Method for ensuring system safety for window operating system

A Windows operating system and system security technology, applied in the field of ensuring system security to achieve the effect of ensuring security

Inactive Publication Date: 2007-11-14
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The purpose of the present invention is to provide a method for ensuring system security in the Windows operating system, so as to solve the problem that the system security cannot be fundamentally guaranteed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for ensuring system safety for window operating system
  • Method for ensuring system safety for window operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The system monitoring program of the present invention can be applicable to the protection of the application software system of the Windows operating system (ie Windows NT, 2000, XP, etc., Windows98 is not applicable) with NT as the core. By monitoring the process creation of the system, the operating system is prohibited from running unauthorized programs or programs infected by viruses, so as to ensure the security of the application software system.

[0034] Referring to Fig. 1, the basic structure of a computer has been shown in the figure, implements the method of the present invention with it. The processor of the computer is connected to the memory through the bus, and the input and output interfaces are also connected through the bus. The memory includes internal memory and external storage, and basic external storage such as hard disk; Connect to a network or other communication device.

[0035] Windows operating system programs and other executable programs ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method of ensuring the system security in the Windows operating system. The method is: spring the system monitoring program when the Windows operating system is preparing to found tenor for the executable program put forward a request of executing the program; the system monitoring program obtains the check file corresponding to the mentioned executable program. If there is no check file or the file is vacancy, confirm the mentioned executable program is illegal and terminate initializtion work of founding tenor. Otherwise judge whether the executable program is legal. If it's illegal, terminate initializtion work of founding tenor, or else found tenor as the normal flow.

Description

technical field [0001] The invention relates to computer security technology, in particular to a method for ensuring system security in a Windows operating system (Windows). Background technique [0002] With the popularity of computers and networks, security challenges are becoming increasingly severe. Viruses are one of the two most widely noticed security threats (the other being intruders), and the battle between their makers and their removers is intensifying. [0003] Viruses are attached to the head or tail of executable programs, or embedded in other ways. When calling a virus-infected program, the virus code is executed first, and then the original code of the program is executed. Specifically, the virus infection works as follows: the first line of code is a jump to the main virus program; the second line is a special flag used to determine whether the potential victim program has already been infected by this virus. When this program is invoked, control is imme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00
Inventor 陈峰夏泉源
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products