CN110413372A - A kind of web services middleware extended method for supporting service security to mark - Google Patents

A kind of web services middleware extended method for supporting service security to mark Download PDF

Info

Publication number
CN110413372A
CN110413372A CN201910536187.XA CN201910536187A CN110413372A CN 110413372 A CN110413372 A CN 110413372A CN 201910536187 A CN201910536187 A CN 201910536187A CN 110413372 A CN110413372 A CN 110413372A
Authority
CN
China
Prior art keywords
service
network resource
mark
user
middleware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910536187.XA
Other languages
Chinese (zh)
Inventor
于海波
刘杰
赵雨虹
刘坤颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201910536187.XA priority Critical patent/CN110413372A/en
Publication of CN110413372A publication Critical patent/CN110413372A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of web services middleware extended methods for supporting service security to mark.The method include the steps that 1) configure the service security label of web services middleware, the service security attribute of Web service middleware is marked;The service security label of Web service middleware includes security level and class of service;2) when web services middleware receives the network resource request of user, the service security label of the user and the service security label of the requested Internet resources of the user are identified;3) the service security label of the service security label of the user and requested Internet resources is checked, passes through if checked, allows to execute the network resource request and return to corresponding Internet resources;Otherwise, refusal executes the network resource request.4) service security label is added for response message.The present invention can efficiently carry out fine granularity control and audit to user access activity.

Description

Web service middleware extension method supporting business safety mark
Technical Field
The invention relates to a web service middleware supporting a business security label, which provides functions of configuration, generation and identification aiming at the business security label, supports access control and audit based on the business security label, and belongs to the field of network space security.
Background
At present, when a user accesses a Web service, resource access control is mainly implemented according to user identity and network resource information, a traditional Web service middleware does not support fine-grained management and control on related access behaviors according to service security attributes of the user or network resources, functions such as fine-grained access control need to be implemented in an application program, the security attributes of the user need to be managed in the application program, development cost of each application is increased, and flexibility of access control implementation is also reduced.
Disclosure of Invention
In a network system using a business safety mark, aiming at the problems that the traditional Web service middleware does not support the fine-grained management and control of network resources based on the business safety attribute, and the like, the invention aims to provide a Web service middleware expansion method supporting the business safety mark, which supports the middleware to configure the business safety mark of the middleware; the service security label for identifying the user and the service security label for requesting the resource are supported, so that the user can only access the corresponding network resource according to the service security attribute of the user; and the method supports adding corresponding service safety marks to the application layer protocol messages according to the service safety marks of the requested resources, and supports other related systems to correctly understand the service safety properties of the resources according to the messages.
In order to achieve the above object, the present invention provides a method for extending a Web service middleware supporting a service security label, which comprises the following steps:
step 1: and configuring the business safety mark of the Web service middleware. And configuring a business safety mark of the Web service middleware, and marking the safety level, the business category and other business safety attributes of the Web service middleware. The service safety mark can be configured by management personnel, and can also be automatically configured by a configuration module after the service safety attribute information of the computing environment is acquired.
Step 2: identifying the service security label of the user and the network resource. When a user requests network resources, identifying a service security label of the user in the request, wherein the label identifies service security attributes such as security level, service category and the like of the user; and meanwhile, identifying a service security label of the network resource requested by the user, wherein the label identifies service security attributes such as security level, service category and the like of the network resource.
And step 3: and managing and controlling based on the service security label. Matching and checking the user service security mark and the network resource service security mark, and if the user service security mark and the network resource service security mark pass the checking, allowing the user request to be executed and returning the network resource; otherwise, the user request is denied.
And 4, step 4: and adding a service safety mark for the response message. When the network resource requested by the user is returned, the service security label of the resource is converted into the service security label of the response message through the label generating module (the converted response message contains the service security label), and the label is added into the extension field of the corresponding application layer protocol.
Preset information 1: the network resource (object) has a service security label indicating its security level, service type, operation control and other service security attributes.
Preset information 2: the access user has a service security label indicating the security level, service category and other service security attributes of the access user.
Fig. 1 shows a block diagram of an internal structure of a Web service middleware provided by the present invention, which includes: the system comprises a Web container module, a mark configuration module, a user mark identification module, a network resource mark identification module, a mark generation module and a management and control module.
The Web container module is used for receiving a user resource request, analyzing the request content and responding to the user network resource request; the mark configuration module is used for configuring a service safety mark for the web service middleware; the user mark identification module is used for identifying the service safety mark of the user in the web request; the network resource mark identification module identifies a service safety mark of the network resource; the mark generating module is used for converting the service security mark of the requested network resource into the service security mark of the response message and adding the mark into the extension field of the corresponding application layer protocol; the management and control module is used for controlling and auditing the network resource access behavior of the user.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a web service middleware supporting a business security mark, which supports the functions of configuration, generation and identification of the business security mark, supports the efficient fine-grained control and audit of user access behaviors based on the business security mark, and has the main advantages that:
1) the mark of the Web service middleware can be configured to indicate the ranges of security level, service category and the like of the network resources which are allowed to be processed by the Web service middleware;
2) performing fine-grained management and control or audit on user access behaviors by identifying service security marks of access users and network resources;
3) the addition of the service security label of the network resource to the response message can instruct other related systems to efficiently and directly understand the service security property of the resource according to the response message without resource data restoration.
Drawings
FIG. 1 is an architecture diagram of Web services middleware;
FIG. 2 is a flowchart of Web services middleware service security label identification;
FIG. 3 is a flow chart of Web service middleware management and control;
FIG. 4 is a flowchart of a Web services middleware service security label generation.
Detailed Description
The embodiments of the present invention will be described in conjunction with the accompanying drawings, and it should be understood that the embodiments described herein are only for the purpose of illustrating and explaining the present invention, and are not intended to limit the present invention.
Service security label definition:
the service security mark M is a multi-tuple containing a plurality of service security attributes, wherein M is equal to<C,G,F>. Wherein C is a security level; g is multiple service security attributes GiG ═ G1,g2,…gn},giThe service safety attributes can be service types, work groups, roles, environmental requirements and the like; f is an operation control attribute FjF ═ F1,f2,…fm},fjThe method can be used for operation attributes such as read-write control, printing control, burning control, copying control and the like.
The service security label of the network resource (object) is marked as M (r) ═ r<Cr,Gr,Fr>The service security label of the system object, user, etc. (subject) is denoted as m(s) ═ m<Cs,Gs>. There are two relationships between the subject tag m(s) and the network resource tag m (r): dominant versus incomparable. Marker M(s) dominating marker M (r) when Cs≥CrAnd isAnd M(s) ≧ M (r), meaning the subject has access to the object. If there is no dominance between M(s) and M (r), they are not comparable, and the subject does not have access to the object. If it is notAny subject should control attribute f according to the particular operation that the tag containsjAnd limiting the corresponding operation on the resource.
Preset information 1: the network resource (object) has a service security mark recorded as M (r) ═ r<Cr,Gr,Fr>And the service security attributes of the network are indicated, such as security level, service category, operation control and the like.
Preset information 2: service security label M (u) ═ of access user<Cu,Gu>And the service security attributes such as the security level, the service category and the like of the access user are indicated.
The embodiment of the invention is divided into 4 steps, namely label configuration, label identification, label generation and management and control.
Step 1: the business safety mark of the configuration Web service middleware (main body) is marked as M (o) ═ m<Co,Go>And the service security attributes such as the security level, the service category and the like of the middleware are indicated. The mark configuration module is called when the Web container is initialized to ensure that the business safety mark of the Web service middleware can be manually configured by a manager or the configuration module can acquire the business safety attribute of the environment where the business safety mark is positionedAnd automatically configuring after the sex information. The method comprises the following specific steps:
s101: after the Web service middleware is initialized, a Web container module, a mark configuration module, a user mark identification module, a network resource mark identification module, a mark generation module and a management and control module are loaded;
s102: if the administrator has configured the local configuration file, the mark configuration module reads the local configuration file, analyzes the business safety attribute information from the local configuration file, and configures the business safety mark M (o) of the web service middleware to which the business safety mark belongs.
S103: if the administrator does not configure the local configuration file, the mark configuration module automatically acquires the business safety attribute information of the computing environment, and configures the business safety mark M (o) of the web service middleware to which the mark configuration module belongs.
Step 2: a business security label is identified. The mark identification is composed of an access user mark identification module and a network resource mark identification module. A specific method for identifying a service security label m (u) of an access user and a service security label m (r) of a network resource is shown in fig. 2, and the specific steps include:
s201: and starting the Web service.
S202: after receiving the Web request, the Web container module calls a user mark identification module to acquire a service safety mark M (u) of an access user
S203: after receiving the Web request, the Web container calls a network resource mark identification module to obtain a service security mark M (r) of the network resource.
S204: and sending the marks M (u) and M (r) to a service security mark management and control module.
And step 3: and managing and controlling based on the service security label. The main function of the management and control is to perform matching check on the service security label m (u) of the access user and the service security label m (r) of the network resource in the request. If M (u) ≧ M (r), the check is passed, and the network resource is returned; otherwise, the request is denied. The specific method is shown in fig. 3, and comprises the following specific steps:
s301: the management and control module receives a service security label M (u) of an access user and a service security label M (r) of a network resource in a request;
s302: performing a match check on M (u) and M (r);
s303: if M (o) ≧ M (r) and M (u) ≧ M (r), the match check passes, allowing user access; otherwise, rejecting the access request;
s304: the management and control module records logs.
And 4, step 4: a response message service security label is generated. The tag generation module converts the service security tag m (r) of the requested network resource into the service security tag of the response message and adds the tag to the extension field of the corresponding application layer protocol. The specific method is shown in fig. 4, and comprises the following specific steps:
s401: the Web container calls a mark generation module;
s402: the tag generation module acquires a service security tag M (r) of the requested network resource;
s403: converting M (r) into a service safety mark of a response message, and adding the service safety mark into an extension field of an application layer protocol;
s404: the Web service middleware returns the response message to the user.
Although specific details of the invention, algorithms and figures are disclosed for illustrative purposes, these are intended to aid in the understanding of the contents of the invention and the implementation in accordance therewith, as will be appreciated by those skilled in the art: various substitutions, changes and modifications are possible without departing from the spirit and scope of the present invention and the appended claims. The invention should not be limited to the preferred embodiments and drawings disclosed herein, but rather should be defined only by the scope of the appended claims.

Claims (8)

1. A web service middleware extension method supporting business security marks comprises the following steps:
1) configuring a business safety mark of the Web service middleware, and marking the business safety attribute of the Web service middleware; the service safety mark of the Web service middleware comprises a safety level and a service type;
2) when receiving a network resource request of a user, the web service middleware identifies a service security label of the user and a service security label of the network resource requested by the user; the service security label of the user comprises the security level and the service type of the user, and the service security label of the network resource comprises the security level and the service type of the network resource;
3) matching check is carried out on the service security mark of the user and the service security mark of the requested network resource, if the check is passed, the network resource request is allowed to be executed, and the corresponding network resource is returned; otherwise, the network resource request is refused to be executed.
2. The method as claimed in claim 1, wherein in step 3), when the network resource is returned, the service security label of the returned network resource is converted into the service security label of the response message and added to the extension field of the corresponding application layer protocol.
3. A method according to claim 1 or 2, characterized in that the traffic security label of the network resource further comprises operation control information.
4. The method of claim 1, wherein the business security label of the web service middleware is configured by a manager, or is automatically configured after the configuration module acquires the business security attribute information of the computing environment where the web service middleware is located.
5. A Web service middleware supporting a business security mark is characterized by comprising a Web container module, a mark configuration module, a user mark identification module, a network resource mark identification module, a mark generation module and a management and control module; wherein,
the mark configuration module is used for configuring the business safety mark of the web service middleware; the service safety mark of the Web service middleware comprises a safety level and a service type;
the user mark identification module is used for identifying the service safety mark of the user; the service security mark of the user comprises the security level and the service category of the user;
the network resource mark identification module is used for identifying a service safety mark of the network resource; the service security label of the network resource comprises the security level and the service category of the network resource;
the Web container module is used for receiving the network resource request of the user, analyzing the network resource request content and responding to the network resource request of the user;
the mark generating module is used for converting the service safety mark of the requested network resource into the service safety mark of the response message and adding the service safety mark into the extension field of the corresponding application layer protocol;
the management and control module is used for matching and checking the service security mark of the user and the service security mark of the requested network resource, and if the check is passed, the management and control module allows the network resource request to be executed and returns the corresponding network resource; otherwise, the network resource request is refused to be executed.
6. The Web services middleware of claim 5, wherein when returning a network resource, the returned traffic security label of the network resource is converted into the traffic security label of the response message and added to the extension field of the corresponding application layer protocol.
7. The Web services middleware of claim 5, wherein the traffic security label for the network resource further includes operational control information.
8. The Web services middleware of claim 5 in which the configuration module automatically configures the business security label of the Web services middleware after obtaining the business security attribute information of the computing environment in which the Web services middleware resides.
CN201910536187.XA 2019-06-20 2019-06-20 A kind of web services middleware extended method for supporting service security to mark Pending CN110413372A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910536187.XA CN110413372A (en) 2019-06-20 2019-06-20 A kind of web services middleware extended method for supporting service security to mark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910536187.XA CN110413372A (en) 2019-06-20 2019-06-20 A kind of web services middleware extended method for supporting service security to mark

Publications (1)

Publication Number Publication Date
CN110413372A true CN110413372A (en) 2019-11-05

Family

ID=68359405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910536187.XA Pending CN110413372A (en) 2019-06-20 2019-06-20 A kind of web services middleware extended method for supporting service security to mark

Country Status (1)

Country Link
CN (1) CN110413372A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114789A1 (en) * 2003-11-24 2005-05-26 Hung-Yang Chang Method and system for collaborative web browsing
CN102355657A (en) * 2011-06-28 2012-02-15 成都市华为赛门铁克科技有限公司 Service access control method, device and system
CN102413198A (en) * 2011-09-30 2012-04-11 山东中创软件工程股份有限公司 Security-marker-based access control method and related system
CN102495989A (en) * 2011-12-21 2012-06-13 北京诺思恒信科技有限公司 Subject-label-based access control method and system
CN103248485A (en) * 2013-04-24 2013-08-14 中国南方电网有限责任公司 Security label-based power secondary system access control method and system
CN103974248A (en) * 2013-01-24 2014-08-06 中国移动通信集团公司 Terminal security protection method, device and system in ability open system
US20140281501A1 (en) * 2013-03-13 2014-09-18 Samsung Electronics Co., Ltd. Application access control method and electronic apparatus implementing the same
CN105991626A (en) * 2015-03-06 2016-10-05 小米科技有限责任公司 Network access method and network access device
CN108183915A (en) * 2018-01-15 2018-06-19 中国科学院信息工程研究所 It is a kind of to realize frame towards the safety label of high safety grade business and application demand
CN108520177A (en) * 2018-04-11 2018-09-11 厦门美图移动科技有限公司 Application software management method and device, mobile terminal and readable storage medium
CN109656884A (en) * 2018-12-14 2019-04-19 郑州云海信息技术有限公司 A kind of method and device accessing file

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114789A1 (en) * 2003-11-24 2005-05-26 Hung-Yang Chang Method and system for collaborative web browsing
CN102355657A (en) * 2011-06-28 2012-02-15 成都市华为赛门铁克科技有限公司 Service access control method, device and system
CN102413198A (en) * 2011-09-30 2012-04-11 山东中创软件工程股份有限公司 Security-marker-based access control method and related system
CN102495989A (en) * 2011-12-21 2012-06-13 北京诺思恒信科技有限公司 Subject-label-based access control method and system
CN103974248A (en) * 2013-01-24 2014-08-06 中国移动通信集团公司 Terminal security protection method, device and system in ability open system
US20140281501A1 (en) * 2013-03-13 2014-09-18 Samsung Electronics Co., Ltd. Application access control method and electronic apparatus implementing the same
CN103248485A (en) * 2013-04-24 2013-08-14 中国南方电网有限责任公司 Security label-based power secondary system access control method and system
CN105991626A (en) * 2015-03-06 2016-10-05 小米科技有限责任公司 Network access method and network access device
CN108183915A (en) * 2018-01-15 2018-06-19 中国科学院信息工程研究所 It is a kind of to realize frame towards the safety label of high safety grade business and application demand
CN108520177A (en) * 2018-04-11 2018-09-11 厦门美图移动科技有限公司 Application software management method and device, mobile terminal and readable storage medium
CN109656884A (en) * 2018-12-14 2019-04-19 郑州云海信息技术有限公司 A kind of method and device accessing file

Similar Documents

Publication Publication Date Title
RU2598324C2 (en) Means of controlling access to online service using conventional catalogue features
US9077609B2 (en) Scalable reusable scanning of application networks/systems
US8745223B2 (en) System and method of distributed license management
US10331878B2 (en) Unified user identification with automatic mapping and database absence handling
CN110858833B (en) Access control policy configuration method, device and system and storage medium
US7886053B1 (en) Self-management of access control policy
US9001364B2 (en) Management system, image forming apparatus, management system control method, and image forming apparatus control method for migration of setting values of an application that operates in the image forimng apparatus
US20170041504A1 (en) Service providing system, information processing apparatus, program, and method for generating service usage information
JP6101407B2 (en) Mobile device connection control for synchronization and remote data access
CN111800408B (en) Policy configuration device, security policy configuration method of terminal, and readable storage medium
JP2008242826A (en) Information processing system and control method and program of information processing system
CN113761552B (en) Access control method, device, system, server and storage medium
CN110427759B (en) Network resource browsing control method and system supporting service security mark
US20200026528A1 (en) Message based discovery and management of applications
JP2020181228A (en) Information processing device and information processing program
US20210359998A1 (en) Access control for private channels in a channel-based discussion system
CN112579694B (en) Digital resource processing method, device, storage medium and equipment
US20200097233A1 (en) Information processing system, information processing apparatus, and non-transitory computer readable medium
CN110413372A (en) A kind of web services middleware extended method for supporting service security to mark
CN115208689A (en) Access control method, device and equipment based on zero trust
CN113691575B (en) Communication method, device and system
CN114462016A (en) Resource request method, device and system
CN109492376B (en) Device access authority control method and device and bastion machine
KR20110063025A (en) System for managing service user information, method for acquiring and managing of service user information
CN106445410B (en) Storage device sharing method and system and intelligent gateway with system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191105