Process-isolation control system and method

A process isolation and control system technology, applied in the direction of multi-programming devices, etc., can solve the problems of attacks, interfere with the process, cannot guarantee the security of the operating environment, etc., and achieve the effect of preventing attacks and reducing the degree of damage

Active Publication Date: 2010-05-12
LENOVO (BEIJING) LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When any one of process A and process B is infected with a virus and / or injected with malicious code, and the two perform memory operations at the same time, it will cause another process that is not infected with the virus and / or injected with malicious code to be infected with the virus. and / or malicious code attacks, which may lead to the collapse of the entire operating environment
However, the current method of checking malicious codes and / or viruses based on signatures cannot effectively defend against malicious codes and / or viruses stored in memory, especially unknown malicious codes and / or viruses, so the security of the operating environment cannot be guaranteed, and the The private memory space of the process cannot be protected, and the infected process will interfere with the normal operation of the normal process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process-isolation control system and method
  • Process-isolation control system and method
  • Process-isolation control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In the embodiment of the present invention, two processes (process A and process B) are taken as an example for illustration.

[0033] like figure 2 As shown, the process isolation control system of the present invention is connected to the system process (process A and process B), and is also connected to the operating system (not shown in the figure) at the same time, and is used to control the cross-process (process A and process B) according to the security policy. Between memory operations, such as image 3 As shown, it specifically includes a security policy storage module 11, a process operation request receiving module 12, a process operation request judging module 13, and a process operation request processing module 14, wherein:

[0034] The security policy storage module 11 is used to store a security policy, and the security policy is used to determine whether the first process has the authority to perform cross-process memory operations on the second proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a process control system and method of isolation. The isolation process and the process control system to connect the operating system, according to security strategy for the judge requested the operation of inter-process memory process operation whether the request meets the requirements, and in accordance with the results described in judgment request the implementation of the process of operating the corresponding treatment. The process of the application of this invention isolation and control systems and methods, only with security strategy can be requested throughthe process of operation, can effectively monitor the process of inter-operation between the various against unknown viruses and malicious code attacks, will all logic the process of private space protection and isolation, the use of this invention can be virus (malicious code) have reduced the extent of the damage has affected the process will not interfere with the normal operation of another process.

Description

technical field [0001] The invention relates to process management technology, in particular to a method and system for controlling and managing cross-process memory operations. Background technique [0002] Under the existing technical conditions, the memory operation mode between processes is as follows: figure 1 as shown, figure 1 It includes two processes: process A and process B. There is no effective isolation area between process A and process B, and the two can perform memory operations on each other. Currently, when memory operations are performed between processes, malicious codes and / or viruses are checked in a signature-based manner. [0003] When any one of process A and process B is infected with a virus and / or injected with malicious code, and the two perform memory operations at the same time, it will cause another process that is not infected with the virus and / or injected with malicious code to be infected with the virus. and / or malicious code attacks, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/46
Inventor 王凯李俊冯荣峰郭轶尊
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products