Method and system for managing and controlling mobile medium access authority in domestic operating system

A technology of mobile media and operating system, which is applied in the field of computer security to achieve the effects of preventing loss, ensuring real-time performance, and ensuring safety and credibility

Inactive Publication Date: 2017-04-26
HARBIN ANTIY TECH
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a method and system for controlling the access authority of removable media under a domestic operating system, which solves the problems of data access authority and transmission control in removable media under a domestic operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for managing and controlling mobile medium access authority in domestic operating system
  • Method and system for managing and controlling mobile medium access authority in domestic operating system
  • Method and system for managing and controlling mobile medium access authority in domestic operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1 is the read and write permission control method in the present invention, which is used to control the data read and write permissions in removable media, because some malicious code injection usually needs to write or rewrite some parts in the file, and the purpose of injection has been achieved. At this time, the injection operation information can be obtained to intercept the operation. like figure 1 Shown:

[0045] S101: Register the file_permission callback function under the security_operations structure under the LSM framework;

[0046] S102: Obtain operation information, where the operation information is the file name of the currently operated file, process information for operating the file, and user information for operating the file;

[0047] S103: Determine whether the currently operated file is prohibited from reading and writing operations, and if so, intercept the operation; otherwise, execute S104;

[0048] S104: Determine whether the proc...

Embodiment 2

[0050] Embodiment 2 is the execution authority control method in the present invention, which is used to control the execution authority of files in removable media. This control method intercepts programs with malicious behaviors before the programs are executed to prevent harm caused by malicious codes. For some unknown executable programs, it has a very good killing effect. Such as figure 2 Shown:

[0051] S201: Register the bprm_set_creds callback function under the security_operations structure under the LSM framework;

[0052] S202: Obtain operation information, where the operation information is the file name of the currently operated file, process information of the file, and user information for operating the file;

[0053] S203: Determine whether the currently operated file is prohibited from performing operations, if yes, intercept the operation; otherwise execute S204

[0054] S204: Determine whether the parent process of the file is abnormal, if so, intercept ...

Embodiment 3

[0056] Embodiment 3 is a method for renaming permissions, deleting permissions or changing permissions in the present invention. Since the movement, change or deletion of some protected important files or directories may have a great impact on users, it is not allowed for some To change deleted files or directories, you need to control their corresponding permissions. Changing the execution permissions of executable files is generally a dangerous behavior that may cause serious consequences. Therefore, it is necessary to effectively control the behavior of changing permissions. Such as image 3 Shown:

[0057] S301: Register the corresponding callback function under the security_operations structure under the LSM framework; if it is a renaming permission, register the path_rename callback function; if it is a deletion permission, register the path_unlink and path_rmdir callback functions; if it is a permission change, register the inode_setattr callback function;

[0058] S3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for managing and controlling mobile medium access authority in a domestic operating system. The method specifically comprises the following steps: managing read-write authority, an execution authority, renaming authority, deletion authority and authority change of a mobile medium; and performing transmission management and control and access management and control on the mobile medium. By adoption of the method and system provided by the invention, the mobile medium can be dynamically monitored, and a malicious code is interrupted before being executed to prevent the harms brought by the malicious code to a host and guarantee the instantaneity of management and control. The tampering of the file in the mobile medium can also be prevented to ensure the safety and feasibility of mobile devices.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method and system for controlling the access authority of removable media under a domestic operating system. Background technique [0002] With the development of computer technology, the strengthening of the concept of information security, and the emphasis on security and controllability of nationalization, the research and development and popularization of domestic operating systems have reached unprecedented popularity in recent years, laying a solid foundation for the realization of independent research and development of security and controllability. Since removable media is an important way for malicious code to spread, domestic operating systems need to comprehensively control the data transmission of mobile media and actively defend against malicious code transmitted through mobile media. [0003] There are many types of removable media, and the development is not cumb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/565G06F2221/2141
Inventor 王辛宇童志明何公道
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products