A Server Hardening Method Based on File Access Control and Process Access Control

A technology of access control and file access, applied in the fields of instruments, electrical components, digital data authentication, etc., can solve the problem of "difficult connection", and achieve the effect of protection security, high performance and security, and good compatibility

Active Publication Date: 2020-02-07
GUANGDONG QIZHOU INFORMATION SCI & TECHCO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the problems in the design system, even if there are many "points" security solutions, it is difficult to connect them into "planes", so it is impossible to fundamentally solve the security problems at the system level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Server Hardening Method Based on File Access Control and Process Access Control
  • A Server Hardening Method Based on File Access Control and Process Access Control
  • A Server Hardening Method Based on File Access Control and Process Access Control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] In the embodiment of the present invention, a server hardening method based on file access control and process access control uses a server hardening device to harden the server, making the system a system with a security kernel installed. The server hardening device includes dual identity authentication Module, USB peripheral control module, registry access control module, network control module, process protection mechanism module, sensitive data access control module, system self-protection module, the functions of each module are as follows: dual identity authentication module, users use USB Key In the way of dual ID card and password, you can log in only by inserting the USB Key and entering the correct password, otherwise you cannot log in; the USB peripheral control module disables the USB storage device and prohibits its use without authorization, but does not affect the non-USB storage device Its normal use; the registry access control module monitors registry a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for reinforcing a server based on file access control and progress access control. The method is characterized in that the server is reinforced by a server reinforcing device, so that a system is installed with a safety inner core; the server reinforcing device comprises a double identity identification module, a USB (universal serial bus) peripheral management control module, a registry access control module, a network control module, a progress protection mechanism module, a sensitive data access control module, and a system self protection module. The method has the advantages that the current condition of passive defense of traditional security software is solved, the server has the capability of active defense, and the comprehensive security protection function is provided for the server.

Description

technical field [0001] The invention relates to a Windows operating system file filtering drive technology and process access control technology, in particular to a server reinforcement method based on file access control and process access control. Background technique [0002] With the development of the national economy and social undertakings, network information technology is playing an increasingly important role in people's daily work and life. While actively participating in the process of national economy and social informatization, people are also fully enjoying information technology. The convenience brought to our work and life. Web application security issues faced by various websites are becoming more and more complex, and security threats are growing rapidly, especially the risk of mixed threats, such as hacker attacks, worms, DDoS attacks, SQL injection, cross-site scripting, and web application security vulnerabilities. , greatly troubled users, and caused ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/34G06F21/52G06F21/55G06F21/60G06F21/64H04L29/06
CPCG06F21/31G06F21/34G06F21/52G06F21/55G06F21/602G06F21/64H04L63/10
Inventor 张军肖赛龙
Owner GUANGDONG QIZHOU INFORMATION SCI & TECHCO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products