Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety mobile office method based on WMI software whitelist mechanism

A technology of whitelisting and software installation, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as poor security

Active Publication Date: 2015-04-29
BEIJING UNIV OF TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can control the installation of application programs, it only judges the installation programs, and does not process the software programs that do not need to be installed but are directly run
At the same time, the black and white list only contains the application name and version number, therefore, malicious programs that modify the application name and version number can bypass the white list, which is less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety mobile office method based on WMI software whitelist mechanism
  • Safety mobile office method based on WMI software whitelist mechanism
  • Safety mobile office method based on WMI software whitelist mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the above objects, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the embodiments of the present invention will be described completely and in detail below in conjunction with the accompanying drawings of the present invention. The embodiments described below are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts are within the protection scope of the present invention.

[0045] The mobile security office method based on the WMI software whitelist mechanism is mainly to monitor the installation and operation of the software to ensure that the software that users can install and run is downloaded from the server and is in the software whitelist. A monitoring program that detects startup of installers and executable pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety mobile office method based on a WMI software whitelist mechanism and belongs to the technical field of terminal equipment safety office. The method is characterized in that the various attributes, serving as software attribute parameters, of software and setting number form an application software whitelist, system PE files during initial system installation of a computer form a system software whitelist, and the application software whitelist and the system software whitelist jointly form a global software whitelist; the global software whitelist is divided into the software whitelist of each department according to the requirements of the corresponding department, and the software whitelist is issued to the safety mobile office terminals of department staff; a user transmits a software request to a server end through an authentication code formed by a department identification code and a staff PIN code; a monitoring program is built on the basis of WMI on the corresponding safety mobile office terminal, the monitoring program performs starting detection on software installation and operation, comparison with the whitelist is performed, and installation and operation are allowed after the comparison is passed. Compared with existing application program mounting control methods, the method is good in stability, safety and compatibility, and mounting efficiency and operation efficiency are increased.

Description

technical field [0001] The invention belongs to the technical field of terminal equipment mobile office security, and relates to a mobile security office method based on a WMI software whitelist mechanism. technical background [0002] For general enterprises and institutions, the software used in daily life is closely related to the nature of work. Some specific enterprises and institutions, for security and confidentiality, only allow employees to use some specific software, which is convenient for unified management. The traditional way to control the operation of software is to prohibit employees from installing some irrelevant software. But in reality, employees will secretly download some chatting, stock trading, downloading software, etc. For the management, these software are "harmful" and unsafe. For the mobile security office system, it is particularly important to uniformly manage the software used by employees and only allow employees to run some specific softw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/52
CPCG06F21/51G06F21/53G06F2221/033G06F2221/2149
Inventor 张建标雷声威阎林刘燕辉公备
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products