Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for remotely monitoring safety of application program

An application program and remote monitoring technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as inability to guarantee application program security, increase server load, and increase server load, so as to improve office efficiency, reduce load, and simplify processes Effect

Active Publication Date: 2015-05-27
CENT SOUTH UNIV
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the cloud computing environment, services are provided to users through the Internet, and the cloud computing platform will face various internal and external attacks, while the demand side often only considers its own needs and hopes to customize some personalized services by itself, which will not only increase The burden of large servers, and there is no guarantee that these applications downloaded are safe
Moreover, what cloud service providers are dealing with is a large number of users, and its load base is inherently large. For different demand groups, some services are often not necessary to be started and running. If the same service is opened to all users, it will Greatly increases server load

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for remotely monitoring safety of application program
  • Method for remotely monitoring safety of application program
  • Method for remotely monitoring safety of application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with specific examples and accompanying drawings.

[0035] In this embodiment, the remote server and the database server are integrated into one server, Ubuntu14.04 is used as the operating system, and the database is MYSQL5.5; the client is a notebook computer equipped with Windows7 32-bit Professional Edition. The remote server and the client establish a connection through the HTTP protocol and complete data communication; the remote server directly accesses the database through the interface provided by the MYSQL server to complete data interaction.

[0036] A remote monitoring method for application security such as figure 1 shown, including the following steps:

[0037] Step 1: Establishing a trustworthy list of applications in the database server by using a remote server, and storing digital fingerprints of trustworthy applications in the trustworthy list of applications;

[0038] The digital fin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for remotely monitoring safety of an application program. According to the method, real-time operation is performed on an application program file, a unique binary sequence identity is generated and is compared with a digital fingerprint of the application program in a trusty list, the confidentiality of the digital fingerprint is high, and the digital fingerprint is difficult to crack; a new process needing to be created before the application program is started is monitored, so that starting of the application program can be monitored. The method for remotely monitoring the application program performs remote authorization by customizing the trusty list on a background server, a uniform method for monitoring application programs of a terminal system is provided, the procedure for deploying a monitoring system by a system administrator is simplified, and the work efficiency of an enterprise is improved.

Description

technical field [0001] The invention relates to the field of computer science and technology, in particular to a remote monitoring method for application program security. Background technique [0002] The operating system is the platform, and the application program is the protagonist running on it, which directly serves the user. While applications bring convenience to users, they sometimes threaten system security. Therefore, implementing security supervision and permission control on applications is an important task of the operating system. At present, these regulatory and control techniques have developed very diverse. First of all, you can control the permissions of the application by configuring the running level of the application, but if the application always runs with administrator privileges, it will bring certain security risks, and it is not very convenient; secondly, you can control the application by Install and run to supervise and control the applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0861H04L67/025
Inventor 王国军王波徐旸彭珊
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products