixth path matching feature value is filtered out from the fourth path matching information set.
其中,第四路径匹配信息集不为空且第二目标路径信息进行层次更新,说明第六路径匹配特征值也进行更新,则根据更新后的第六路径匹配特征值,从第四路径匹配信息集中筛选出访问客体的第三特征值与更新后的第六路径匹配特征值相同的目标路径匹配信息集。Among them, the fourth path matching information set is not empty and the second target path information is hierarchically updated, indicating that the sixth path matching feature value is also updated. Then, based on the updated sixth path matching feature value, a target path matching information set whose third feature value of the access object is the same as the updated sixth path matching feature value is filtered out from the fourth path matching information set.
示例性地,层级减1操作后第二目标路径信息变为2-501,更新后的第五路径匹配特征值为-,更新后的第六路径匹配特征值为503,第四路径匹配信息集如表10所示。第四路径匹配信息集中的访问客体的第三特征值为503,与更新后的第六路径匹配特征值相同,则确定目标路径匹配信息集如表10所示。Exemplarily, after the level reduction operation, the second target path information becomes 2-501, the updated fifth path matching feature value is -, the updated sixth path matching feature value is 503, and the fourth path matching information set is shown in Table 10. The third feature value of the access object in the fourth path matching information set is 503, which is the same as the updated sixth path matching feature value, and the target path matching information set is determined as shown in Table 10.
可以理解的是,目标路径匹配信息集为空则确定目标路径匹配信息集匹配失败。It can be understood that if the target path matching information set is empty, it is determined that the target path matching information set fails to match.
至此,筛选出的目标路径匹配信息集对应的目标安全访问策略集中的安全访问策略中的访问主体、访问客体与本次触发安全访问策略的访问主体和访问客体的匹配度大大提高。At this point, the matching degree between the access subject and the access object in the security access policy in the target security access policy set corresponding to the filtered target path matching information set and the access subject and the access object that triggers the security access policy this time is greatly improved.
本实施例提供的安全访问策略匹配方法,通过将访问主体的三个路径匹配特征值与安全访问策略库中的访问主体的三个特征值进行匹配,将访问客体的三个路径匹配特征值与安全访问策略库中的访问客体的三个特征值进行匹配,进而获得目标路径匹配信息集。实现了路径匹配特征值的优先匹配,排除安全访问策略库中大量的不匹配项,提升访问主体与访问客体的匹配度,减少访问主体和访问客体路径的精确匹配的次数,从而大幅度提升匹配效率。The security access policy matching method provided in this embodiment matches the three path matching feature values of the access subject with the three feature values of the access subject in the security access policy library, and matches the three path matching feature values of the access object with the three feature values of the access object in the security access policy library, thereby obtaining a target path matching information set. The priority matching of the path matching feature values is achieved, a large number of mismatched items in the security access policy library are eliminated, the matching degree of the access subject and the access object is improved, and the number of accurate matchings of the access subject and the access object path is reduced, thereby greatly improving the matching efficiency.
在一些可选的实施方式中,上述步骤a4包括:In some optional implementations, the above step a4 includes:
步骤a41,获取触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息。Step a41, obtaining the first target path information and the second target path information that trigger the successful matching of the target path matching information set.
其中,目标路径匹配信息集匹配成功说明目标路径匹配信息集不为空,触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息可以是原始第一目标路径信息和原始第二目标路径信息,也可以是层次更新后的第一目标路径信息和层次更新后的第二目标路径信息。Among them, the successful matching of the target path matching information set indicates that the target path matching information set is not empty, and the first target path information and the second target path information that trigger the successful matching of the target path matching information set can be the original first target path information and the original second target path information, or the hierarchically updated first target path information and the hierarchically updated second target path information.
示例性地,原始第一目标路径信息和原始第二目标路径信息如表9所示。在进行目标路径匹配信息集匹配的过程中,若根据原始第一目标路径信息和原始第二目标路径信息就匹配出目标路径匹配集,则触发目标路径匹配信息集匹配成功的为原始第一目标路径信息和原始第二目标路径信息。在进行目标路径匹配信息集匹配的过程中,若根据层次更新后的第一目标路径信息和层次更新后的第二目标路径信息才匹配出目标路径匹配集,则触发目标路径匹配信息集匹配成功的为层次更新后的第一目标路径信息和层次更新后的第二目标路径信息。Exemplarily, the original first target path information and the original second target path information are shown in Table 9. In the process of matching the target path matching information set, if the target path matching set is matched according to the original first target path information and the original second target path information, the original first target path information and the original second target path information trigger the successful matching of the target path matching information set. In the process of matching the target path matching information set, if the target path matching set is matched according to the hierarchically updated first target path information and the hierarchically updated second target path information, the hierarchically updated first target path information and the hierarchically updated second target path information trigger the successful matching of the target path matching information set.
如前述示例,触发目标路径信息匹配成功的是层次更新后的第一目标路径信息1-45-46和层次更新后的第二目标路径信息2-501。As in the above example, what triggers the successful matching of the target path information is the first target path information 1-45-46 after the hierarchical update and the second target path information 2-501 after the hierarchical update.
步骤a42,基于触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。Step a42, matching a target security access policy from a target security access policy set based on the first target path information and the second target path information that successfully trigger the target path matching information set to match.
其中,在获取到触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息之后,根据触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。Among them, after obtaining the first target path information and the second target path information that successfully match the trigger target path matching information set, the target security access policy is matched from the target security access policy set according to the first target path information and the second target path information that successfully match the trigger target path matching information set.
从目标安全访问策略集中,将触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息与目标安全访问策略集中的每个安全访问策略进行一一匹配,获得目标安全访问策略,进而可进行权限的控制,匹配失败的,不做处置。From the target security access policy set, the first target path information and the second target path information that trigger the successful match of the target path matching information set are matched one by one with each security access policy in the target security access policy set to obtain the target security access policy, and then the permission can be controlled. If the match fails, no action will be taken.
示例性地,将层次更新后的第一目标路径信息1-45-46和层次更新后的第二目标路径信息2-501与目标安全访问策略集中的每个安全访问策略进行一一匹配,若层次更新后的第一目标路径信息1-45-46和层次更新后的第二目标路径信息2-501与目标安全访问策略集中的任一安全访问策略一一匹配成功,则确定该安全访问策略为目标安全访问策略。Exemplarily, the hierarchically updated first target path information 1-45-46 and the hierarchically updated second target path information 2-501 are matched one-to-one with each security access policy in the target security access policy set. If the hierarchically updated first target path information 1-45-46 and the hierarchically updated second target path information 2-501 are successfully matched one-to-one with any security access policy in the target security access policy set, the security access policy is determined to be the target security access policy.
本实施例提供的安全访问策略匹配方法,通过基于触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息,可以更准确地确定目标安全访问策略,确保了系统的安全性。The security access policy matching method provided in this embodiment can more accurately determine the target security access policy by triggering the first target path information and the second target path information that successfully match the target path matching information set, thereby ensuring the security of the system.
在一些可选的实施方式中,上述步骤a3包括:In some optional implementations, the above step a3 includes:
步骤a31,获取目标路径匹配信息集中的关联标识。Step a31, obtaining the association identifier in the target path matching information set.
其中,特征值存储表中存在关联标识(关联ID),该关联标识为该特征值在安全访问策略存储表中对应的安全访问策略ID,则可以根据特征值存储表中的关联标识确定安全访问策略存储表中对应的安全访问策略。Among them, there is an association identifier (association ID) in the feature value storage table, which is the security access policy ID corresponding to the feature value in the security access policy storage table. The corresponding security access policy in the security access policy storage table can be determined according to the association identifier in the feature value storage table.
可以理解的是,筛选出的目标路径匹配信息集是特征值存储表中的,因此可以获取到目标路径匹配信息集中的关联标识。It can be understood that the screened target path matching information set is in the feature value storage table, so the associated identifier in the target path matching information set can be obtained.
步骤a32,基于关联标识,从安全访问策略库中获取目标安全访问策略集。Step a32: based on the association identifier, obtain the target security access policy set from the security access policy library.
根据该关联标识,可以从安全访问策略存储表中获取到对应的目标安全访问策略集。According to the association identifier, the corresponding target security access policy set can be obtained from the security access policy storage table.
本实施例提供的安全访问策略匹配方法,通过基于目标路径匹配信息集中的关联标识,从安全访问策略库中获取目标安全访问策略集,保证了获取到的目标安全访问策略集的准确性。The security access policy matching method provided in this embodiment obtains the target security access policy set from the security access policy library by matching the association identifier in the target path information set, thereby ensuring the accuracy of the obtained target security access policy set.
在一些可选的实施方式中,安全访问策略匹配方法还包括:In some optional implementations, the security access policy matching method further includes:
在发生目标路径匹配信息集匹配失败或目标安全访问策略匹配失败的情况下,对目标路径匹配信息集匹配失败或目标安全访问策略匹配失败的信息进行日志记录,以便用户查看日志记录,采取相应的措施。In the event of a target path matching information set matching failure or a target security access policy matching failure, the information of the target path matching information set matching failure or the target security access policy matching failure is logged so that the user can view the log record and take corresponding measures.
具体地,选择适合安全访问策略匹配的日志框架,如Log4j、Logback等。设置适当的日志级别,以便在需要时记录详细的失败信息。Specifically, select a logging framework that matches the security access strategy, such as Log4j, Logback, etc. Set an appropriate log level to record detailed failure information when necessary.
通过添加日志记录语句,实现对目标路径匹配信息集匹配失败或目标安全访问策略匹配失败的信息的日志记录。By adding logging statements, you can log the information about the failure to match the target path information set or the failure to match the target security access policy.
可以理解的是,还可以根据需要定制日志的输出格式,以便更好地理解和分析匹配失败的信息。It is understandable that the output format of the log may be customized as needed to better understand and analyze the information of the matching failure.
用户可以定期查看日志记录,通过查看匹配失败信息,确定是否需要下发新的安全访问策略以确保网络安全,修复访问漏洞等。Users can check log records regularly and determine whether new security access policies need to be issued to ensure network security and repair access vulnerabilities by checking matching failure information.
本实施例提供的安全访问策略匹配方法,能够通过日志记录对目标路径匹配信息集匹配失败或目标安全访问策略匹配失败的信息进行查看,进而采取相应的措施进行处理,提高系统的稳定性和可靠性。The security access policy matching method provided in this embodiment can view the information of target path matching information set matching failure or target security access policy matching failure through log records, and then take corresponding measures to handle it, thereby improving the stability and reliability of the system.
在本实施例中还提供了一种安全访问策略匹配系统,如图3所示,系统包括内置路径模块,安全策略存储模块和安全策略匹配模块。In this embodiment, a security access policy matching system is also provided. As shown in FIG. 3 , the system includes a built-in path module, a security policy storage module and a security policy matching module.
其中,内置路径模块用于将主机资源路径转化为数字表示,由内置路径表、内置路径转化模块和内置路径表维护模块组成。以Linux操作系统主机为例,内置路径表即预设文件名称与文件标识的对应关系表,如表2所示。Among them, the built-in path module is used to convert the host resource path into a digital representation, and is composed of a built-in path table, a built-in path conversion module, and a built-in path table maintenance module. Taking the Linux operating system host as an example, the built-in path table is a correspondence table between preset file names and file identifiers, as shown in Table 2.
图4是根据本发明实施例存储安全访问策略的流程图。如图4所示,当下发的安全访问策略需要存储时,例如主体为:/usr/local/bin,利用内置路径表,经过内置路径转化模块转换安全策略中的主客体。需要说明的是,安全策略为安全访问策略。转化后的主体为:1-45-46。转化规则为:文件名转化为文件名对应的表格中ID的值,/转化为-。判断内置路径表中是否存在待转化文件名,若存在,则计算安全策略转化后的主、客体匹配特征值;若不存在,则维护内置路径表,其中,匹配特征值为访问主体的特征值和访问客体的特征值。如果主体为:/root/test目录时,由于test在内置路径表中不存在,因此需要更新内置路径表,经过内置路径表维护模块更新后的内置路径表可以如表4所示,更新内置路径表后,此时主体转化后的路径表示为:2-501。FIG4 is a flow chart of storing a security access policy according to an embodiment of the present invention. As shown in FIG4 , when the issued security access policy needs to be stored, for example, the subject is: /usr/local/bin, the built-in path table is used to convert the subject and object in the security policy through the built-in path conversion module. It should be noted that the security policy is a security access policy. The converted subject is: 1-45-46. The conversion rule is: the file name is converted to the value of the ID in the table corresponding to the file name, and / is converted to -. It is determined whether there is a file name to be converted in the built-in path table. If it exists, the subject and object matching feature values after the security policy conversion are calculated; if it does not exist, the built-in path table is maintained, wherein the matching feature values are the feature values of the access subject and the feature values of the access object. If the subject is: /root/test directory, since test does not exist in the built-in path table, it is necessary to update the built-in path table. The built-in path table updated by the built-in path table maintenance module can be as shown in Table 4. After the built-in path table is updated, the path after the subject conversion is represented as: 2-501.
安全策略存储模块用于存储内置路径模块转化后的安全访问策略。由安全策略转化后存储模块、匹配特征值存储模块和匹配特征值计算模块组成。当下发的安全访问控制策略如表11所示。The security policy storage module is used to store the security access policy converted by the built-in path module. It consists of a security policy conversion storage module, a matching feature value storage module, and a matching feature value calculation module. The security access control policy issued is shown in Table 11.
表11Table 11
先经过内置路径模块中的内置路径转化模块转化,转化后的安全访问策略如表3所示。It is first transformed by the built-in path transformation module in the built-in path module, and the converted security access policy is shown in Table 3.
如图4所示,利用匹配特征值计算模块计算安全策略转化后的主、客体匹配特征值,匹配特征值的计算方式如前述a11-a16描述,在此不再赘述。As shown in FIG4 , the matching feature value calculation module is used to calculate the subject and object matching feature values after the security policy conversion. The matching feature value calculation method is as described in a11-a16 above and will not be repeated here.
计算完匹配特征值后,就可以利用匹配特征值存储模块存储上述的安全访问策略,具体地,在特征值存储表中存储安全访问策略对应的路径匹配特征值即存储安全策略主、客体匹配特征值,如表5所示。在安全访问策略存储表中存储安全访问策略即存储安全策略转化后主、客体路径,如表6所示。After calculating the matching feature value, the matching feature value storage module can be used to store the above-mentioned security access policy. Specifically, the path matching feature value corresponding to the security access policy is stored in the feature value storage table, that is, the main and object matching feature values of the security policy are stored, as shown in Table 5. Storing the security access policy in the security access policy storage table is to store the main and object paths after the security policy conversion, as shown in Table 6.
图5是根据本发明实施例的安全访问策略匹配方法的流程图。安全策略匹配模块用于执行如图5所示的安全访问策略匹配方法,优先匹配路径匹配特征值,提升匹配度后再精确匹配安全访问策略。具体地,如图5所示,该方法包括:FIG5 is a flow chart of a security access policy matching method according to an embodiment of the present invention. The security policy matching module is used to execute the security access policy matching method shown in FIG5, preferentially matching the path matching feature value, improving the matching degree and then accurately matching the security access policy. Specifically, as shown in FIG5, the method includes:
第一步:用户操作或者进程访问主机本地资源时,触发安全策略匹配,将触发行为的主、客体依据内置路径转化模块转化。对应前述步骤S102描述,在此不再赘述。Step 1: When a user operation or process accesses a local resource on the host, a security policy match is triggered, and the subject and object of the triggering behavior are converted according to the built-in path conversion module. This corresponds to the description of the aforementioned step S102 and will not be repeated here.
第二步:计算触发行为的主、客体匹配特征值。对应前述步骤a11-步骤a16相关描述,在此不再赘述。Step 2: Calculate the subject and object matching feature values that trigger the behavior. Corresponding to the above-mentioned steps a11 to a16, the relevant descriptions are omitted here.
第三步:筛选配置策略中主、客体特征值1小于等于主、客体的匹配特征值1的项。对应前述步骤a21的描述,在此不再赘述。Step 3: Filter the items in the configuration strategy whose subject and object feature values 1 are less than or equal to the subject and object matching feature values 1. The description of the above step a21 will not be repeated here.
第四步:在第三步筛选成功的情况下,筛选配置策略中主体匹配特征值2、特征值3分别与触发行为的主体匹配特征值2、特征值3相等的项。在第三步筛选失败的情况下,确定第一路径匹配信息集匹配失败。Step 4: If the screening in step 3 is successful, items whose subject matching feature value 2 and feature value 3 in the configuration policy are respectively equal to the subject matching feature value 2 and feature value 3 of the triggering behavior. If the screening in step 3 fails, it is determined that the first path matching information set fails to match.
第五步:在第四步筛选成功的情况下,筛选配置策略中客体匹配特征值2、特征值3分别与触发行为的客体匹配特征值2、特征值3相等的项。Step 5: When the screening in step 4 is successful, items whose object matching feature value 2 and feature value 3 in the screening configuration strategy are respectively equal to the object matching feature value 2 and feature value 3 of the triggering behavior.
在第四步筛选失败的情况下,触发行为的主体路径层级减1,并返回执行第二步。If the fourth step screening fails, the main path level of the triggering behavior is reduced by 1, and the second step is executed again.
需要说明的是,第四步、第五步对应于前述步骤a22-步骤a27的相关描述,在此不再赘述。It should be noted that the fourth step and the fifth step correspond to the relevant descriptions of the aforementioned steps a22 to a27, which will not be repeated here.
第六步:在第五步筛选成功的情况下,触发行为主、客体转化后路径与配置安全策略转化后路径精确匹配。Step 6: If the screening in step 5 is successful, the paths after the subject and object of the triggering behavior are converted are precisely matched with the paths after the configuration security policy is converted.
在第五步筛选失败的情况下,触发行为的客体路径层级减1,并返回执行第二步。In the event that the fifth step screening fails, the object path level of the triggering behavior is reduced by 1, and the process returns to the second step.
需要说明的是,第六步对应于前述步骤a28-a211以及步骤a41、a42的相关描述,在此不再赘述。It should be noted that the sixth step corresponds to the related descriptions of the aforementioned steps a28-a211 and steps a41 and a42, which will not be repeated here.
第七步:在第六步匹配成功的情况下,依据配置安全策略中权限值进行资源的访问控制限制。Step 7: If the match in step 6 is successful, access control restrictions on resources are performed based on the permission values in the configured security policy.
在第六步匹配失败的情况下,确定目标安全访问策略匹配失败。In case the match fails in step 6, it is determined that the target security access policy fails to match.
对应前述步骤S104的描述,在此不再赘述。The description of the aforementioned step S104 is not repeated here.
需要说明的是,涉及路径资源匹配的场景都可以通过本实施例提供的安全访问策略匹配方法实现。It should be noted that all scenarios involving path resource matching can be implemented by the security access policy matching method provided in this embodiment.
本实施例提供的安全访问策略匹配方法,通过内置的一个主机上常见文件的名称与数字的对应表,当存储安全访问策略时,主体与客体不再存储实际的资源路径(/usr/lttc/tcz),而是存储转化后的主体与客体(1-23-45)。当资源路径很长时,只需要很短的数字即可替代,节省存储空间的同时,提升匹配效率。The security access policy matching method provided in this embodiment uses a built-in table of correspondence between the names and numbers of common files on a host. When storing security access policies, the subject and object no longer store the actual resource path (/usr/lttc/tcz), but store the converted subject and object (1-23-45). When the resource path is very long, only a short number is needed to replace it, which saves storage space and improves matching efficiency.
存储时会另外存储三个匹配特征值,主体与客体一一匹配前,优先匹配这三个匹配特征值,排除大量的不匹配项,进一步提升主体与客体的匹配度,减少主体与客体路径精确匹配的次数,从而大幅度提升匹配效率。将匹配特征值均匹配的主体与客体,再与资源路径转化后存储的用户配置的主机安全访问控制策略一一进行精确匹配,均匹配成功后即可进行权限的控制。Three matching feature values will be stored separately during storage. Before matching the subject and the object one by one, these three matching feature values will be matched first to exclude a large number of mismatches, further improve the matching degree between the subject and the object, and reduce the number of precise matching of the subject and object paths, thereby greatly improving the matching efficiency. The subject and object whose matching feature values are matched will be precisely matched one by one with the host security access control policy configured by the user and stored after the resource path conversion. After all matches are successful, permission control can be performed.
在本实施例中还提供了一种安全访问策略匹配装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In this embodiment, a security access policy matching device is also provided, which is used to implement the above embodiments and preferred implementation modes, and the descriptions that have been made will not be repeated. As used below, the term "module" can be a combination of software and/or hardware that implements a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, the implementation of hardware, or a combination of software and hardware, is also possible and conceivable.
本实施例提供一种安全访问策略匹配装置,如图6所示,包括:This embodiment provides a security access policy matching device, as shown in FIG6 , including:
获取模块601,用于获取主机的访问信息,其中,访问信息包括第一路径信息和第二路径信息,第一路径信息为访问主体的路径信息,第二路径信息为访问客体的路径信息。The acquisition module 601 is used to acquire the access information of the host, wherein the access information includes first path information and second path information, the first path information is the path information of the access subject, and the second path information is the path information of the access object.
转换模块602,用于基于预设文件名称与文件标识的对应关系表,将第一路径信息转换为数字形式的第一目标路径信息,并将第二路径信息转换为数字形式的第二目标路径信息。The conversion module 602 is used to convert the first path information into first target path information in digital form and convert the second path information into second target path information in digital form based on a preset correspondence table between file names and file identifiers.
匹配模块603,用于基于第一目标路径信息和第二目标路径信息,从安全访问策略库中匹配目标安全访问策略。The matching module 603 is used to match a target security access policy from a security access policy library based on the first target path information and the second target path information.
确定模块604,用于基于目标安全访问策略,确定访问主体对访问客体的访问权限。The determination module 604 is used to determine the access rights of the access subject to the access object based on the target security access policy.
在一些可选的实施方式中,转换模块602包括:In some optional implementations, the conversion module 602 includes:
拆分单元,用于基于文件分割标识,将第一路径信息和第二路径信息拆分为多个文件名。The splitting unit is used to split the first path information and the second path information into multiple file names based on the file segmentation identifier.
第一判断单元,用于判断预设文件名称与文件标识的对应关系表中是否包含多个文件名。The first judgment unit is used to judge whether the correspondence table of preset file names and file identifiers contains multiple file names.
第一获取单元,用于在预设文件名称与文件标识的对应关系表中包含多个文件名的情况下,基于预设文件名称与文件标识的对应关系表,获取多个文件名对应的文件标识。The first acquisition unit is used to acquire the file identifiers corresponding to the multiple file names based on the preset file name and file identifier correspondence table when the preset file name and file identifier correspondence table contains multiple file names.
第二获取单元,用于在预设文件名称与文件标识的对应关系表中未包含多个文件名中的至少一个文件名的情况下,基于未包含的至少一个文件名,更新预设文件名称与文件标识的对应关系表,以基于更新后的预设文件名称与文件标识的对应关系表,获取多个文件名对应的文件标识。The second acquisition unit is used to update the correspondence table of preset file names and file identifiers based on the at least one file name that is not included when at least one of the multiple file names is not included in the correspondence table of preset file names and file identifiers, so as to obtain file identifiers corresponding to the multiple file names based on the updated correspondence table of preset file names and file identifiers.
第三获取单元,用于将第一路径信息中的多个文件名之间的文件分割标识转换为数字连接标识,并将第一路径信息中的多个文件名替换为文件名对应的文件标识,获得第一目标路径信息。The third acquisition unit is used to convert the file segmentation identifiers between the multiple file names in the first path information into digital connection identifiers, and replace the multiple file names in the first path information with the file identifiers corresponding to the file names to obtain the first target path information.
第四获取单元,用于将第二路径信息中的多个文件名之间的文件分割标识转换为数字连接标识,并将第二路径信息中的多个文件名替换为文件名对应的文件标识,获得第二目标路径信息。The fourth acquisition unit is used to convert the file segmentation identifiers between the multiple file names in the second path information into digital connection identifiers, and replace the multiple file names in the second path information with the file identifiers corresponding to the file names to obtain the second target path information.
在一些可选的实施方式中,匹配模块603包括:In some optional implementations, the matching module 603 includes:
第五获取单元,用于获取第一目标路径信息和第二目标路径信息的路径匹配特征值。The fifth acquisition unit is used to acquire the path matching feature value of the first target path information and the second target path information.
筛选单元,用于基于路径匹配特征值,从安全访问策略库中筛选出目标路径匹配信息集。The screening unit is used to screen out a target path matching information set from the security access policy library based on the path matching feature value.
第六获取单元,用于基于目标路径匹配信息集,从安全访问策略库中获取目标安全访问策略集。The sixth acquisition unit is used to acquire a target security access policy set from the security access policy library based on the target path matching information set.
第一匹配单元,用于基于第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。The first matching unit is used to match a target security access policy from a target security access policy set based on the first target path information and the second target path information.
在一些可选的实施方式中,第五获取单元包括:In some optional implementations, the fifth acquiring unit includes:
第一确定单元,用于基于第一目标路径信息中数字连接标识的个数,确定第一路径匹配特征值表征的第一目标路径的层级。The first determining unit is configured to determine, based on the number of digital connection identifiers in the first target path information, a level of the first target path represented by the first path matching feature value.
第二确定单元,用于基于第一目标路径信息中的文件标识和数字连接标识的总数,确定第二路径匹配特征值表征的第一目标路径的中间值。The second determining unit is used to determine the middle value of the first target path represented by the second path matching feature value based on the total number of the file identifier and the digital connection identifier in the first target path information.
第三确定单元,用于基于第一目标路径信息中的文件标识,确定第三路径匹配特征值表征的第一目标路径的文件标识总和。The third determining unit is used to determine the sum of file identifiers of the first target path represented by the third path matching feature value based on the file identifiers in the first target path information.
第四确定单元,用于基于第二目标路径信息中数字连接标识的个数,确定第四路径匹配特征值表征的第二目标路径的层级。The fourth determining unit is used to determine the level of the second target path represented by the fourth path matching feature value based on the number of digital connection identifiers in the second target path information.
第五确定单元,用于基于第二目标路径信息中的文件标识和数字连接标识的总数,确定第五路径匹配特征值表征的第二目标路径的中间值。The fifth determining unit is used to determine the middle value of the second target path represented by the fifth path matching feature value based on the total number of the file identifier and the digital connection identifier in the second target path information.
第六确定单元,用于基于第二目标路径信息中的文件标识,确定第六路径匹配特征值表征的第二目标路径的文件标识总和。The sixth determining unit is used to determine the sum of the file identifiers of the second target path represented by the sixth path matching feature value based on the file identifiers in the second target path information.
在一些可选的实施方式中,筛选单元包括:In some optional embodiments, the screening unit comprises:
第一筛选子单元,用于基于第一路径匹配特征值和第四路径匹配特征值,从安全访问策略库中筛选出访问主体的第一特征值不大于第一路径匹配特征值,且访问客体的第一特征值不大于第四路径匹配特征值的第一路径匹配信息集。The first screening sub-unit is used to screen out a first path matching information set from the security access policy library based on the first path matching feature value and the fourth path matching feature value, in which the first feature value of the access subject is not greater than the first path matching feature value, and the first feature value of the access object is not greater than the fourth path matching feature value.
第二筛选子单元,用于基于第二路径匹配特征值,从第一路径匹配信息集中筛选出访问主体的第二特征值与第二路径匹配特征值相同的第二路径匹配信息集。The second screening subunit is used to screen out the second path matching information set whose second characteristic value of the access subject is the same as the second path matching characteristic value from the first path matching information set based on the second path matching characteristic value.
第三筛选子单元,用于在第二路径匹配信息集为空的情况下,对第一目标路径信息进行层级更新操作,获得更新后的第二路径匹配特征值和更新后的第三路径匹配特征值,基于更新后的第二路径匹配特征值,从第一路径匹配信息集中筛选出访问主体的第二特征值与更新后的第二路径匹配特征值相同的第二路径匹配信息集。The third screening sub-unit is used to perform a hierarchical update operation on the first target path information when the second path matching information set is empty, to obtain an updated second path matching feature value and an updated third path matching feature value, and based on the updated second path matching feature value, to screen out a second path matching information set whose second feature value of the access subject is the same as the updated second path matching feature value from the first path matching information set.
第七确定单元,用于在第二路径匹配信息集为空且第一目标路径信息层次更新至根目录的情况下,确定目标路径匹配信息集匹配失败。The seventh determining unit is configured to determine that the target path matching information set fails to match when the second path matching information set is empty and the first target path information level is updated to the root directory.
第四筛选子单元,用于在第二路径匹配信息集不为空且第一目标路径信息未进行层次更新的情况下,基于第三路径匹配特征值,从第二路径匹配信息集中筛选出访问主体的第三特征值与第三路径匹配特征值相同的第三路径匹配信息集。The fourth screening subunit is used to screen out a third path matching information set whose third characteristic value of the access subject is the same as the third path matching characteristic value from the second path matching information set based on the third path matching characteristic value when the second path matching information set is not empty and the first target path information has not been hierarchically updated.
第五筛选子单元,用于在第二路径匹配信息集不为空且第一目标路径信息进行层次更新的情况下,基于更新后的第三路径匹配特征值,从第二路径匹配信息集中筛选出访问主体的第三特征值与更新后的第三路径匹配特征值相同的第三路径匹配信息集。The fifth screening sub-unit is used to screen out a third path matching information set whose third characteristic value of the access subject is the same as the updated third path matching characteristic value from the second path matching information set based on the updated third path matching characteristic value when the second path matching information set is not empty and the first target path information is hierarchically updated.
第六筛选子单元,用于基于第五路径匹配特征值,从第三路径匹配信息集中筛选出访问客体的第二特征值与第五路径匹配特征值相同的第四路径匹配信息集。The sixth screening subunit is used to screen out a fourth path matching information set whose second characteristic value of the access object is the same as the fifth path matching characteristic value from the third path matching information set based on the fifth path matching characteristic value.
第七筛选子单元,用于在第四路径匹配信息集为空的情况下,对第二目标路径信息进行层级更新操作,获得更新后的第五路径匹配特征值和更新后的第六路径匹配特征值,基于更新后的第五路径匹配特征值,从第三路径匹配信息集中筛选出访问客体的第二特征值与更新后的第五路径匹配特征值相同的第四路径匹配信息集。The seventh screening sub-unit is used to perform a hierarchical update operation on the second target path information when the fourth path matching information set is empty, to obtain an updated fifth path matching feature value and an updated sixth path matching feature value, and based on the updated fifth path matching feature value, to screen out a fourth path matching information set from the third path matching information set whose second feature value of the access object is the same as the updated fifth path matching feature value.
第八确定单元,用于在第四路径匹配信息集为空且第二目标路径信息层次更新至根目录的情况下,确定目标路径匹配信息集匹配失败。The eighth determining unit is configured to determine that the target path matching information set fails to match when the fourth path matching information set is empty and the second target path information level is updated to the root directory.
第八筛选子单元,用于在第四路径匹配信息集不为空且第二目标路径信息未进行层次更新的情况下,基于第六路径匹配特征值,从第四路径匹配信息集中筛选出访问客体的第三特征值与第六路径匹配特征值相同的目标路径匹配信息集。The eighth screening subunit is used to screen out a target path matching information set whose third characteristic value of the access object is the same as the sixth path matching characteristic value from the fourth path matching information set based on the sixth path matching characteristic value when the fourth path matching information set is not empty and the second target path information has not been hierarchically updated.
第九筛选子单元,用于在第四路径匹配信息集不为空且第二目标路径信息进行层次更新的情况下,基于更新后的第六路径匹配特征值,从第四路径匹配信息集中筛选出访问客体的第三特征值与更新后的第六路径匹配特征值相同的目标路径匹配信息集。The ninth screening sub-unit is used to screen out a target path matching information set whose third characteristic value of the access object is the same as the updated sixth path matching characteristic value from the fourth path matching information set based on the updated sixth path matching characteristic value when the fourth path matching information set is not empty and the second target path information is hierarchically updated.
在一些可选的实施方式中,第一匹配单元包括:In some optional implementations, the first matching unit includes:
第七获取单元,用于获取触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息。A seventh acquisition unit is configured to acquire the first target path information and the second target path information that trigger the successful matching of the target path matching information set.
第一匹配子单元,用于基于触发目标路径匹配信息集匹配成功的第一目标路径信息和第二目标路径信息,从目标安全访问策略集中匹配出目标安全访问策略。The first matching subunit is configured to match a target security access policy from a target security access policy set based on the first target path information and the second target path information that trigger a successful match of the target path matching information set.
在一些可选的实施方式中,第六获取单元包括:In some optional implementations, the sixth acquisition unit includes:
第八获取单元,用于获取目标路径匹配信息集中的关联标识。The eighth acquisition unit is used to acquire the association identifier in the target path matching information set.
第九获取单元,用于基于关联标识,从安全访问策略库中获取目标安全访问策略集。The ninth acquisition unit is used to acquire a target security access policy set from the security access policy library based on the association identifier.
上述各个模块和单元的更进一步的功能描述与上述对应实施例相同,在此不再赘述。The further functional description of each of the above modules and units is the same as that of the above corresponding embodiments and will not be repeated here.
本实施例中的安全访问策略匹配装置是以功能单元的形式来呈现,这里的单元是指ASIC(Application Specific Integrated Circuit,专用集成电路)电路,执行一个或多个软件或固定程序的处理器和存储器,和/或其他可以提供上述功能的器件。The security access policy matching device in this embodiment is presented in the form of a functional unit, where the unit refers to an ASIC (Application Specific Integrated Circuit) circuit, a processor and memory that executes one or more software or fixed programs, and/or other devices that can provide the above functions.
本发明实施例还提供一种计算机设备,具有上述图6所示的安全访问策略匹配装置。An embodiment of the present invention further provides a computer device having the security access policy matching device shown in FIG. 6 above.
请参阅图7,图7是本发明可选实施例提供的一种计算机设备的结构示意图,如图7所示,该计算机设备包括:一个或多个处理器701、存储器702,以及用于连接各部件的接口,包括高速接口和低速接口。各个部件利用不同的总线互相通信连接,并且可以被安装在公共主板上或者根据需要以其它方式安装。处理器可以对在计算机设备内执行的指令进行处理,包括存储在存储器中或者存储器上以在外部输入/输出装置(诸如,耦合至接口的显示设备)上显示GUI的图形信息的指令。在一些可选的实施方式中,若需要,可以将多个处理器和/或多条总线与多个存储器和多个存储器一起使用。同样,可以连接多个计算机设备,各个设备提供部分必要的操作(例如,作为服务器阵列、一组刀片式服务器、或者多处理器系统)。图7中以一个处理器701为例。Please refer to Figure 7, which is a schematic diagram of the structure of a computer device provided by an optional embodiment of the present invention. As shown in Figure 7, the computer device includes: one or more processors 701, a memory 702, and interfaces for connecting various components, including high-speed interfaces and low-speed interfaces. The various components are connected to each other using different buses for communication, and can be installed on a common motherboard or installed in other ways as needed. The processor can process instructions executed in the computer device, including instructions stored in or on the memory to display graphical information of the GUI on an external input/output device (such as a display device coupled to the interface). In some optional embodiments, if necessary, multiple processors and/or multiple buses can be used together with multiple memories and multiple memories. Similarly, multiple computer devices can be connected, and each device provides some necessary operations (for example, as a server array, a group of blade servers, or a multi-processor system). In Figure 7, a processor 701 is taken as an example.
处理器701可以是中央处理器,网络处理器或其组合。其中,处理器701还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路,可编程逻辑器件或其组合。上述可编程逻辑器件可以是复杂可编程逻辑器件,现场可编程逻辑门阵列,通用阵列逻辑或其任意组合。The processor 701 may be a central processing unit, a network processor or a combination thereof. The processor 701 may further include a hardware chip. The hardware chip may be a dedicated integrated circuit, a programmable logic device or a combination thereof. The programmable logic device may be a complex programmable logic device, a field programmable logic gate array, a general purpose array logic or any combination thereof.
其中,存储器702存储有可由至少一个处理器701执行的指令,以使至少一个处理器701执行实现上述实施例示出的方法。The memory 702 stores instructions executable by at least one processor 701, so that the at least one processor 701 executes the method shown in the above embodiment.
存储器702可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据计算机设备的使用所创建的数据等。此外,存储器702可以包括高速随机存取存储器,还可以包括非瞬时存储器,例如至少一个磁盘存储器件、闪存器件、或其他非瞬时固态存储器件。在一些可选的实施方式中,存储器702可选包括相对于处理器701远程设置的存储器,这些远程存储器可以通过网络连接至该计算机设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 702 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application required for at least one function; the data storage area may store data created according to the use of the computer device, etc. In addition, the memory 702 may include a high-speed random access memory, and may also include a non-transient memory, such as at least one disk storage device, a flash memory device, or other non-transient solid-state storage device. In some optional embodiments, the memory 702 may optionally include a memory remotely arranged relative to the processor 701, and these remote memories may be connected to the computer device via a network. Examples of the above-mentioned network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
存储器702可以包括易失性存储器,例如,随机存取存储器;存储器也可以包括非易失性存储器,例如,快闪存储器,硬盘或固态硬盘;存储器702还可以包括上述种类的存储器的组合。The memory 702 may include a volatile memory, such as a random access memory; the memory may also include a non-volatile memory, such as a flash memory, a hard disk or a solid state drive; the memory 702 may also include a combination of the above types of memory.
该计算机设备还包括通信接口703,用于该计算机设备与其他设备或通信网络通信。The computer device also includes a communication interface 703, which is used for the computer device to communicate with other devices or a communication network.
本发明实施例还提供了一种计算机可读存储介质,上述根据本发明实施例的方法可在硬件、固件中实现,或者被实现为可记录在存储介质,或者被实现通过网络下载的原始存储在远程存储介质或非暂时机器可读存储介质中并将被存储在本地存储介质中的计算机代码,从而在此描述的方法可被存储在使用通用计算机、专用处理器或者可编程或专用硬件的存储介质上的这样的软件处理。其中,存储介质可为磁碟、光盘、只读存储记忆体、随机存储记忆体、快闪存储器、硬盘或固态硬盘等;进一步地,存储介质还可以包括上述种类的存储器的组合。可以理解,计算机、处理器、微处理器控制器或可编程硬件包括可存储或接收软件或计算机代码的存储组件,当软件或计算机代码被计算机、处理器或硬件访问且执行时,实现上述实施例示出的方法。The embodiment of the present invention also provides a computer-readable storage medium. The method according to the embodiment of the present invention can be implemented in hardware, firmware, or can be implemented as a computer code that can be recorded in a storage medium, or can be implemented as a computer code that is originally stored in a remote storage medium or a non-temporary machine-readable storage medium and will be stored in a local storage medium through a network download, so that the method described herein can be stored in such software processing on a storage medium using a general-purpose computer, a dedicated processor, or programmable or dedicated hardware. Among them, the storage medium can be a magnetic disk, an optical disk, a read-only storage memory, a random access memory, a flash memory, a hard disk or a solid-state hard disk, etc.; further, the storage medium can also include a combination of the above types of memories. It can be understood that a computer, a processor, a microprocessor controller, or programmable hardware includes a storage component that can store or receive software or computer code. When the software or computer code is accessed and executed by a computer, a processor, or hardware, the method shown in the above embodiment is implemented.
本发明的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本发明的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。A part of the present invention may be applied as a computer program product, such as a computer program instruction, which, when executed by a computer, can call or provide the method and/or technical solution according to the present invention through the operation of the computer. Those skilled in the art should understand that the existence of the computer program instruction in a computer-readable medium includes, but is not limited to, a source file, an executable file, an installation package file, etc., and accordingly, the way in which the computer program instruction is executed by the computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Here, the computer-readable medium may be any available computer-readable storage medium or communication medium accessible to the computer.
虽然结合附图描述了本发明的实施例,但是本领域技术人员可以在不脱离本发明的精神和范围的情况下做出各种修改和变型,这样的修改和变型均落入由所附权利要求所限定的范围之内。Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the present invention, and such modifications and variations are all within the scope defined by the appended claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410864893.8A CN118784299A (en) | 2024-06-28 | 2024-06-28 | Security access policy matching method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410864893.8A CN118784299A (en) | 2024-06-28 | 2024-06-28 | Security access policy matching method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118784299A true CN118784299A (en) | 2024-10-15 |
Family
ID=92985578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410864893.8A Pending CN118784299A (en) | 2024-06-28 | 2024-06-28 | Security access policy matching method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118784299A (en) |
-
2024
- 2024-06-28 CN CN202410864893.8A patent/CN118784299A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9003239B2 (en) | Monitoring and resolving deadlocks, contention, runaway CPU and other virtual machine production issues | |
US9830457B2 (en) | Unified extensible firmware interface (UEFI) credential-based access of hardware resources | |
US20140082346A1 (en) | Method and System for Managing Basic Input/Output System (BIOS) Configuration Data of BIOS | |
US11188407B1 (en) | Obtaining computer crash analysis data | |
US10606677B2 (en) | Method of retrieving debugging data in UEFI and computer system thereof | |
US9501344B2 (en) | Data dump for a memory in a data processing system | |
CN111338958B (en) | Parameter generation method and device for test cases and terminal equipment | |
US8707017B2 (en) | Method and system for managing core configuration information | |
US11507667B2 (en) | Firmware password management | |
US11150981B2 (en) | Fast recovery from failures in a chronologically ordered log-structured key-value storage system | |
US12147701B2 (en) | Systems, methods, and devices for accessing a device program on a storage device | |
CN110851339A (en) | Method and device for reporting buried point data, storage medium and terminal equipment | |
US20240311189A1 (en) | System and method for secure recovery of application group in container deployment environments | |
WO2024113884A1 (en) | Resource allocation method and apparatus for peripheral, server, and storage medium | |
US11231940B2 (en) | System and method for automatic recovery of information handling systems | |
US11977559B2 (en) | Providing instant and distributed access to a source blob via copy-on-read blobs and link blobs | |
CN117931097B (en) | Information providing method and device applied to servers of edge computing cluster | |
CN118784299A (en) | Security access policy matching method, device, computer equipment and storage medium | |
US20230088318A1 (en) | Remotely healing crashed processes | |
CN113965383B (en) | Tenant data access management method, device, equipment and storage medium | |
US7725882B1 (en) | System and method for profiling processes in a computing system | |
US11509730B1 (en) | Analyzing web service frontends to extract security-relevant behavior information | |
CN108363614B (en) | Application service module management method and device and server | |
US10277521B2 (en) | Authorizing an action request in a networked computing environment | |
CN112948118A (en) | Edge calculation method, platform, computer device and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |