Security enhancement system and method for software

A technology with security and security attributes, applied in the field of computer networks, can solve problems such as illegal elevation of authority, abuse of authority, excessive scope, etc., to achieve the effect of ensuring feasibility and security, ensuring portability, and fine-grained control

Active Publication Date: 2012-09-12
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] Therefore, access tokens owned by most user processes of the same user result in the same access rights to the same subject object
Having the same access rights for user processes with well-defined and distinct functions often leads to abuse of rights
[0018] (2) Permissions are illegally elevated
For the mandatory access control mechanism MIC that appeared after Windows Vista, although the security and ease of use are already very strong, it is only effective for systems after Vista, which is not enough for most users who are still using Windows XP any effect
And the scope of this mechanism is still too large to be arbitrarily configured

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security enhancement system and method for software
  • Security enhancement system and method for software
  • Security enhancement system and method for software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0043]The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Of course, they are only examples and are not intended to limit the invention. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security enhancement system for software. The security enhancement system for software comprises a configuration module for configuring the security properties of a main body and an object of the software, a filter module for filtering access of the main body to the object according to a preset strategy and the security properties and an access module for calling the object processed by the filter module. The system meets the minimized authority rule, so that the probability of enhancing the security of the software can be guaranteed, and relatively high generality is realized. The invention also discloses a security enhancement method for the software.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a security enhancement system and method for software. Background technique [0002] At present, Windows XP and IE are still the mainstream operating systems and browsers used by most Internet users. The security access control mechanism of Windows Xp itself has its natural defects. For the operation of ordinary users, many functions are unavailable or even unable to start, so most users run with the highest administrator privileges when using the Windows XP system, so as long as there are loopholes in the code or plug-ins in the browser or other software, then The whole system will be controlled by virus Trojan horse. And the security protection of the user state is basically meaningless, because it is easy to be broken through. For example, the hook technology in the user state is easily restored or directly bypassed. [0003] The security access control mechanism ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/51
Inventor 宾彬王屿
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products