Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security guarantee method and system for Windows terminals based on auto white list

A terminal security and whitelist technology, applied in the field of information security, can solve problems such as privilege escalation, misappropriation, frequent upgrades, etc., to achieve the effect of prohibiting invisible Trojan horses, improving terminal security, and expanding the scope of application

Inactive Publication Date: 2010-02-17
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF0 Cites 72 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The biggest defect of this method is: based on the existing knowledge base to prevent, which leads to 1) the size of the knowledge base determines the ability to prevent known illegal objects; 2) there is a lag time window for the prevention of new variants; 3) Requires frequent upgrades and high maintenance costs
[0004] After realizing that the existing general-purpose terminal security products and technologies cannot guarantee sufficient terminal security, people changed the entry point for dealing with the problem, from listing the characteristics of illegal objects to listing the characteristics of legal software lists, that is, white list technology
The change in methodology does provide very useful help for personal terminal security, but the current whitelist technology still has the following shortcomings: 1) The whitelist requires manual configuration and management, which is more suitable for enterprises, but for ordinary users , it is difficult to define the whitelist by yourself in many cases; 2) Even if there is a whitelist, you can also copy the whitelist file and steal the user name and password of others to elevate the authority on the local terminal; 3) It cannot be effectively prevented Invisible Trojan without process, port or file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security guarantee method and system for Windows terminals based on auto white list
  • Security guarantee method and system for Windows terminals based on auto white list
  • Security guarantee method and system for Windows terminals based on auto white list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The core idea of ​​the present invention is to construct a Widows terminal security guarantee system based on an automatic whitelist, and the whitelist that the system relies on is automatically generated by the system by scanning the local hard disk during installation. After the system is successfully started, it captures the operation of the startup process of the kernel, and verifies whether the executable program that the process to be started depends on is completely consistent with the whitelist record, otherwise the startup operation is terminated; the privileged user can modify the whitelist through the remote or local management module. list information, but cannot directly modify or delete the whitelist file; in addition, the end user cannot force stop the system, and can only uninstall the system in safe mode after entering the correct PIN code (ie system ID number); new installation The system can continue to process the security alarm information left by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security guarantee system for Windows terminals based on an auto white list, comprising a white list module and a detection module connected with the white list module; the white list module is used for automatically creating and manually maintaining white list data information; and the detection module is used for detecting whether programs to be executed are legal or not. The invention can automatically generate a white list which is simple and easy for common users, guarantee the security of local files via the control of a server and also effectively prevent stealth Trojan.

Description

technical field [0001] The invention relates to the field of information security, and more particularly, to a Windows terminal security guarantee method and system based on an automatic white list. Background technique [0002] With the development of network and information technology, the dependence of modern social life on information technology continues to increase. Therefore, whether it is an enterprise, an organization or an individual, the security requirements for computer terminals are getting higher and higher. However, the technical level of virus, Trojan horse and malicious software production is constantly improving, resulting in the terminal security protection for Microsoft Windows-like operating systems is always in a passive state. [0003] The current working mode of antivirus, anti-Trojan and anti-malware software is to capture samples, analyze features, update feature database, analyze feature vectors, finally identify illegal target objects, and perfor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/10
Inventor 戚建淮曾广良杨勇飞刘云伍立华
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products