Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission control method and device, storage medium, and computer equipment

A technology of permission control and permission set, applied in transmission systems, electrical components, program/content distribution protection, etc., can solve problems such as the reduction of program process security, and achieve the effect of improving security defense and avoiding viruses

Active Publication Date: 2021-07-20
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] It can be seen that when the program process has no permission restrictions, it is impossible to effectively prevent malicious programs such as viruses and Trojans from using the characteristics of the program process to infect, destroy the system, and be attacked by hackers, resulting in a decrease in the security of the program process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission control method and device, storage medium, and computer equipment
  • Permission control method and device, storage medium, and computer equipment
  • Permission control method and device, storage medium, and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0025] In this embodiment, a permission control method is provided, such as figure 1 As shown, the method includes:

[0026] Step 101, acquiring behavior data during program running.

[0027] During the running of the program, the running process of the program will be displayed in the task manager, and a large amount of behavior data in the running process can be obtained according to the running process of different programs. The running process of the program includes the system process for the system program and the application process for the application program. A system program may include multiple programs, each of which corresponds to a system process, and an application program may a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a permission control method and device, a storage medium, and a computer device. The method includes: obtaining behavior data in the program running process; setting a first behavior permission set applicable to all programs according to the behavior data; Blacklist verification is performed on the first behavior permission set to obtain a final behavior permission set applicable to all programs; according to the final behavior permission set, the permission control result for the monitored new program process is determined. This application can obtain the final behavior permission set applicable to all programs according to the program running process, and then impose corresponding permission restrictions on the new program process, so that when the program process is exploited, it can effectively prevent viruses and Trojan horses from using the characteristics of the program process to infect , destroying the system, and being attacked by hackers, it helps to improve the security defense of the program process.

Description

technical field [0001] The present application relates to the technical field of computer security, and in particular relates to a method and device for authority control, a storage medium, and computer equipment. Background technique [0002] With the development of Internet technology, network security is particularly important, but in the existing protection system, the program process has no authority restrictions. Therefore, when the program process is exploited or attacked by hackers, it is impossible to defend against. For example, malicious programs such as viruses and Trojan horses can use the characteristics of the program process to confuse users, making the program process a puppet process of viruses and Trojan horses. Trojan horse download operation, thereby stealing user information, and even achieving the purpose of infecting and destroying the system. [0003] It can be seen that when the program process has no authority restriction, it is impossible to effe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/12
Inventor 陈俊儒
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products