Computer system safety protection setting method and its device

A computer system and computer security technology, applied in computer security devices, computing, instruments, etc., can solve the problem that users cannot use programs, and achieve the effect of improving the security protection level

Inactive Publication Date: 2007-11-14
LEJIN ELECTRONICS KUNSHAN COMPUTER CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if the Data Execution Prevention function is set, there will be a problem that a user with proper authority cannot use a desired program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system safety protection setting method and its device
  • Computer system safety protection setting method and its device
  • Computer system safety protection setting method and its device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In the following, implementations of the computer system security protection setting method and equipment thereof according to the present invention will be described in detail with reference to the accompanying drawings.

[0039] Before the description, several terms used in the present invention are defined.

[0040] The "whether to execute display bit" in the present invention refers to the identification of whether the code stored in the page can be executed in the page table of the memory of the computer operating system. Each company names the "whether to execute the display bit" differently. For example, Intel Corporation refers to "whether to execute the display bit" as "Execute Disable Bit".

[0041] The "supervisor password" in the present invention refers to specifying the password related to the security protection operation (Security Option) item of the BIOS features setup (BIOS features setup) of the computer system. During the BIOS setup process, if a pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer system's security protection method and setup equipment belongs to computer systems technology involved in supporting the implementation of the data protection features of the computer. Have a choice to stay preventing the competence of the user runs the specific methods and procedures for equipment, and methods include: user mode implementation of the provision of data protection steps; 'whether to implement the show bit' set up operations. The state is set to executable steps on the user access authentication, to confirm whether the user has the rights to the steps if there is the competence of users, will be 'whether to implement the show bit' Setup is changed to the status of the executable steps. According to the invention, the data set in the implementation of the function of the computer system, on the other users on the network bank or personal safety information related to the operation of the certification process, so as not to impede a legitimate authority of computer users use other procedures, greatly enhance the system's security.

Description

technical field [0001] The invention relates to a computer system security protection setting method and equipment thereof, in particular to a computer system that selectively suspends the computer system security protection setting method for preventing authorized users from running a specific program in a computer supporting the data execution protection function and the computer system. equipment. Background technique [0002] At present, people's life depends more and more on the Internet. The functions of the computer have also gradually increased from simple text operations to sending and receiving e-mails, stock trading, tax payment, online banking, and e-commerce. [0003] However, the network and the computer are an open system, and various viruses, worm programs, horse programs and malicious transactions all threaten the security of the system. Moreover, as online banking, online shopping and other applications become more and more widespread, there are more and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/44
Inventor 宋郑根金胜基
Owner LEJIN ELECTRONICS KUNSHAN COMPUTER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products