Trusted process recognition method and device

A process identification and process technology, applied in the Internet field, can solve the problem of not knowing how many programs are running, and achieve the effect of improving user experience, ensuring effectiveness, and improving stability

Inactive Publication Date: 2017-04-26
BEIJING YUANXIN SCI & TECH
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the operating system itself is released in adv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted process recognition method and device
  • Trusted process recognition method and device
  • Trusted process recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted process recognition method and device. The method comprises the following steps: configured a locked trusted certificate associated with a preset process in a certificate base; receiving a verification request for verifying whether the process is the trusted process, and querying whether the trusted certificate associated with the preset process exists in the certificate base in response to the verification request; verifying the preset process according to the trusted certificate after querying that the trusted certificate associated with the preset process exists in the certificate base; and determining the preset process as the trusted process when judging that the preset process passes the verification of the trusted certificate. By use of the method disclosed by the invention, the security and the stability of the system can be improved.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, in particular, to a trusted process identification method and a trusted process identification device. Background technique [0002] With the rapid development of integrated circuit technology and communication network technology, mobile terminals gradually have powerful processing capabilities and communication functions. At present, the mobile terminal has changed from a simple communication tool to a comprehensive information processing platform, and has become a terminal product that penetrates widely, spreads rapidly, has a huge impact, and penetrates into all aspects of human social life. [0003] In the aforementioned mobile terminal, security authentication is also very important. For example, the Linux system binary signature technology is a means to prevent illegal programs or codes from running. The basic method is to add a digital signature to the running program or cod...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/51G06F21/57
CPCG06F21/44G06F21/51G06F21/57
Inventor 高连凯
Owner BEIJING YUANXIN SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products