Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer safety protective method based on software identity identifying technology

A computer system and software technology, applied in computer security devices, computing, platform integrity maintenance, etc., can solve problems such as inconvenient computer operation, computer security threats, and inapplicability of independent executable files

Inactive Publication Date: 2007-01-24
傅玉生
View PDF2 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of method can prevent software from being modified by virus programs to a certain extent, but it also has obvious defects: 1. It is obviously not applicable to the situation that the virus is an independent executable file
At present, there is no unified and effective method and tool on how to prevent such attacks. It basically depends on the system administrator's understanding of computer system security and the level of improvement of computer system functions. The common method is to install the latest system in time. patch
[0005] In addition, with the development of Internet technology, various "trojan horse" software and advertising software have also brought threats to computer security and brought inconvenience to users' computer operations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer safety protective method based on software identity identifying technology
  • Computer safety protective method based on software identity identifying technology
  • Computer safety protective method based on software identity identifying technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] By implementing the invention, a safe environment can be built in which only known and trusted software can run. The infrastructure necessary to achieve this secure environment includes, for example, figure 1 The following three sections are shown:

[0018] 1. Security authentication database;

[0019] 2. Authentication server program;

[0020] 3. Monitoring program.

[0021] The feature information and security information of various software are stored in the security certification database. The content and scope of software feature information and security information can be adjusted according to actual needs. Generally speaking, feature information includes software name, manufacturer, version, software executable file name, software purpose, etc., while security information includes whether the software is certified as safe, whether it is a virus program, whether it is a Trojan horse program, whether it is vulnerable loopholes etc. These information can be us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to computer security technology, and is a client end computer security protecting mechanism established around the certificating server based on software identity certification. The present invention includes: 1. establishing security certificating database with the unique flag code as ID; 2. establishing certificating server for providing software security certificating function with the security certificating database as kernel; 3. establishing security policy for limiting the software running in the client end; 4. monitoring the client end computer and extracting the unique ID and submitting it to the certificating server before starting the executable file; 5. inquiring the security certificating database with the certificating server and feeding back the corresponding security information to the client end computer; and 6. the client end computer judging whether to execute the software. Compared with traditional antivirus method, the present invention has more wide protection.

Description

1. Technical field [0001] The invention relates to the field of computer application technology, and relates to a computer security protection method. The method can be used to establish an infrastructure for providing computer security protection services. The method can also be used to design an application software for improving computer security. The method improves the security of the computer system by restricting the execution of software without safety certification on the computer. 2. Background technology [0002] Preventing the spread of computer viruses is an important topic in the field of computer security. In the "Computer Information System Security Protection Regulations of the People's Republic of China", the definition of computer virus is: "Computer virus refers to a group of computer viruses that are compiled or inserted into computer programs to destroy computer functions or data, affect computer use, and can replicate themselves. instruction or prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/57
Inventor 傅玉生
Owner 傅玉生
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products