CN101329708A - Safe business course management system - Google Patents

Safe business course management system Download PDF

Info

Publication number
CN101329708A
CN101329708A CNA2008101173144A CN200810117314A CN101329708A CN 101329708 A CN101329708 A CN 101329708A CN A2008101173144 A CNA2008101173144 A CN A2008101173144A CN 200810117314 A CN200810117314 A CN 200810117314A CN 101329708 A CN101329708 A CN 101329708A
Authority
CN
China
Prior art keywords
process model
business
business process
data
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101173144A
Other languages
Chinese (zh)
Other versions
CN100580683C (en
Inventor
杜栓柱
赵琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NFS-CHINA SOFTWARE Co Ltd
Original Assignee
NFS-CHINA SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NFS-CHINA SOFTWARE Co Ltd filed Critical NFS-CHINA SOFTWARE Co Ltd
Priority to CN200810117314.4A priority Critical patent/CN100580683C/en
Publication of CN101329708A publication Critical patent/CN101329708A/en
Application granted granted Critical
Publication of CN100580683C publication Critical patent/CN100580683C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention relates to a safe business process management system, belongs to the technical field of information systems. Aiming at solving the problem that static business process model is illegally modified, deleted and operated, dynamic business process model instance is illegally operated, and the operation result of business process model is not safe, the invention discloses a safe business process management system. The system protects a static business process model file against illegal modification, deletion and operation by the security configuration strategy of the operation system and the database system, simultaneously protects the normal operation of the business process during operation by a security management module of business operation model of the system. In addition, potential risky operation is stopped in time when potential risk is detected or after abnormal error and rollback can be carried out to the incorrect operation simultaneously.

Description

The business course management system of safety
Technical field
The present invention relates to a kind of business course management system that security mechanism is provided; relating in particular to a kind of security configuration strategy of operating system and Database Systems that utilizes protects static business process model file not by illegal distorting, delete and carry out; protect the normal execution of business procedure in service simultaneously by the business process model safety management module of system; and after detecting potential risk or exception error, can in time stop the potential risks operation; simultaneously the operation of mistake is carried out the system of rollback, belonged to the information systems technology field.
Background technology
Along with the widespread usage of business course management system in finance, insurance, security and key area such as communicate by letter, the safety issue of business course management system obtains the attention of research circle and industry member gradually.The field application system executive mode that business course management system provides business process model to drive, can under the system framework of unanimity, satisfy user's different demands on the one hand, dynamic change that on the other hand can adaptive system user's request in service, thereby obtained using widely.Yet, along with increasing that business course management system is used in key field, the business process model file is illegally distorted, is deleted and carried out and the operating inefficacy of system etc. all may cause loss difficult to the appraisal, therefore, press for the system that makes up safety at the characteristics of business course management system, support the Secure Application of key area.
At present, the method for security protection of business course management system is generally realized from 3 levels: (1) identification level, promptly pass through based on the unidirectional of CA certificate and bidirectional identity authentication technology, wherein unilateral authentication is only required the credibility of authentication server end, and two-way authentication had both required the server end checking, and server end is also verified by certificate the identity of client simultaneously; (2) transmission level, promptly data are transmitted by the mode of encrypting, and system provides the encryption and decryption instrument; (3) data backup and audit level, promptly database management tools or the third party's data mining product by system regularly backs up the data in the system, and user's operation behavior etc. is carried out audit analysis, finds potential hidden danger.As seen from the above analysis, safety in the current operation course management system strengthens safety practice and the method that mainly depends at the generic management software system, promptly support the module of safety practice and method generally to be independent of business course management system, and fail to consider the characteristic of business course management system itself, thereby make under the situation of not violating identification layer, transport layer and data backup and audit layer safety practice, have security risk by still can make field application to means such as illegally distorting of business process model based on business course management system.
Business course management system drives by business process model and carries out, and business process model is the starting point and the basis of business course management system, and therefore the business course management system of safety also must be from the safety of research business process model layer.At first, need to realize the safety of static traffic process model, guarantee that model static, not instantiation is not by illegal distorting, delete and carry out; Secondly, need to realize the safety of business process model in service, guarantee that the business process model example moves, and can judge illegal unauthorized user under certain security strategy, do not carried out, and can detect the illegal execution of authorized user by illegal unauthorized user; The 3rd, need to guarantee the safety of business process model operation result, the unpredictable point of safes that can return back to business process model after unusual takes place in system.In present disclosed patent documentation, find no business course management system based on business process model safety.
Summary of the invention
The static traffic process model illegal is distorted in order to solve, deletion and executive problem, dynamic service process model example be by illegal executive problem, and the safety problem of business process model operation result, the present invention proposes a kind of safe business course management system, this system comprises business process model editor module, business process model safety management module and business procedure engine modules at least
Wherein the business process model editor module is used for definition and maintenance service process model, export executable text services process model file, perhaps executable data streaming service process model file, the file system of the operating system that described text services process model file storage is disposed in business course management system, described data streaming service process model file storage is in the third party database system; The business procedure engine modules is used to drive the business process model the carried out file of business process model editor module output, realizes automatically performing of business course management system; The business process model safety management module is used for static traffic process model file and dynamic service process model execution example are carried out safety management, guarantees the safety execution of business procedure engine modules to business process model.
In the present invention, described business procedure engine modules comprises three parts at least, the one, the initial instantiation submodule of business process model, be used for to be written into the business procedure engine modules at the business process model that the business process model editor module defines, and the data in the business process model file are carried out initialization; The 2nd, business process model driven element module is used for the execution that makes an explanation of initialized business process model; The 3rd, the safety detection submodule, the executor, the executory outer input data of business procedure engine modules and the executory output data of business procedure engine modules that are used for the business procedure engine modules are carried out the security detection.
In the present invention, the initial instantiation submodule of described business process model comprises two parts at least, the one, and the business process model loader, the 2nd, the business process model initializer,
Wherein the business process model loader is deployed in the business procedure engine modules with the business process model that defines in the business process model editor module, makes business process model enter the state that allows the input primary data; The business process model initializer provides the initialization of data in the business process model execution, makes business process model enter the critical conditions that allows execution.
In the present invention, described business process model driven element module comprises two parts at least, the one, and forerunner's device of business process model is used for the serial interpretation of business process model is carried out, the 2nd, the rear-guard device of business process model is used for the rollback of business process model is explained execution.
In the present invention, described safety detection submodule comprises two parts at least, the one, and business procedure executor data detector, the 2nd, business procedure execution result detecting device,
Wherein business procedure executor data detector is used for business process model task executor data are detected, output executor testing result; Business procedure execution result detecting device is used for business process model task executions result data is detected, the testing result of output implementation status.
In the present invention, described business process model safety management module comprises four parts at least, the one, and business process model file security policy configurations submodule is used to define the security strategy at business process model; The 2nd, text services process model file security mapping submodule is used for the security strategy of business process model security strategy configuration submodule is mapped as the file security strategy of operating system; The 3rd, data streaming service process model file security mapping submodule is used for the security strategy of business process model security strategy configuration submodule is mapped as the security strategy of Database Systems; The 4th, business process model running example regulator module, be used for driving the safety detection submodule of business procedure engine modules according to the security strategy of business process model security strategy configuration submodule, obtain the output data of the safety detection submodule of business procedure engine modules simultaneously, and the interface that business procedure engine modules hand-manipulated is provided.
In the present invention, described business process model security strategy configuration submodule comprises two parts at least, the one, static traffic process model security strategy configurator, be used to provide the security strategy configuration of not disposing the operation phase at business process model, the 2nd, dynamic service process model case safe policy configurations device is used to provide the security strategy configuration of business process model example in service.
In the present invention, described text services process model file security mapping submodule is used to provide the security strategy at different operating system to detect and mapping, it comprises two parts at least, the one, the security configuration detecting device of OS Type, the type and the security configuration method thereof that are used for the detecting operation system, the 2nd, operating system security policy mappings device, be used for the testing result according to the security configuration detecting device of OS Type, configuration pin is to the security strategy of the business process model of different operating system.
In the present invention, described data streaming service process model file security mapping submodule is used to provide the security strategy at the disparate databases system to detect and mapping, it comprises two parts at least, the one, the security configuration detecting device of Database Systems type, the type and the security configuration method thereof that are used for judgment data storehouse system, the 2nd, data management system security strategy mapper, be used for the testing result according to the security configuration detecting device of type of database, configuration pin is to the security strategy of the business process model of disparate databases system.
In the present invention, described business process model running example regulator module comprises three parts at least, the one, and the safe submodule modulator of business procedure engine, the 2nd, the data output analyzer of safety detection submodule, the 3rd, the modulator of business procedure engine,
Wherein the safe submodule modulator of business procedure engine is used to regulate business procedure executor data detector and business procedure execution result detector parameters; The data output analyzer of safety detection submodule is used for detecting business process model and carries out whether there are potential risks; The modulator of business procedure engine is used to control business process model driven element module, shields risky executor, data, perhaps carries out rollback to unusual execution result occurring.
Beneficial effect of the present invention is: can guarantee that at first business process model static in the business course management system is not by illegal distorting, delete and carry out; Next guarantees that the business process model example moves under certain security strategy, can judge illegal unauthorized user, is not carried out by illegal unauthorized user, and can detect the illegal execution of authorized user; The 3rd is the safety that guarantees the business process model execution result, can return back to the point of safes of business process model after the generation imprevision is unusual.
Description of drawings
Fig. 1 is the structured flowchart of the described safe business course management system of exemplary embodiments of the present invention.
Fig. 2 is the data stream of the described safe business course management system of exemplary embodiments of the present invention and the synoptic diagram of control stream.
Embodiment
The present invention is further illustrated below in conjunction with the drawings and specific embodiments.
As shown in Figure 1, in typical case of the present invention implemented, described safe business course management system comprised business process model editor module 10, business process model safety management module 20 and business procedure engine modules 30 at least.
Business process model editor module 10 is used for definition and maintenance service process model, export executable text services process model file, perhaps executable data streaming service process model file, the file system of the operating system that text services process model file storage is disposed in business course management system, data streaming service process model file storage is in the third party database system.Business procedure engine modules 30 is used to drive the business process model the carried out file of business process model editor module output, realizes automatically performing of business course management system.Business process model safety management module 20 is used for static traffic process model file and dynamic service process model execution example are carried out safety management, guarantees the safety execution of business procedure engine modules to business process model.
Business procedure engine modules 30 comprises three parts at least, the one, the initial instantiation submodule 31 of business process model, be used for and be written into business procedure engine modules 30 at the business process model of business process model editor module 10 definition, and the data in the business process model file are carried out initialization; The 2nd, business process model driven element module 32 is used for the execution that makes an explanation of initialized business process model; The 3rd, safety detection submodule 33, the executor, the executory outer input data of business procedure engine modules and the executory output data of business procedure engine modules that are used for the business procedure engine modules are carried out the security detection.
The initial instantiation submodule 31 of business process model comprises two parts at least, the one, business process model loader 311, the 2nd, business process model initializer 312, business process model loader 311 is deployed in business procedure engine modules 30 with the business process model that defines in the business process model editor module 10, makes business process model enter the state that allows the input primary data; Business process model initializer 312 provides the initialization of data in the business process model execution, makes business process model enter the critical conditions that allows execution.
Business process model driven element module 32 comprises two parts at least, the one, forerunner's device 322 of business process model, be used for the serial interpretation of business process model is carried out, the 2nd, the rear-guard device 323 of business process model is used for the rollback of business process model is explained execution.
Safety detection submodule 33 comprises two parts at least, the one, business procedure executor data detector 331, the 2nd, business procedure execution result detecting device 332, wherein business procedure executor data detector 331 is used for business process model task executor data are detected, output executor testing result; Business procedure execution result detecting device 332 is used for business process model task executions result data is detected, the testing result of output implementation status.
Business process model safety management module 20 comprises four parts at least, the one, and business process model file security policy configurations submodule 21 is used to define the security strategy at business process model; The 2nd, text services process model file security mapping submodule 22 is used for the security strategy of business process model security strategy configuration submodule 21 is mapped as the file security strategy of operating system; The 3rd, data streaming service process model file security mapping submodule 23 is used for the security strategy of business process model security strategy configuration submodule 21 is mapped as the security strategy of Database Systems; The 4th, business process model running example regulator module 24, be used for driving the safety detection submodule 33 of business procedure engine modules according to the security strategy of business process model security strategy configuration submodule 21, obtain the output data of the safety detection submodule 33 of business procedure engine modules simultaneously, and the interface that business procedure engine modules 30 hand-manipulated is provided.
Business process model security strategy configuration submodule 21 comprises two parts at least, the one, static traffic process model security strategy configurator 211, be used to provide the security strategy configuration of not disposing the operation phase at business process model, the 2nd, dynamic service process model case safe policy configurations device 212 is used to provide the security strategy configuration of business process model example in service.
Text services process model file security mapping submodule 22 is used to provide the security strategy at different operating system to detect and mapping, it comprises two parts at least, the one, the security configuration detecting device 221 of OS Type, the type and the security configuration method thereof that are used for the detecting operation system, the 2nd, operating system security policy mappings device 222, be used for the testing result according to the security configuration detecting device of OS Type, configuration pin is to the security strategy of the business process model of different operating system.
Data streaming service process model file security mapping submodule 23 is used to provide the security strategy at the disparate databases system to detect and mapping, it comprises two parts at least, the one, the security configuration detecting device 231 of Database Systems type, the type and the security configuration method thereof that are used for judgment data storehouse system, the 2nd, data management system security strategy mapper 232, be used for the testing result according to the security configuration detecting device of type of database, configuration pin is to the security strategy of the business process model of disparate databases system.
Business process model running example regulator module 24 comprises three parts at least, the one, the safe submodule modulator 241 of business procedure engine, the 2nd, the data output analyzer 242 of safety detection submodule, the 3rd, the modulator 243 of business procedure engine, the safe submodule modulator 241 of business procedure engine is used to regulate business procedure executor data detector and business procedure execution result detector parameters; The data output analyzer 242 of safety detection submodule is used for detecting business process model and carries out whether there are potential risks; The modulator 243 of business procedure engine is used to control business process model driven element module, shields risky executor, data, perhaps carries out rollback to unusual execution result occurring.
Fig. 2 is the data stream of safety service course management system of the present invention and the synoptic diagram of control stream.The text services process model file 10B and the data streaming service process model file 10A of 10 outputs of business process model editor module are inputs of business procedure engine modules 30, by business procedure engine modules 30 execution of explaining; Text services process model file 10B and the data streaming service process model file 10A file system 4B and the 4A of third party database system of the physical store operating system of disposing in business course management system respectively simultaneously, and, be mapped as the unify security strategy of file system of data base set respectively by the static security strategy that static traffic process model security strategy configurator 211 is output among the security policy database 21B; The dynamic security strategy that is output among the security policy database 21B by dynamic service process model case safe policy configurations device 212, detect the potential risk in the business process model running example, the modulator 243 by the business procedure engine stops detected potential risk operation or user thus.Simultaneously, business process model for static state, generate security policy database 21B by dynamic service process model case safe policy configurations device 212 and static traffic process model security strategy configurator 211, and, be mapped as the security strategy configuration file of the file system 4B of 4A of third party database system and operating system respectively according to the testing result of the security configuration detecting device 221 of the security configuration detecting device 231 of type of database and OS Type.
Business process model loader 311 is written into business procedure engine modules 30 with text services process model file 10B or data streaming service process model file 10A, wherein is written into result phase and comprises at least:
The physical store environment of business process model file: the physical store environment comprises title, version number, the bibliographic structure of the Database Systems that operating system that text services process model file is stored or data streaming service process model file are stored at least, and the security configuration that these information are used for the security configuration detecting device 221 of the security configuration detecting device 231 of type of database and OS Type detects.
The logical storage structure of business process model file: logical storage structure comprises bibliographic structure at least, is used for the initialization of business process model initializer 312 data.
The output data of business process model initializer 312 initialization business process model loaders 311 generates business procedure mould initialization data 31B.Business procedure mould initialization data 31B comprises at least: the startup person of the responsible official of business process model example, business process model example, the initial parameter example of business process model, the control dependence of business process model, the data dependence relation of business process model.
322 pairs of business procedure moulds of forerunner's device initialization data 31B of business process model carries out forward and explains execution, the execution instance data 32B of outgoing traffic process model.The execution instance data 32B of business process model comprises at least: the task data dependence of the task control dependence of the actual executor of task, business process model example, business process model example in the business process model; Simultaneously, forerunner's device 322 of business process model provides the interface with the modulator 243 of business procedure engine, forerunner's device 322 of business process model can carry out executable operations to business process model among the business procedure mould initialization data 31B according to the instruction of the modulator 243 of business procedure engine, its operation that can carry out comprises at least: forbid certain/certain class executor to a certain task executions, distribute a certain task give certain/certain class executor, a certain task is carried out in redirect forward
The rear-guard device 323 of business process model is oppositely explained execution according to the execution instance data 32B of business procedure mould initialization data 31B and business process model to business process model, the execution instance data 32B of outgoing traffic process model.The execution instance data 32B of business process model comprises at least: the task data dependence of the business process model example of the task control dependence of the actual executor of task, the reverse business process model example of carrying out, reverse execution in the reverse business process model of carrying out; Simultaneously, the rear-guard device 323 of business process model provides the interface with the modulator 243 of business procedure engine, and the execution of the rear-guard device 323 of business process model is driven by the modulator 243 of business procedure engine.The executable operations of the rear-guard device 323 of business process model comprises at least: redirect is carried out a certain task, is returned to the point of safes of business process model example among the execution instance data 32B of business process model backward.
Business procedure executor data detector 331 detects data among the execution instance data 32B of business process model according to the strategy among the security policy database 21B, test item comprises at least: executor's IP address, login times, login time interval, operational module, role-security, detect back outgoing traffic process model and carry out testing result data 33B, simultaneously, in the execution instance data 32B of business process model, insert point of safes in the corresponding business process model example according to testing result.
Business procedure execution result detecting device 332 detects data among the execution instance data 32B of business process model according to the strategy among the security policy database 21B, test item comprises at least: the data that the data that the founder of data, the user of data, individual task are created, individual task executor create, detect back outgoing traffic process model and carry out testing result data 33B, simultaneously, in the execution instance data 32B of business process model, insert point of safes in the corresponding business process model example according to testing result.
Static traffic process model security strategy configurator 211 and dynamic service process model case safe policy configurations device 212 generate the security strategy of text type and dataflow-style business procedure respectively, be stored in security policy database 21B, wherein the security strategy content comprises at least: the directory permission control strategy of text type business process model, the physics deletion strategy of text type and dataflow-style business process model, the physical backup strategy of text type and dataflow-style business process model, the remote access strategy of text type and dataflow-style business process model, the maintenance strategy of business process model example, the remote access policy of business process model example, the point of safes definition strategy of business process model example.
The security configuration detecting device 231 of type of database and the security configuration detecting device 221 of OS Type are used for detecting Database Systems type and OS Type respectively, testing result comprises Database Systems title and version number and OS name and version number at least.
Data management system security strategy mapper 232 and operating system security policy mappings device 222 are used for the security strategy among the security policy database 21B is mapped to the file system 4B of 4A of third party database system and operating system respectively.
The data of safety detection submodule output analyzer 242 is carried out testing result data 33B according to business process model and is detected business process model and whether have potential risks in carrying out, risk comprises at least that executor's the accessing operation that lands frequency abnormality, executor is unusual, the task action result data unusual.
If the data of safety detection submodule output analyzer 242 testing results are for existing risk, then the data of safety detection submodule output analyzer 242 triggers the safe submodule modulator 241 of business procedure engine, regulate the Data Detection parameter in business procedure executor's data detector 331 and the business procedure execution result detecting device 332, further analyze; Simultaneously, trigger the modulator 243 of business procedure engine.The forerunner's device 322 of the 243 pairs of business process models of modulator by triggering the business procedure engine or the rear-guard device 323 of business process model are regulated and control, and shield risky executor, data, perhaps carry out rollback to unusual execution result occurring.

Claims (10)

1. the business course management system of a safety is characterized in that, described safe business course management system comprises business process model editor module, business process model safety management module and business procedure engine modules at least,
Wherein the business process model editor module is used for definition and maintenance service process model, export executable text services process model file, perhaps executable data streaming service process model file, the file system of the operating system that described text services process model file storage is disposed in business course management system, described data streaming service process model file storage is in the third party database system; The business procedure engine modules is used to drive the business process model the carried out file of business process model editor module output, realizes automatically performing of business course management system; The business process model safety management module is used for static traffic process model file and dynamic service process model execution example are carried out safety management, guarantees the safety execution of business procedure engine modules to business process model.
2. safe business course management system as claimed in claim 1, it is characterized in that, described business procedure engine modules comprises three parts at least, the one, the initial instantiation submodule of business process model, be used for to be written into the business procedure engine modules at the business process model that the business process model editor module defines, and the data in the business process model file are carried out initialization; The 2nd, business process model driven element module is used for the execution that makes an explanation of initialized business process model; The 3rd, the safety detection submodule, the executor, the executory outer input data of business procedure engine modules and the executory output data of business procedure engine modules that are used for the business procedure engine modules are carried out the security detection.
3. safe business course management system as claimed in claim 2 is characterized in that, the initial instantiation submodule of described business process model comprises two parts at least, the one, and the business process model loader, the 2nd, the business process model initializer,
Wherein the business process model loader is deployed in the business procedure engine modules with the business process model that defines in the business process model editor module, makes business process model enter the state that allows the input primary data; The business process model initializer provides the initialization of data in the business process model execution, makes business process model enter the critical conditions that allows execution.
4. safe business course management system as claimed in claim 2, it is characterized in that, described business process model driven element module comprises two parts at least, the one, forerunner's device of business process model, be used for the serial interpretation of business process model is carried out, the 2nd, the rear-guard device of business process model is used for the rollback of business process model is explained execution.
5. safe business course management system as claimed in claim 2 is characterized in that, described safety detection submodule comprises two parts at least, the one, and business procedure executor data detector, the 2nd, business procedure execution result detecting device,
Wherein business procedure executor data detector is used for business process model task executor data are detected, output executor testing result; Business procedure execution result detecting device is used for business process model task executions result data is detected, the testing result of output implementation status.
6. safe business course management system as claimed in claim 1, it is characterized in that, described business process model safety management module comprises four parts at least, the one, and business process model file security policy configurations submodule is used to define the security strategy at business process model; The 2nd, text services process model file security mapping submodule is used for the security strategy of business process model security strategy configuration submodule is mapped as the file security strategy of operating system; The 3rd, data streaming service process model file security mapping submodule is used for the security strategy of business process model security strategy configuration submodule is mapped as the security strategy of Database Systems; The 4th, business process model running example regulator module, be used for driving the safety detection submodule of business procedure engine modules according to the security strategy of business process model security strategy configuration submodule, obtain the output data of the safety detection submodule of business procedure engine modules simultaneously, and the interface that business procedure engine modules hand-manipulated is provided.
7. safe business course management system as claimed in claim 6, it is characterized in that, described business process model security strategy configuration submodule comprises two parts at least, the one, static traffic process model security strategy configurator, be used to provide the security strategy configuration of not disposing the operation phase at business process model, the 2nd, dynamic service process model case safe policy configurations device is used to provide the security strategy configuration of business process model example in service.
8. safe business course management system as claimed in claim 6, it is characterized in that, described text services process model file security mapping submodule is used to provide the security strategy at different operating system to detect and mapping, it comprises two parts at least, the one, the security configuration detecting device of OS Type, the type and the security configuration method thereof that are used for the detecting operation system, the 2nd, operating system security policy mappings device, be used for the testing result according to the security configuration detecting device of OS Type, configuration pin is to the security strategy of the business process model of different operating system.
9. safe business course management system as claimed in claim 6, it is characterized in that, described data streaming service process model file security mapping submodule is used to provide the security strategy at the disparate databases system to detect and mapping, it comprises two parts at least, the one, the security configuration detecting device of Database Systems type, the type and the security configuration method thereof that are used for judgment data storehouse system, the 2nd, data management system security strategy mapper, be used for the testing result according to the security configuration detecting device of type of database, configuration pin is to the security strategy of the business process model of disparate databases system.
10. safe business course management system as claimed in claim 6, it is characterized in that, described business process model running example regulator module comprises three parts at least, the one, the safe submodule modulator of business procedure engine, the 2nd, the data output analyzer of safety detection submodule, the 3rd, the modulator of business procedure engine
Wherein the safe submodule modulator of business procedure engine is used to regulate business procedure executor data detector and business procedure execution result detector parameters; The data output analyzer of safety detection submodule is used for detecting business process model and carries out whether there are potential risks; The modulator of business procedure engine is used to control business process model driven element module, shields risky executor, data, perhaps carries out rollback to unusual execution result occurring.
CN200810117314.4A 2008-07-29 2008-07-29 Safe business course management system Expired - Fee Related CN100580683C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810117314.4A CN100580683C (en) 2008-07-29 2008-07-29 Safe business course management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810117314.4A CN100580683C (en) 2008-07-29 2008-07-29 Safe business course management system

Publications (2)

Publication Number Publication Date
CN101329708A true CN101329708A (en) 2008-12-24
CN100580683C CN100580683C (en) 2010-01-13

Family

ID=40205514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810117314.4A Expired - Fee Related CN100580683C (en) 2008-07-29 2008-07-29 Safe business course management system

Country Status (1)

Country Link
CN (1) CN100580683C (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872391A (en) * 2009-04-23 2010-10-27 盛大计算机(上海)有限公司 Safety protection system based on three-ring system
CN103020512A (en) * 2012-11-26 2013-04-03 清华大学 Realization method and control system for safe control flow of system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872391A (en) * 2009-04-23 2010-10-27 盛大计算机(上海)有限公司 Safety protection system based on three-ring system
CN103020512A (en) * 2012-11-26 2013-04-03 清华大学 Realization method and control system for safe control flow of system
CN103020512B (en) * 2012-11-26 2015-03-04 清华大学 Realization method and control system for safe control flow of system

Also Published As

Publication number Publication date
CN100580683C (en) 2010-01-13

Similar Documents

Publication Publication Date Title
US20020174369A1 (en) Trusted computer system
CN101923678A (en) Data security protection method of enterprise management software
CN102144193B (en) Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
Song et al. An analysis of technical security control requirements for digital I&C systems in nuclear power plants
Okafor et al. Sok: Analysis of software supply chain security by establishing secure design properties
CN102486819B (en) A kind of hardened system
CN101540704B (en) Unreliable DBMS malicious intrusion detection system and method
CN103970540A (en) Method and device for safely calling key function
CN101330383B (en) Credible system for monitoring network resource based on user identification and action
Isohara et al. Lsm-based secure system monitoring using kernel protection schemes
Chen et al. Provenance cloud security auditing system based on log analysis
CN100580683C (en) Safe business course management system
Zeleznik Security design in distributed computing applications
KR102192232B1 (en) System for providing verification and guide line of cyber security based on block chain
CN103051608B (en) A kind of method and apparatus of movable equipment access monitoring
Rathod et al. Database intrusion detection by transaction signature
Ogale et al. Identifying security spots for data integrity
Al-Shorafat Security in software engineering requirement
Son et al. Development of the framework for quantitative cyber risk assessment in nuclear facilities
Georgiou et al. A security policy for cloud providers
Liu et al. An improved blp model with response blind area eliminated
Kornecki et al. Availability assessment of embedded systems with security vulnerabilities
Sun et al. Construction of situation assessment indicator system based on latitude and longitude lines of information security
Lee et al. A Conceptual Framework for Securing Digital I&C Systems in Nuclear Power Plants
Tellabi et al. Safety, Cybersecurity and Interoperability of Modern Nuclear Power Plants

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100113

Termination date: 20180729

CF01 Termination of patent right due to non-payment of annual fee