Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for enhancing system safety, checking device and safety system

A technology to enhance the system and verification device, which is applied in the direction of platform integrity maintenance, etc.

Active Publication Date: 2013-09-04
HUAWEI TECH CO LTD
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The general way to enhance system security is to adopt passive defense strategies, such as removing all debugging methods in the operating system kernel, cutting out system kernel configuration items that will not be used in business scenarios, and restricting the functions and functions of certain components of the system kernel. behavior, prohibiting users and systems from interacting with each other, etc., but these measures can only provide limited defensive effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing system safety, checking device and safety system
  • Method for enhancing system safety, checking device and safety system
  • Method for enhancing system safety, checking device and safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The core of a software system is composed of program logic with static attributes and data with dynamic attributes. The typical characteristic of static attributes is invariance, while the characteristic of dynamic attributes is variability. Theoretically speaking, it is impossible to predict the change law of the data inside a large-scale software system, that is to say, its value change is random and disordered; and the unchanging program logic (commonly known as code) is often changed once it changes. It means risks, such as being inserted into illegal codes or being tampered with, etc. Therefore, the invariance of active protection program logic parts can improve the security of system software.

[0041] The method for enhancing system security in the present application introduces an active protection strategy to protect the immutable program logic part of the software and prevent behaviors of tampering with system software by exploiting system loopholes. Wherein, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for enhancing system safety, a checking device and a safety system. The method for enhancing the system safety comprises acquiring parameters of a program logic part in a system operating process, checking the the program logic part according to the parameters of the program logic part, normally operating a system if checking is passed and directly resetting the system if the checking is not passed. The invention further discloses the corresponding checking device and the safety system. Through the mode, the method for enhancing the system safety, the checking device and the safety system can effectively improve the system safety through an active type defending strategy.

Description

technical field [0001] The invention relates to a method for enhancing system security, a verification device and a security system. Background technique [0002] With the continuous development of the set-top box market, it also pays more and more attention to the security of software and hardware systems. The software system developed based on the open source linux platform, while enjoying the advantages brought by open source, also faces the uncontrollable scope of open source system vulnerabilities or defect propagation, and the process from discovery of vulnerabilities to repair also requires a long period. The system can be attacked and hacked. [0003] The general way to enhance system security is to adopt passive defense strategies, such as removing all debugging methods in the operating system kernel, cutting out system kernel configuration items that will not be used in business scenarios, and restricting the functions and functions of certain components of the sy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 李宁刘伦佐杨春
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products