Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal security protection method and system based on uefi and winpe

A terminal security and operating system technology, which is applied in the field of terminal security protection and systems based on UEFI and WinPE, can solve the problems that security software cannot be effectively cleared, and the kernel-level malicious code protection function is not perfect, so as to ensure safety, reliability and security , to ensure the effect of protection

Active Publication Date: 2020-07-24
SHANGHAI JIAOTONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, it is far from enough to rely solely on the antivirus software running on the operating system to prevent malicious codes. Typical problems include: some malicious codes will be loaded into the system before security software, giving priority to control the system; some malicious codes are parasitic in the core In service, security software cannot effectively clear it
Based on the unified extensible interface, this method realizes the malicious code protection function loaded before the operating system, but the detection and removal of malicious code, especially the protection function of the currently popular kernel-level malicious code is not perfect enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal security protection method and system based on uefi and winpe
  • Terminal security protection method and system based on uefi and winpe
  • Terminal security protection method and system based on uefi and winpe

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0066] Such as figure 1 As shown, the UEFI and WinPE-based terminal security protection system structure proposed by the present invention includes two parts, the client and the remote server, which interact with the operating system of the computer terminal, the UEFI environment, and the WindowsPE environment during operation. The remote server includes a remote data access module, and the remote data access module is mainly composed of a remote database for storage and detection and an interacti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal security precaution method and system based on a unified extensible firmware interface and a WinPE (Windows Preinstallation Environment), which comprises the steps ofexecuting remote data access to access to data on a remote server; executing identity authentication, and performing identity authentication with the remote server; executing kernel file protection,and carrying out integrity check and recovery on core files; executing malicious code detection; and executing third-party security software detection. A security protection module is developed basedon the UEFI and WinPE so as to perform security protection on an operating system of a user as soon as the computer is powered on until the user successfully enters the operating system. The precaution process is carried out before the operating system is loaded, malicious codes relying on the operating system are checked and killed before the operation, and thus the malicious codes cannot pose athreat to the precaution system, thereby achieving a purpose of preemption, and being capable of realizing real malicious code precaution.

Description

technical field [0001] The present invention relates to a method in the technical field of Internet information security, specifically a security protection method based on Unified Extensible Firmware Interface (UEFI, Unified Extensible Firmware Interface) and Windows Preinstallation Environment (WinPE, Windows Preinstallation Environment). Background technique [0002] With the continuous development of network applications and e-commerce, the security problems of computer systems have become increasingly prominent. The existing computer systems and their security protection methods obviously cannot meet the security needs of applications, and people begin to search for a comprehensive and thorough security solution from the perspective of computer architecture. The trusted platform specification drafted by TCG (Trusted Computing Group) is one of the good ideas, which has been recognized by most security researchers. UEFI is a new computer firmware interface standard propo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3239H04L9/3247H04L63/0876H04L63/12H04L63/1416H04L63/145
Inventor 朱信宇褚乾峰刘功申
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products