Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for safely loading whitelist library files

A whitelist and list library technology, applied in the field of safe loading of whitelist library files, can solve problems such as algorithm and key leakage, easy to be cracked, algorithm and key are not confidential, etc.

Active Publication Date: 2021-02-09
ZHEJIANG SUPCON TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] From the perspective of product management, there is a great risk of leakage of algorithms and keys in a series of processes from product development to production
And in many cases, the algorithm and key are not even confidential to the insiders of the enterprise.
On the other hand, the long-term use of a single algorithm and key is also very easy to be cracked after obtaining a large amount of communication data
[0005] In summary, the existing methods are difficult to guarantee the communication data security between the host security software and the white list library

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for safely loading whitelist library files
  • A method and device for safely loading whitelist library files
  • A method and device for safely loading whitelist library files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] see figure 1 , this embodiment discloses a method for securely loading a whitelist database, which is applied to a host computer installed with host security software, and specifically includes the following steps:

[0059] S101: Decrypt the ciphertext in the host security software code according to the preset secret key and the first encryption algorithm, and obtain the whitelist secret key, and the preset secret key is stored in any database in the ho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method and a device for safely loading files in a white list library. The method comprises the following steps of: separately storing a preset key and the ciphertext in a host security software code to ensure the security of a white list key; adopting a secondary encryption mechanism, that is to encrypt the data stored in the white list according to the white list key and a first encryption algorithm to obtain a white list data ciphertext, then calculating a hash value of the white list library by using a second encryption algorithm, encrypting the hash value of thewhite list library according to the white list key and the first encryption algorithm to obtain a hash ciphertext of the white list library, thereby ensuring the security of the data in the white listlibrary. By verifying the security of the white list library through decrypting the white list library using the preset key, the white list library is loaded when the white list library is verified to be secure, thereby guaranteeing the security of the host security software when loading the white list library.

Description

technical field [0001] The present invention relates to the technical field of industrial control security, and more specifically, to a method and device for safely loading a whitelist library file. Background technique [0002] The whitelist library is a list of files trusted by the host, and the objects in the list are allowed to be accessed or executed. During the operation of the host security software monitoring system, only programs in the white list are allowed to run, and malicious and unauthorized processes and file operations will be blocked from running. The host security software conducts a comprehensive scan on the host, generates a trusted whitelist library, and protects the whitelist from being manipulated and destroyed by malicious software. [0003] Currently, a secret algorithm and a fixed key are generally used to realize secure communication between the host security software and the registration form library. A fixed data encryption key is agreed betwe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08G06F21/60
CPCG06F21/606H04L9/0822H04L9/0894H04L9/3236
Inventor 沈利斌郭正飞邵腾飞
Owner ZHEJIANG SUPCON TECH