Security protection method for operation system command
A security protection, operating system technology, applied in the field of security protection of operating system commands, can solve the problems of illegal data theft, major security risks, security problems, etc., to improve security, protect security, prevent theft or Tampering effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0024] Such as Figure 1-3 As shown, the security protection method of the operating system command disclosed by the present invention includes:
[0025] The user space configuration command whitelist file, the command whitelist file includes a number of allowed operation commands, the command whitelist file is encrypted using a symmetric encryption algorithm (such as AES encryption algorithm), and the generated ciphertext command whitelist file Stored in the storage space, the key of the symmetric encryption algorithm is stored in the trusted security chip (TPM: TrustedPlatform Module);
[0026] Take out the key from the trusted security chip, decrypt the ciphertext command whitelist file based on the symmetric encryption algorithm, generate the plaintext command whitelist file, and transmit all the operation commands in the command whitelis...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com