KR940015842A - System Restriction Method using Terminal Security Level - Google Patents

System Restriction Method using Terminal Security Level Download PDF

Info

Publication number
KR940015842A
KR940015842A KR1019920026112A KR920026112A KR940015842A KR 940015842 A KR940015842 A KR 940015842A KR 1019920026112 A KR1019920026112 A KR 1019920026112A KR 920026112 A KR920026112 A KR 920026112A KR 940015842 A KR940015842 A KR 940015842A
Authority
KR
South Korea
Prior art keywords
security level
terminal
user
restriction method
terminal security
Prior art date
Application number
KR1019920026112A
Other languages
Korean (ko)
Other versions
KR950012736B1 (en
Inventor
윤이중
홍주영
김석우
김대호
Original Assignee
양승택
재단법인 한국전자통신연구소
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 양승택, 재단법인 한국전자통신연구소 filed Critical 양승택
Priority to KR1019920026112A priority Critical patent/KR950012736B1/en
Publication of KR940015842A publication Critical patent/KR940015842A/en
Application granted granted Critical
Publication of KR950012736B1 publication Critical patent/KR950012736B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

본 발명은 단말기의 설치 환경에 따라 단말기에 보안등급 범주를 부여하고 이를 근거하여 보안등급 범위에 근거하여 컴퓨터 시스템의 사용을 제한할 수 있는 시스템 사용 제한 방법을 제공함에 있다. 상기 목적을 달성하기 위해 본 발명은 사용자가 사용자 식별자와 패스워드를 입력하여 확인 및 인증의 단계를 통과한 후 사용요구 보안등급을 입력하는 제1단계와 단말기 보안등급 범주를 검색하여 입력된 사용 요구본안등급과의 관계를 조사한 후 만족하면 시스템을 사용하게 해주는 제2단계에 의하여 수행된다.The present invention provides a method of limiting the use of a system that can assign a security level category to a terminal according to the installation environment of the terminal and restrict the use of a computer system based on the security level range based on the security level. In order to achieve the above object, the present invention provides a user request for inputting a first step in which a user enters a user request security level after entering a user identifier and a password and checking a terminal security level category. Investigate the relationship with the ratings and follow the second step to get the system to use if satisfied.

Description

단말기 보안등급을 이용한 시스템 사용제한 방법System Restriction Method using Terminal Security Level

본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음Since this is an open matter, no full text was included.

제1도는 본발명이 적용되는 하드웨어 시스템의 구성도 제2도는 본 발명에 의한 시스템 사용 제한방법의 소프트 웨어 구성도, 제3도는 제2도의 시스템 사용 제한 제어부와 단말기 보안 등급관리부의 세부 구성도.1 is a configuration diagram of a hardware system to which the present invention is applied. FIG. 2 is a software configuration diagram of a system usage restriction method according to the present invention. FIG. 3 is a detailed configuration diagram of a system usage restriction control unit and a terminal security level management unit of FIG.

Claims (2)

컴퓨터 시스템의 단말기 보안등급을 이용한 시스템 사용제한 방법에 있어서, 시스템 사용을 위해 사용자 식별자, 패스워드를 입력하고 이를 식별 인증하고 사용 요구 보안등급을 수행하는 1단계(21,22,23), 단말기 보안 등급 범주를 검사하고 입력된 사용 요구 보안등급과의 관계를 조사하여 시스템 사용허가 여부를 결정하는 2단계에 의해 수행되는 것을 특징으로 하는 단말기 보안등급을 이용한 시스템 사용 제한방법.In the system usage restriction method using the terminal security level of a computer system, the first stage (21, 22, 23) of entering a user identifier, a password, identifying and authenticating the user and performing a use request security level for use of the system, a terminal security level Method of limiting the use of the system using the terminal security level characterized in that performed by the second step of determining the system license or not by examining the category and examining the relationship with the entered use request security level. 제1항에 있어서, 시스템 사용 허가의 만족여부는 사용자가 입력한 사용 요구 보안등급이 단말기 최대 보안등급 보다 낮거나 같고 또한 단말기 최소보안 등급보다 크거나 같아야 하는 조건에 따라 결정되는 것을 특징으로 하는 단말기 보안등급을 이용한 시스템 사용 제한방법.The terminal of claim 1, wherein the satisfaction of the system permission is determined according to a condition that the user-required security level entered by the user is lower than or equal to the terminal maximum security level and greater than or equal to the terminal minimum security level. How to restrict system use using security level. ※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.※ Note: The disclosure is based on the initial application.
KR1019920026112A 1992-12-29 1992-12-29 Terminal security level KR950012736B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1019920026112A KR950012736B1 (en) 1992-12-29 1992-12-29 Terminal security level

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1019920026112A KR950012736B1 (en) 1992-12-29 1992-12-29 Terminal security level

Publications (2)

Publication Number Publication Date
KR940015842A true KR940015842A (en) 1994-07-21
KR950012736B1 KR950012736B1 (en) 1995-10-20

Family

ID=19347251

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1019920026112A KR950012736B1 (en) 1992-12-29 1992-12-29 Terminal security level

Country Status (1)

Country Link
KR (1) KR950012736B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000073432A (en) * 1999-05-11 2000-12-05 박종문 Method For Controlling Personal Computer with Studying Accomplishment

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7353188B2 (en) 2000-06-30 2008-04-01 Lg Electronics Product selling system and method for operating the same
KR101368122B1 (en) * 2007-01-16 2014-02-27 삼성전자주식회사 Method for security of computer using mobile communication terminal and computer therefor
KR101721000B1 (en) * 2015-06-18 2017-03-29 주식회사 에이치오텍 Plant data transmission managing device and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000073432A (en) * 1999-05-11 2000-12-05 박종문 Method For Controlling Personal Computer with Studying Accomplishment

Also Published As

Publication number Publication date
KR950012736B1 (en) 1995-10-20

Similar Documents

Publication Publication Date Title
EP0547741A1 (en) Security mechanism for a computer system
KR980004069A (en) Program code distribution method and computer system
US7085925B2 (en) Trust ratings in group credentials
US6088801A (en) Managing the risk of executing a software process using a capabilities assessment and a policy
Karger Limiting the damage potential of discretionary Trojan horses
KR860006731A (en) How to protect data processing system and its system files
ES2128393T3 (en) METHOD AND APPARATUS FOR COMPUTER SYSTEMS WITH INFORMATION DATA STRUCTURES FOR AUTHORIZATION PROGRAMS.
DE60006217D1 (en) TECHNIQUES FOR GRANTING ACCESS THROUGH A CONTEXT BLOCK IN A DEVICE WITH A SMALL SPACE REQUIRED USING AN ENTRY POINT OBJECT
RU2004107491A (en) USE OF POWERS FOR DISTRIBUTION OF DEVICE RESOURCES TO THE APPLICATION
KR970029148A (en) Information access method
AU2001266590A1 (en) Filtering a permission set using permission requests associated with a code assembly
ATE518179T1 (en) LIMITED TOKEN SECURITY MODEL
FI981132A (en) Preventing unauthorized use of the Service
CA2025434A1 (en) Method for protecting against the unauthorized use of software in a computer network environment
DE60134986D1 (en) SAFETY PROCEDURE BASED ON THE TEST
ATE511671T1 (en) MINIMAL USER RIGHTS THROUGH RESTRICTED ACCESS PERMISSIONS
ATE367043T1 (en) METHOD FOR AUTHENTICATING A USER WHEN ACCESSING A SERVICE OF A SERVICE PROVIDER
US6253251B1 (en) Information handling system, method, and article of manufacture including integration of object security service authorization with a distributed computing environment
KR940015842A (en) System Restriction Method using Terminal Security Level
CN108830075A (en) A kind of application program management-control method of SSR centralized management platform
Jones et al. The enforcement of security policies for computation
Paans et al. Surreptitious security violation in the MVS operating system
KR100209897B1 (en) The bidirectional network securities
EP0426595A2 (en) Method of permitting access of shared resources using user set definition to support affinity and surrogate user relations
KR100519697B1 (en) Access Controlling Method for Access Controlling System using Identity-based

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
G160 Decision to publish patent application
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 19980929

Year of fee payment: 4

LAPS Lapse due to unpaid annual fee