Method for establishing computer information security protection capable of judging security of computer operation request according to associative relation of computing system operation request
A technology for operating requests and association relationships, applied in computer security devices, computing, platform integrity maintenance, etc., to achieve the effect of defending against unknown malicious codes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
example 1
[0040] Example 1: Assuming that an Office document contains malicious script code, which can infect executable programs, the blocking logic is as follows:
[0041] When the kernel of the operating system intercepts a write operation request for the content of the executable file, according to the request initiator attribute item in the operation request attribute, it can be known that the request is issued by the VBA script engine, in order to find the association relationship of the current operation request , Create a virtual node of the current operation under the VBA script engine node of the known association structure of the computer operation request, and trace back the association relationship of the current operation. The final result of the traceback is that the request to open an Office document triggers the current operation request , take the current operation rules, Office is a common application, the request is triggered by the user, Office requests the VBA scrip...
example 2
[0042] Example 2.: Assuming that the system allows the hacker program to run, the hacker directly calls the operation of a certain system through the hard address
[0043] When a hard address operation request for the memory operation request space is intercepted, a virtual node is constructed according to the attribute of the operation request, and the request is determined to be initiated by the operating system kernel, and its association relationship is traced back, and it is found that the memory hard address operation of the kernel is called by the application; The request association rules of the current memory operation request are matched with the defined memory risk operation request association rules, and the match is successful: 1. Operations that do not call for memory requests are dangerous operations; 2. It is dangerous to remotely perform hard address operations on memory; the result: Dangerous operation request. Block memory operations, delete virtual nodes in...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com