Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed credibility authentication method and system thereof based on software product library

A software product and product library technology, applied in the field of security certification, can solve problems such as difficult to achieve widely adaptable security products, large blacklist, computer security threats, etc.

Active Publication Date: 2011-09-21
CHENGDU QIQIAO SOFTWARE
View PDF4 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Blacklist technology is widely used in security products (such as 360 antivirus software, etc.), but blacklist technology is a lagging technology that can only achieve relative security. Viruses can adopt various deformations, bypass, stealth or preempt System priority technology to fight against, and as time accumulates, the blacklist will become larger and larger, and the efficiency will become lower and lower. More importantly, if the virus grows rapidly and the security software cannot keep up with it immediately, Computer security will be seriously threatened
[0005] 2. Although the whitelist technology does not have the above disadvantages, there are three most critical problems in the whitelist technology: ① How to build a database? ②How to win the trust? ③How to apply? These three problems cannot be solved well, and the whitelist technology is difficult to be practical
[0007] That is to say, existing security products mainly rely on blacklist technology (virus database), that is, also rely on whitelist technology, because of the lag of blacklist technology and the difficulty of implementing whitelist technology, it is difficult to achieve a widely applicable Security products that are flexible (adapt to all known and unknown viruses) and highly flexible (can run all unknown software and ensure user computer and data security)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed credibility authentication method and system thereof based on software product library
  • Distributed credibility authentication method and system thereof based on software product library
  • Distributed credibility authentication method and system thereof based on software product library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Attached below Figure 1-5 Embodiments of the present invention are further described.

[0070] The invention provides a distributed trusted authentication method and system based on a software product library, which can quickly scan the file system, application software, and operating environment of any computer user, and terminate and uninstall all unidentified files according to the security level required by the user. Executable code that meets the current security level, isolates all executable files that do not meet the current security level, protects user information and key data at a higher security level, prohibits running all executable code that does not meet the current security level, cooperates with active defense and The network firewall technology can eliminate all potential safety hazards on the user's computer, and realize a truly safe and reliable operating system environment that can run any software product without barriers, with different security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security authentication, particularly to a distributed credibility authentication method and a system thereof based on a software product library. An on-line user initiates an authentication request to an authentication server through an authentication terminal, and the authentication server provides credibility for performing software product authentication as required or authenticating the user software product in distributed form to the on-line user according to the authentication request, and finally returns back the authentication result; an off-line user directly authenticates the credibility of the software product through the authentication terminal, and protects data security and information security of the user by switching among different security levels according to the authentication result or the user choices. In the method and the system provided by the invention, a software credibility authentication mechanism created by two ways of on-line and off-line can implement the credibility authentication of a plurality of security levels for the user so as to ensure the application security and the information security of user computers, and the user is allowed to run any software product at different security levels without any trouble, even the product contains real virus codes, the data security and the system stability of the user computer cannot be destroyed.

Description

technical field [0001] The invention relates to a security authentication method for computer operating systems, application software and operating environments, in particular to a distributed credible authentication method and system based on a software product library. Background technique [0002] Since computers have been widely used, the security of computer systems has plagued the entire computer industry and users. Attacks and defenses on the system are always developing at a high level, because technology is not revolutionary. Computer end users can only get used to downloading, installing and upgrading huge anti-virus software, and spend a lot of time scanning their computers to ensure the stability of the system and the safety of the working environment. However, even if security vendors try their best to track and update virus databases and research and develop various active defense technologies, they still cannot guarantee the comprehensiveness and accuracy of c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06F21/00G06F21/51
Inventor 张宁军龙祥玲
Owner CHENGDU QIQIAO SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products