Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for monitoring operating system data integrity

A data integrity and operating system technology, applied in digital data protection, electrical digital data processing, special data processing applications, etc., can solve problems such as insufficient content, insufficient fine-grainedness, and inability to actively generate easy-to-read reports.

Inactive Publication Date: 2018-06-08
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its main disadvantage is that the content that can be monitored is not comprehensive enough, the granularity is not enough, and it cannot actively generate easy-to-read reports, etc.
Unable to achieve fine and precise monitoring and analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring operating system data integrity
  • Method and system for monitoring operating system data integrity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the following will briefly introduce the accompanying drawings that need to be used in the embodiments. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention. For Those of ordinary skill in the art can also obtain other drawings based on these drawings without making creative efforts.

[0026] The present invention can be applied to Linux operating system, Unix operating system and K-UX operating system (K-UX operating system is a key application host operating system independently developed by Inspur). In the present invention, K1 is a key application host independently developed by Inspur, and MD5 is a hash function widely used in the field of computer security to provide data integrity protection.

[0027] Based on the above, on the one hand, the embodiment of the present invention provides a method fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for monitoring operating system data integrity. According to the method, an encrypted database is created for a current system file, a configuration file and a policy file are checked, system integrity checking is executed, initial state data is created for the state of the current system file and saved into the database, a system integrity report is viewed, an integrity checking result is viewed, the policy file is updated, a text tool is used to modify the policy file, and update is synchronized to the database. Through the method and the system,active monitoring, security enhancement and monitoring and protection of data integrity are realized, and the function integrity and availability of the system are improved.

Description

technical field [0001] The invention relates to the technical field of data monitoring, in particular to a method and system for monitoring data integrity of an operating system. Background technique [0002] At present, manufacturers in the field of key application mainframes include Oracle, International Business Machines Corporation, Inspur, etc., and they each have their own operating systems running on minicomputers. The application fields of these key application hosts are very wide, including banking, telecommunications, transportation, energy and other fields. They often play a key role in their application scenarios. In addition to eliminating the possibility of device downtime, it is very important to strengthen the security of the host and prevent hacking. Among them, it is very necessary to ensure the integrity and consistency of system files, avoid tampering, and conduct real-time and regular monitoring at the same time. Only when the integrity of the data is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/30G06F21/60G06F21/62G06F21/64G06F17/30
CPCG06F11/3003G06F11/302G06F11/3089G06F16/2365G06F21/602G06F21/6218G06F21/64G06F2221/2107G06F2221/2151
Inventor 杜国峰
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products