Office operation system reinforcing method and system

A technology of operating system and office software, applied in the field of security, can solve problems such as economic losses and hidden dangers of users and individuals, and achieve the effect of protecting rights and interests and improving security.

Inactive Publication Date: 2018-08-10
北京力鼎创软科技有限公司
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are many security risks in the Windows operating system and application services. Although there are a large number of anti-virus, anti-virus software, and attack protection software, in the recent widespread blackmail virus incidents, many desktop operations with anti-virus software and attack protection systems installed The system is still being recruited, causing major economic losses to the user unit and individuals
The main reason for this is that antivirus software and attack protection systems can only establish signature databases for known viruses and attack behaviors, and for unknown emerging viruses, emergency treatment and remedial measures can only be taken after the virus occurs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Office operation system reinforcing method and system
  • Office operation system reinforcing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] refer to figure 1 , shows a flow chart of steps of a method for strengthening a Windows office operating system. In this embodiment, the Windows office operating system reinforcement method may include:

[0046] Step 102, by means of the PKI identity authentication mechanism, modify the Windows office operating system boot program and system login authentication.

[0047] Public Key Infrastructure, PKI, a public key security infrastructure that manages secret keys and certificates. The U lock is a USB smart card computer encryption key.

[0048] PKI can provide reliable user identity certificate management, utilize credible user certificate system to set up identity certificate for the user in the present embodiment method, and store in U lock; Certificate public key hides and encrypts and preserves in Windows office operating system local disk ;Modify the boot program of the Windows operating system. In the booting link, it is required to insert the U-lock, and veri...

Embodiment 2

[0056] Based on the same inventive concept as the above-mentioned method embodiment, refer to figure 2 , shows a structural diagram of a Windows office operating system hardening system.

[0057] In this embodiment, the operating system hardening system includes:

[0058] Management background, client;

[0059] The management background includes:

[0060] The policy management background module 202 is used to implement user management of Windows office terminals inside the office network, management of security software and security network reinforcement policies;

[0061] Management background log recording module 2042: used for network access operation log information, synchronizing and managing client log records in the background.

[0062] Clients include:

[0063] The power-on authentication module 206 hides and encrypts the user public key certificate locally in the Windows operating system, revises the Windows office operating system boot guide and login authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an office operation system reinforcing method and system. The office operation system reinforcing method comprises the following steps: modifying a boot program and system login authentication of a Windows office operation system by means of a PKI identity authentication mechanism; performing full-disk data encryption on an operation system disk; uniformly managing office software, verifying MD5 value of a software package and ensuring security and reliability of program software; and setting a secure program directory and a secure network address, monitoring all systemprocesses and network access requests, and prohibiting process execution and network access behaviors. The office operation system reinforcing method and system provided by the invention realizes data protection, process protection and network access protection for the Windows office operation system, improves the security of the system, and protects the rights of users of the office operation system.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a method and system for strengthening an office operating system. Background technique [0002] At present, computer and network technology and applications are developing rapidly, and the security situation of computer systems is more severe than ever before. You may hear many hacker incidents and virus threats almost every day. Once the computer system is damaged, it may cause major damage to the user. Economic losses will seriously affect the normal work. Strengthening the security reinforcement of computer systems is one of the important tasks of informatization construction. [0003] At present, the Microsoft Windows operating system still occupies the largest share of the desktop operating system, with a share of more than 90%, and it is the absolute mainstream office operating system. However, there are many security risks in the Windows operating system and application...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/34G06F21/78G06F21/60
CPCG06F21/34G06F21/51G06F21/602G06F21/78
Inventor 万民
Owner 北京力鼎创软科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products