Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method and device for automatic verification of remote windows operating system security rules

An operating system and automatic verification technology, applied in the field of information security, can solve problems such as issuing and taking effect of safety rules, no automatic verification of safety rules, and inability to judge safety protection software, etc., to achieve the effect of ensuring system information security

Active Publication Date: 2021-06-29
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, at present, for devices such as clients or servers with Windows operating systems installed remotely, there is no automatic verification scheme for the security rules of the security protection software installed on the Windows operating system, and thus it is impossible to judge the security of the security protection software installed on them. Whether the rules can be issued effectively and take effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for automatic verification of remote windows operating system security rules
  • A method and device for automatic verification of remote windows operating system security rules
  • A method and device for automatic verification of remote windows operating system security rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0045] In order to facilitate the understanding of the technical solution provided by the present application, a brief description of the research background of the technical solution of the present application is given below.

[0046]As we all know, as described in the background technology, with the wide application of the Windows operating system and the rapid popularization of the network, the problem of information security in the Windows operating system has become increasingly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method and device for automatically verifying security rules of a remote Windows operating system. The method includes: firstly, obtaining the type, system path, Windows path, and defense level of the operating system by remotely logging in to the Windows operating system, and then, according to the operation System type and defense level, obtain security rules, then, according to the system path, Windows path and security rules, obtain the security rule path, and then build a test file under this path, and obtain its permission value, and finally, use the permission value Compare with the actual protection result of the security rule path, verify whether the permission value complies with the security rule, and obtain the verification result. It can be seen that after the application has determined the security rules of the remote Windows operating system and its path, the authority value of the test file constructed under the path of the security rule is compared with the actual protection result of the path of the security rule to realize the remote Windows operating system. The automatic verification of security rules ensures the security of system information.

Description

technical field [0001] The application relates to the technical field of information security, in particular to a method and device for automatic verification of security rules of a remote Windows operating system. Background technique [0002] With the widespread application of the Windows operating system and the rapid popularization of the network, information security issues have received more and more attention. [0003] Based on the consideration of information security, people usually install corresponding security protection software on the Windows operating system. At present, commonly used security protection software includes 360 Security Guard, Rising Antivirus, Symantec, etc., and whether the security rules of each security protection software can be effectively issued and effective on the Windows operating system has become the focus of attention. However, at present, for devices such as clients or servers with Windows operating systems installed remotely, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 潘燕燕
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products