Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for improving safety performance of computers on basis of safety sandbox

A computer security and security technology, applied in computer security devices, computing, platform integrity maintenance, etc., can solve problems such as risks, affect software execution efficiency, increase software development costs, etc., to ensure clean, safe, and easy to use. Effect

Active Publication Date: 2012-07-04
SHENGQU INFORMATION TECH SHANGHAI
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although putting the entire system into a sandbox can greatly improve security, it will affect the execution efficiency of the software to a certain extent, because not all operations are risky
This directly affects the user experience of the software
And when the system encounters a problem, it can only be solved by restarting the system
[0005] Similarly, to apply sandbox technology to each individual software, software developers should not only care about the design and development of specific software, but also how to use sandbox technology to ensure software security, which increases the cost of software development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving safety performance of computers on basis of safety sandbox
  • Method for improving safety performance of computers on basis of safety sandbox

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The invention adopts the method of closing the software running environment and monitoring the running state of the software. Specifically, by intercepting software running behaviors, including cross-process memory access, underlying I / O request operations, accessing the network, etc., when intercepting software behaviors, if the software requests cross-process access to memory or access to the network, it is up to the user to decide whether to run the software . If the software sends an I / O request, the security black box will add the request to the request queue after receiving the request; if the security black box analyzes the intercepted I / O request and redirects it to the inside of the security black box to achieve closed software operation environmental purpose. When requesting access to an external system device file, and the requested permission is insufficient, the security black box tries to generate a device image file inside the security black box for the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for improving safety performance of computers on the basis of a safety sandbox, which is used for keeping a user system clear and safe. In the method, software is mounted in a safety black box by a user, and the black box runs in a system kernel model and monitors and intercepts behaviors of the application software running in the black box. If the software sends out I / O request, the safety black box receives the request and adds the same into a request queue, and an I / O request analyzer inside the safety black box extracts the request from the request queue and then analyzes and judges the request; if the request accesses the internal resources of the safety black box, the request is added into an executing queue; if the request accesses the external system resources in a read-only manner, then the request is allowed to be added into the executing queue; if the request requires modifying the external system resources, a resource image of the external system resources is generated inside the safety black box, and the I / O request is redirected to request the internal resources of the safety black box and added into the I / O request queue. The method keeps the user system clear and safe.

Description

technical field [0001] The invention relates to a method for improving computer safety performance. Background technique [0002] A security sandbox is an "environment" in which programs of untrustworthy origin, destructive behavior, or unclear intent can be executed, however, all changes in the sandbox will not have any impact on the operating system. Sandboxing technology currently runs in a variety of different software. For example, GOOGLE browser chrome took the lead in adopting sandbox technology to restrict network applications from accessing computer memory beyond the virtual boundary, preventing the browser or other running software from crashing due to a single network application. [0003] "Shadow system" is also an application of sandbox technology. The shadow system uses operating system virtualization technology to generate an image of the current operating system, which has exactly the same functions as the real system. After entering the shadow system, all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/53
Inventor 王峰杜江杰沈佳佳
Owner SHENGQU INFORMATION TECH SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products