Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for reinforcing server based on file access control and progress access control

A technology of access control and file access, which is applied in the direction of instruments, electrical components, digital data authentication, etc., can solve problems such as difficult to connect "surfaces", and achieve the effects of protection security, strong practicability, and good compatibility

Active Publication Date: 2017-01-11
GUANGDONG QIZHOU INFORMATION SCI & TECHCO LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the problems in the design system, even if there are many "points" security solutions, it is difficult to connect them into "planes", so it is impossible to fundamentally solve the security problems at the system level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for reinforcing server based on file access control and progress access control
  • Method for reinforcing server based on file access control and progress access control
  • Method for reinforcing server based on file access control and progress access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] In the embodiment of the present invention, a server hardening method based on file access control and process access control uses a server hardening device to harden a server, so that the system becomes a system with a security kernel installed, and the server hardening device includes dual identity authentication. module, USB peripheral control module, registry access control module, network control module, process protection mechanism module, sensitive data access control module, system self-protection module, the functions of each module are as follows: dual identity authentication module, the user uses USB Key With the dual ID card method and password, you can log in only by inserting the USB Key and entering the correct password, otherwise you cannot log in; Its normal use; registry access control module, which monitors registry access and prohibits unauthorized modification; network control module, prohibits external network access for unauthorized open ports, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for reinforcing a server based on file access control and progress access control. The method is characterized in that the server is reinforced by a server reinforcing device, so that a system is installed with a safety inner core; the server reinforcing device comprises a double identity identification module, a USB (universal serial bus) peripheral management control module, a registry access control module, a network control module, a progress protection mechanism module, a sensitive data access control module, and a system self protection module. The method has the advantages that the current condition of passive defense of traditional security software is solved, the server has the capability of active defense, and the comprehensive security protection function is provided for the server.

Description

technical field [0001] The invention relates to a Windows operating system file filtering driving technology and a process access control technology, in particular to a server reinforcement method based on file access control and process access control. Background technique [0002] With the development of national economy and social undertakings, network information technology is playing an increasingly important role in people's daily work and life. While people are actively participating in the process of national economy and social informatization, they are also fully enjoying information technology. The convenience brought to our work and life. The web application security issues faced by various websites are becoming more and more complex, and security threats are growing rapidly, especially the risks of mixed threats, such as hacker attacks, worms, DDoS attacks, SQL injection, cross-site scripting, web application security vulnerabilities, etc. , which greatly troubl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/34G06F21/52G06F21/55G06F21/60G06F21/64H04L29/06
CPCG06F21/31G06F21/34G06F21/52G06F21/55G06F21/602G06F21/64H04L63/10
Inventor 张军肖赛龙
Owner GUANGDONG QIZHOU INFORMATION SCI & TECHCO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products