Operating system object reuse check method based on exhaustive search

An inspection method and object technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of inspection technology and tools without relevant reports, and achieve the goal of improving inspection speed, simplifying inspection methods, and improving accuracy. Effect

Inactive Publication Date: 2012-05-23
ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] At present, for the inspection of object reuse in physical memory and disk space, the "Information Security Information System Security Level Pro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operating system object reuse check method based on exhaustive search
  • Operating system object reuse check method based on exhaustive search

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] An exhaustive search-based operating system object reuse inspection method includes a memory space object reuse inspection method and a disk space object reuse inspection method. For the object reuse inspection of memory space, the inspection tool should inspect that when the same physical memory area is used by a process and then allocated to another process, the latter cannot obtain information belonging to the former. For the inspection of disk space object reuse, the inspection tool should inspect whether another user can obtain data belonging to the original user from the disk space after the same disk space is used and released by a file belonging to a user.

[0028] 1. The corresponding steps of the memory space object reuse inspection method are as follows:

[0029] Step 1: Start process A, apply for a memory space for it, and write characteristic characters in it.

[0030] Because the operating system allocates an independent 4GB virtual memory address space f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an operating system internal memory space and disc space object reuse check method based on exhaustive search, which belongs to the fields of information security and computer operating systems. The internal memory space object reuse check method is characterized in that a kernel driver is used for converting a virtual address into a physical address, the same internal memory space is allocated for a check process through the internal memory physical address, and keyword matching is conducted on stored data in the space by adopting an exhaustive search method. The disc space object reuse check method is characterized in that a disc physical address for data storage is acquired through the kernel driver, the reading of the stored data in a disc space is directly conducted through the physical address and then special character matching is conducted by adopting the exhaustive search method. By using the method, object reuse check can be rapidly and effectively conducted on the internal memory space and the disc space, full-disc searching and traversing are not required to be conducted on the internal memory space and the disc space, the method is convenient and efficient to use and the check result is accurate.

Description

Technical field [0001] The invention relates to an exhaustive search-based object reuse inspection method for an operating system. In particular, it refers to an exhaustive search-based object reuse inspection method for operating system memory space and disk space. The invention belongs to the field of information security and computer operating system. Background technique [0002] GB17859-1999 divides the security protection capabilities of computer information systems into five levels. Starting from the second level of system audit protection, computer information systems are required to have the ability to protect object reuse. Specifically, it is stipulated that "in the free storage object space of the trusted computing base of the computer information system, before the object is initially assigned, assigned or reassigned to a subject, all authorizations to the information contained in the object are revoked. When the subject obtains a released When accessing the ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
Inventor 连一峰张海霞鲍旭华陈平李金戈
Owner ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products