Process control method, apparatus and system

A process control and process file technology, applied in the field of information security

Inactive Publication Date: 2017-03-29
BEIJING UXSINO SOFTWARE
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The common method now is to save the name of the process in the white list. This method has flaws. When the user changes the name to the same name as the white list, it can pretend to be a trusted process and run

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process control method, apparatus and system
  • Process control method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Before discussing the exemplary embodiments in greater detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowchart depicts the operations as a sequential process, many of the operations may be performed in parallel, concurrently, or concurrently. Additionally, the order of operations can be rearranged. The process may be terminated when its operation is complete, but may also have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, subroutines, and the like.

[0025] In this context, "computer equipment", also referred to as "computer", refers to an intelligent electronic device that can execute predetermined processing procedures such as numerical calculations and / or logical calculations by running predetermined programs or instructions. It may include a processor and The memory, the processor executes the prog...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to provide a process control method, apparatus and system. The method comprises the steps of obtaining an I / O request package sent by an operation system through the process control apparatus, wherein the I / O request package is generated by an I / O manager when an application is started; querying content identifier information of a process file corresponding to the I / O request package, wherein the content identifier information is generated based on contents of the process file; and when the matched content identifier information is queried, allowing the process file to run. A white list in the prior art generally stores names of process files, and as long as the names are same, processes are trusted processes, so that the processes are very easily counterfeited. Compared with the prior art, the process control method, apparatus and system has the advantages that the content identifier information of the process file needs to be checked before process running, and if the content identifier information is not in the white list, the process file is not allowed to run, so that hackers cannot counterfeit the trusted processes and whether the processes are the trusted processes or not can be accurately identified.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a process control technology. Background technique [0002] Since the birth of the first computer in 1946, computers have experienced rapid development, and today computers have become an indispensable part of our lives. We work, play, relax, and shop on the computer. Computers have brought people too much convenience and benefits, and people's lives have been inseparable from it. The importance of computers is more and more fully reflected in people's lives. But computers bring convenience to people, but also bring threats to people's information security. [0003] Hackers use various means to attack the user's computer, and there are various means, but all means require running processes on the user's computer, so it is particularly important to control the process on the user's computer. The control process needs to have a whitelist of trusted processes, and p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/51
CPCG06F21/121G06F21/51G06F2221/2149
Inventor 梁继良于革新徐晓加方晓山邓志群陈熙
Owner BEIJING UXSINO SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products