Unlock instant, AI-driven research and patent intelligence for your innovation.

Software whitelist management method and system

A management method and whitelist technology, applied in the field of network management, can solve problems such as data theft, impact on terminal device 30 operation performance, and increased risk of data leakage

Active Publication Date: 2020-10-23
BEIJING SHENZHOU TAIYUE INFORMATION SAFETY TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned software whitelist management system needs to install client detection software on the terminal device 30 to be controlled. The operation of the client detection software will occupy the internal hardware resources of the terminal device 30, so it will affect the operating performance of the terminal device 30. In addition, the source code of the above-mentioned client detection software is usually hidden from users. Therefore, there may be cases where software manufacturers use the client detection software to steal data, increasing the risk of data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software whitelist management method and system
  • Software whitelist management method and system
  • Software whitelist management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0066] Aiming at the problems caused by the need to install the client detection software on the detected device in the prior art, the software whitelist management method provided by the embodiment of the present invention migrates the verification function of the software installed in the terminal to the server in the network . figure 2 A schematic diagram of the deployment architecture of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a software white list management method and system. The software white list management method comprises the following steps: firstly, assigning a software white list verifying execution script for the device to be inspected according to the device type of the device to be inspected in the software white list verification task; then, logging in the device to be inspected according to the login information of the device to be inspected and sending the software white list verifying execution script to the device to be inspected; and finally, comparing the installation software in the script execution result returned by the inspected device with the software installation strategy library to obtain the verification result of each installation software in the inspected device. According to the embodiment of the invention, the software white list management method faces the server-side device, not only ensures the security of the data in the network, but also fills the blank of the terminal software management on the server side; in addition, according to the embodiment of the invention, the verification is performed by means of the ways of logging in the device, executing the script and offline parsing the set results, and the installation of a client software or a boot service on a managed device is not required, therefore, the occupation of the equipment resource is reduced, and the data security is guaranteed.

Description

technical field [0001] The invention relates to the technical field of network management, in particular to a software whitelist management method and system. Background technique [0002] With the rapid development of information technology, various industries are vigorously building information systems, and the scale of the network is continuously expanding, and the number of devices in the network is also increasing rapidly, and the security problems that follow are becoming more and more prominent. Among the problems faced by system and network security, privately deploying software that has nothing to do with business operation in terminal equipment not only wastes hardware resources, affects equipment operation efficiency, but also causes important data leakage due to data theft. [0003] In the prior art, in order to realize the management of the software installed on the terminal device in the target network, client detection software is usually deployed on the termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/20
Inventor 刘乐王柯蘅訾荣蒋艳娥霍会潮肖勇军杨丑雄苏砫
Owner BEIJING SHENZHOU TAIYUE INFORMATION SAFETY TECH CO LTD