KR940015842A - System Restriction Method using Terminal Security Level - Google Patents
System Restriction Method using Terminal Security Level Download PDFInfo
- Publication number
- KR940015842A KR940015842A KR1019920026112A KR920026112A KR940015842A KR 940015842 A KR940015842 A KR 940015842A KR 1019920026112 A KR1019920026112 A KR 1019920026112A KR 920026112 A KR920026112 A KR 920026112A KR 940015842 A KR940015842 A KR 940015842A
- Authority
- KR
- South Korea
- Prior art keywords
- security level
- terminal
- user
- restriction method
- terminal security
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
본 발명은 단말기의 설치 환경에 따라 단말기에 보안등급 범주를 부여하고 이를 근거하여 보안등급 범위에 근거하여 컴퓨터 시스템의 사용을 제한할 수 있는 시스템 사용 제한 방법을 제공함에 있다. 상기 목적을 달성하기 위해 본 발명은 사용자가 사용자 식별자와 패스워드를 입력하여 확인 및 인증의 단계를 통과한 후 사용요구 보안등급을 입력하는 제1단계와 단말기 보안등급 범주를 검색하여 입력된 사용 요구본안등급과의 관계를 조사한 후 만족하면 시스템을 사용하게 해주는 제2단계에 의하여 수행된다.The present invention provides a method of limiting the use of a system that can assign a security level category to a terminal according to the installation environment of the terminal and restrict the use of a computer system based on the security level range based on the security level. In order to achieve the above object, the present invention provides a user request for inputting a first step in which a user enters a user request security level after entering a user identifier and a password and checking a terminal security level category. Investigate the relationship with the ratings and follow the second step to get the system to use if satisfied.
Description
본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음Since this is an open matter, no full text was included.
제1도는 본발명이 적용되는 하드웨어 시스템의 구성도 제2도는 본 발명에 의한 시스템 사용 제한방법의 소프트 웨어 구성도, 제3도는 제2도의 시스템 사용 제한 제어부와 단말기 보안 등급관리부의 세부 구성도.1 is a configuration diagram of a hardware system to which the present invention is applied. FIG. 2 is a software configuration diagram of a system usage restriction method according to the present invention. FIG. 3 is a detailed configuration diagram of a system usage restriction control unit and a terminal security level management unit of FIG.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019920026112A KR950012736B1 (en) | 1992-12-29 | 1992-12-29 | Terminal security level |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019920026112A KR950012736B1 (en) | 1992-12-29 | 1992-12-29 | Terminal security level |
Publications (2)
Publication Number | Publication Date |
---|---|
KR940015842A true KR940015842A (en) | 1994-07-21 |
KR950012736B1 KR950012736B1 (en) | 1995-10-20 |
Family
ID=19347251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1019920026112A KR950012736B1 (en) | 1992-12-29 | 1992-12-29 | Terminal security level |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR950012736B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000073432A (en) * | 1999-05-11 | 2000-12-05 | 박종문 | Method For Controlling Personal Computer with Studying Accomplishment |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7353188B2 (en) | 2000-06-30 | 2008-04-01 | Lg Electronics | Product selling system and method for operating the same |
KR101368122B1 (en) * | 2007-01-16 | 2014-02-27 | 삼성전자주식회사 | Method for security of computer using mobile communication terminal and computer therefor |
KR101721000B1 (en) * | 2015-06-18 | 2017-03-29 | 주식회사 에이치오텍 | Plant data transmission managing device and method |
-
1992
- 1992-12-29 KR KR1019920026112A patent/KR950012736B1/en not_active IP Right Cessation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000073432A (en) * | 1999-05-11 | 2000-12-05 | 박종문 | Method For Controlling Personal Computer with Studying Accomplishment |
Also Published As
Publication number | Publication date |
---|---|
KR950012736B1 (en) | 1995-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0547741A1 (en) | Security mechanism for a computer system | |
KR980004069A (en) | Program code distribution method and computer system | |
US7085925B2 (en) | Trust ratings in group credentials | |
US6088801A (en) | Managing the risk of executing a software process using a capabilities assessment and a policy | |
Karger | Limiting the damage potential of discretionary Trojan horses | |
KR860006731A (en) | How to protect data processing system and its system files | |
ES2128393T3 (en) | METHOD AND APPARATUS FOR COMPUTER SYSTEMS WITH INFORMATION DATA STRUCTURES FOR AUTHORIZATION PROGRAMS. | |
DE60006217D1 (en) | TECHNIQUES FOR GRANTING ACCESS THROUGH A CONTEXT BLOCK IN A DEVICE WITH A SMALL SPACE REQUIRED USING AN ENTRY POINT OBJECT | |
RU2004107491A (en) | USE OF POWERS FOR DISTRIBUTION OF DEVICE RESOURCES TO THE APPLICATION | |
KR970029148A (en) | Information access method | |
AU2001266590A1 (en) | Filtering a permission set using permission requests associated with a code assembly | |
ATE518179T1 (en) | LIMITED TOKEN SECURITY MODEL | |
FI981132A (en) | Preventing unauthorized use of the Service | |
CA2025434A1 (en) | Method for protecting against the unauthorized use of software in a computer network environment | |
DE60134986D1 (en) | SAFETY PROCEDURE BASED ON THE TEST | |
ATE511671T1 (en) | MINIMAL USER RIGHTS THROUGH RESTRICTED ACCESS PERMISSIONS | |
ATE367043T1 (en) | METHOD FOR AUTHENTICATING A USER WHEN ACCESSING A SERVICE OF A SERVICE PROVIDER | |
US6253251B1 (en) | Information handling system, method, and article of manufacture including integration of object security service authorization with a distributed computing environment | |
KR940015842A (en) | System Restriction Method using Terminal Security Level | |
CN108830075A (en) | A kind of application program management-control method of SSR centralized management platform | |
Jones et al. | The enforcement of security policies for computation | |
Paans et al. | Surreptitious security violation in the MVS operating system | |
KR100209897B1 (en) | The bidirectional network securities | |
EP0426595A2 (en) | Method of permitting access of shared resources using user set definition to support affinity and surrogate user relations | |
KR100519697B1 (en) | Access Controlling Method for Access Controlling System using Identity-based |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
G160 | Decision to publish patent application | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 19980929 Year of fee payment: 4 |
|
LAPS | Lapse due to unpaid annual fee |