Method and system for preventing computer system time from being tampered

A technology of computer system and system time, which is applied in the field of communication and computer, can solve the problems of artificial interference and lack of inspection measures in the method of time validity, and achieve good monitoring effect

Active Publication Date: 2015-06-10
LIAONING MOBILE COMM +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of method lacks sufficient inspection measures for intentionally or even maliciously modifying the system time, or artificially interfering with the m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing computer system time from being tampered
  • Method and system for preventing computer system time from being tampered

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0043] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, the embodiments of the present invention are not limited thereto.

[0044] The basic principle of each embodiment of the present invention is: in the computer system to be checked, periodically maintain an array composed of feature descriptions of all checkpoint times in the valid time range, the array describes the valid time range, and when the check time arrives When comparing the system time feature description with the values ​​in the array, if the same feature description exists in the array, it means that the system time deviation does not exceed the predetermined range, otherwise a prompt is given. When the array is first established or reestablished after failure, it is necessary to input the time characteristic description from the reference system to determine whether the current system time is within the valid range.

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for preventing computer system time from being tampered. One group of character strings representing time check points are generated according to to-be-checked computer system time to determine an allowable computer system time deviation range, and the character strings representing the time check points are converted to ciphertext character string groups difficult to understand through a hash algorithm. In a to-be-checked computer system, the ciphertext character strings representing the check point time of the system time are cyclically compared with ciphertext character strings representing time check points in a time deviation range allowed by the check of the time, determined in the last cycle and searched, and whether the system time in the cycle is corrected or not and exceeds the allowable deviation range or not is determined. Compared with the prior art, the method and system have great monitoring effect on the conditions that the system time is deliberately even maliciously modified, or artificial interference is applied on the method for keeping the effectiveness of the computer system time with a purpose of enabling a computer to be in a time abnormal state.

Description

technical field [0001] The invention relates to the technical field of communication and computer, in particular to a computer system time tamper-proof method and system. Background technique [0002] With the popularity of computer systems, the requirements for computer system time are getting higher and higher. The normal operation of a computer program may depend on the validity of the computer system time. The difference between the computer system time and the reference time is too large, that is, the computer system time is not within the valid range, which may cause the computer program to run abnormally. [0003] In the prior art, the methods used to check that the computer system time is within the valid range include: [0004] Manually obtain the computer system time through the computer system program, and compare it with the reference time to determine whether the computer system time is within the valid range. [0005] In the case that computer system A is abl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/50
Inventor 王琦周小淇符廖峰汪大海
Owner LIAONING MOBILE COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products