Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for constructing a trusted software whitelist

A construction method and whitelist technology, applied in the field of computer security, can solve problems that affect the usability of the trusted software whitelist mechanism; and other issues, to achieve the effect of improving the level and ability of network security prevention, reducing professional knowledge and skills requirements, and improving ease of use.

Inactive Publication Date: 2018-12-11
北京广成同泰科技有限公司
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The difficulty that affects the ease of use of the trusted software whitelist mechanism lies in the management of trusted software whitelist policies. It is difficult for policies to cover all software programs that Internet users may use
If it is difficult for users to operate, maintain and manage the trusted software whitelist policy, it will affect their confidence in using the trusted software whitelist mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for constructing a trusted software whitelist

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0033] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meaning as commonly understood by those of ordinary skill in the art to which this invention belongs. It should also be understood that terms, such as those defined in commonly used dictionaries, should be understood to have meanings consistent with the meanings in the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for constructing a trusted software whitelist. The method comprises: automatically synchronously downloading software from a plurality of software downloading sites according to a job scheduling task; making a trusted judgment on the downloaded software, and establishing a trusted software whitelist according to the trusted software. The trusted software whitelist construction method of the invention automatically obtains an executable program in the Internet range, so as to maximize the coverage of software programs that Internet users may use, by using the software trustworthiness analysis tool to obtain the software program trustworthiness analysis of obtained software programme, a corresponding trusted software whitelist is generated and provided for Internet users to download and use, which can greatly reduce the professional knowledge and skill requirements of users, improve the usability of the trusted software whitelist mechanism, thus promotingthe application of the trusted software whitelist mechanism, and improving the level and ability of network security prevention.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method for building a trusted software whitelist. Background technique [0002] Trusted software whitelist is a software invocation and execution control mechanism based on the unique characteristics of software executable code. For example, an executable program list is generated based on the hash value of the executable code file. Only the executable programs in this list can Called and executed by the system, the trusted software whitelist mechanism has good security protection capabilities and efficiency, and can be used for the following security goals: 1) Prevention of malicious codes and ransomware, since malicious codes and ransomware do not belong to user-defined Executable programs are allowed, so they will not appear in the trusted software whitelist policy list, so the system will not call and run malicious code and ransomware, including known and unknown; 2) It can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/51
CPCG06F21/51H04L63/0428H04L63/20H04L67/06H04L67/34
Inventor 李晓勇郭煜邓霄霄贺丽红
Owner 北京广成同泰科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products