Software real name authentication system and its safe checking method

A technology of real-name authentication and software, applied in computer security devices, instruments, electrical digital data processing, etc.

Inactive Publication Date: 2008-03-26
CHINESE PLA AIR FORCE ELECTRONICS TECH INST
View PDF0 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The defect of the above method is that the anti-virus software can only prevent the viruses that the software can detec...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software real name authentication system and its safe checking method
  • Software real name authentication system and its safe checking method
  • Software real name authentication system and its safe checking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below through specific embodiments and accompanying drawings.

[0040] The first thing to explain is that in a modern computer system, the source program is processed by a compiler and an assembler to generate an object file, and multiple object files are then combined into an executable file by a linker. PortableExecutable (PE) is the object file format used by Windows NT technology. Windows executable files (.exe) or dynamic link library files (.dll) are stored in PE format, so this manual mainly proposes A software real-name mechanism realization scheme for Windows operating system, and the system security is analyzed and discussed. As shown in FIGS. 1A and 1B , the loader of the operating system will process the PE file during execution, so as to load the code, data, and resources of the program into the memory. Therefore, to implement a security mechanism based on software authentication in the Windows operating s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system based on software real-names and its safety verification method, the system comprises software concentrator marker used to add software identification for authorized software, software certification device used to identify if the software identification of executable file in system was legal, the software concentrator marker and software certification device were saved in the disk of the computer. The method is: when the Windows operating system runs the loader will first deal with the target document, in this process, the software certification device of the software real-name certification system break in the loading process of Windows executable programs, thus transfer to the software certification device to identify and inspect, finally install and use through certificated executable file. The invention can prevent operation of unauthorized malicious code, prevent malicious code change authorized executable code on the disk, avoid malicious code revise the running executable code in memory, identify malicious acts individual software manufacturers.

Description

technical field [0001] The invention relates to a computer software system and a computer operation security verification method thereof, in particular to a computer software system based on software real-name authentication and a computer operation safety verification method thereof, belonging to the technical field of computer security. Background technique [0002] Currently, the escalating viruses, Trojan horses, spyware, and adware on the Internet have caused great inconvenience and security troubles to the vast number of enterprises and individual users when using the Internet. Through research, most of the current malicious codes can be classified into the following two categories: 1. Modify the legitimate program so that it contains and executes some kind of destructive function, such as self-destruction of the program or disk self-destruction; 2. Utilize the function of the legitimate program and permissions, illegally obtain or tamper with system resources and sens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/51
Inventor 王克
Owner CHINESE PLA AIR FORCE ELECTRONICS TECH INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products