Operating System Security Protection Methods
An operating system and security protection technology, applied in computer security devices, platform integrity maintenance, instruments, etc., can solve problems such as affecting system performance, inability to perform normal functions, and complex access control policy management.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0038] Embodiment 1 is that the subject performs a write operation on the object:
[0039] Taking the linux operating system as an example, the LSM module of the kernel is extended, and a mandatory access control module based on trust status is introduced. When the subject (process) performs a write operation on the object (file) on the system, the kernel first obtains the trust of the subject State, then, obtain the trust state of the object, if the subject (process) is in an untrusted state, and the object (file) is in a strongly trusted state, writing is prohibited; in other cases, writing is allowed.
Embodiment 2
[0040] Example 2 Perform delete operations on objects for the subject:
[0041]When the subject (process) deletes the object (file) in the system, the kernel first obtains the trust status of the subject, and then obtains the trust status of the object. If the subject (process) is in an untrusted state, the object (file) is strong In trusted status, deletion is prohibited; in other cases, deletion is allowed.
Embodiment 3
[0042] Embodiment 3 is that the subject performs modification operations on the object:
[0043] When a subject (process) modifies an object (file) in the system, the kernel first obtains the trust status of the subject, and then obtains the trust status of the object, no matter what state the object is in, if and only if the subject is strongly In the letter state, the operation is allowed, otherwise, the operation is prohibited.
[0044] Processes and files in an untrusted state are not necessarily destructive, and some may be friendly, and, during system use, users may need to install new software, if these programs are treated as files in an untrusted state , it may not run normally and affect the availability of the system. According to the control rules, the code in the untrusted trust state derives the process in the untrusted trust state, and the parent process in the untrusted trust state derives the child process in the untrusted trust state. Although the processes ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com