Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application program executing permission control method used for operating system

An application program and permission control technology, applied in the fields of instruments, electrical digital data processing, computer security devices, etc., can solve problems such as hidden dangers, system performance impact, and inability to effectively protect system security, and achieve comprehensive control and prevention capabilities. Strong, prevent the effect of illegal program running

Inactive Publication Date: 2015-03-25
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the integrity detection method based on trusted computing needs to be supported by trusted computing chips such as TPM, and the integrity detection based on trusted computing chips for all software will have a great impact on system performance.
At the same time, due to reconfiguration caused by software installation and software upgrades, illegal software that has previously entered the system may be able to run. Therefore, there are certain security risks in software execution control based on trusted computing, which cannot effectively protect system security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program executing permission control method used for operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Such as figure 1 As shown, the implementation steps of the application execution authority control method for the operating system in this embodiment are as follows:

[0036]1) Classify the application programs in the operating system into four categories: allowing all users to execute P, protected and tamper-proof X, allowing or denying some users to execute L, and denying all users to execute U, and store them as classification marks of application programs; at the same time, For the applications in the operating system, the execution authority control policy of the application is established according to the inherent information of the application. The execution authority control policy is configured to require administrator authority to operate when adding and modifying. A record includes the inherent information for the specified and the information that the specified user allows or prohibits the execution of the application;

[0037] 2) Intercept the application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The the invention discloses an application program executing permission control method used for an operating system. The method includes the following steps: classifying application programs in the operating system; establishing an executing permission control strategy of the application programs; when the application programs execute requests, checking classifying marks of the application programs, verifying completeness of the application programs if the classifying marks allow all users to execute or are protected and are tampering-proof, executing if verification passes, and refusing to execute if verification fails; if the classifying marks allow or refuse part of users to execute, inquiring the executing permission control strategy on the basis of inherent information of the application programs, executing if the executing permission control strategy returned by inquiring allows the application programs to be executed, and refusing to execute if not; if the classifying marks are empty or refuse all users to execute, refusing toe execute the application programs. The application program executing permission control method has the advantages of high malicious software preventing capability, safety, reliability, high stability, high universality and high expandability.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an application program execution authority control method for an operating system. Background technique [0002] At present, with the continuous deepening of informatization, the damage of computer viruses to information systems is becoming more and more serious. How to ensure the security and credibility of information systems and ensure the integrity of applications from damage is an important manifestation of system security. Most of the existing computer viruses are caused by the intentional or unintentional execution of malicious programs by users. Malicious programs usually pretend to be normal programs or bind and modify normal programs, inducing users to execute tampered programs to achieve the purpose of destruction, causing damage to the security of information systems, leading to security incidents such as information leakage. Therefore, ensuring the integrity of syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51
CPCG06F21/51G06F2221/033
Inventor 廖湘科黄辰林姬一文陈松政董攀魏立峰丁滟罗军唐晓东
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products