Active security protection method and system of operating system and terminal device
An operating system, active security technology, applied in computer security devices, digital data protection, instruments, etc., can solve the problems of stealing, easy to be exploited by hackers, and system destruction of data, etc., to avoid automatic installation and improve the effect of system protection level
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] figure 1 It shows the implementation flow chart of the active security protection method of the operating system provided by one embodiment of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are shown, and the details are as follows:
[0030] Such as figure 1 As shown, an active security protection method for an operating system provided in an embodiment of the present invention includes:
[0031] Step S101, when receiving a loading request of a third-party driver file, perform signature verification.
[0032] Step S102, using the key of the operating system to verify the signature of the third-party driver file.
[0033] In step S103, if the signature passes the verification, the third-party driver file is allowed to be loaded.
[0034] Step S104, if the signature fails to pass the verification, refuse to load or access the third-party driver file.
[0035] The third-party driver file desc...
Embodiment 2
[0089] Such as Figure 4 As shown, in one embodiment of the present invention, the active safety protection system 100 of the operating system includes:
[0090] The driver request receiving module 101 is configured to perform signature verification when receiving a loading request of a third-party driver file.
[0091] The driver file verification module 102 is configured to use the key of the operating system to verify the signature of the third-party driver file.
[0092] The first driver control module 103 is configured to allow loading of the third-party driver file if the signature is verified.
[0093] The second driver control module 104 is configured to refuse to load or access the third-party driver file if the signature fails the verification.
[0094] Such as Figure 5 As shown, in an embodiment of the present invention, the active safety protection system 100 of the operating system also includes:
[0095] The sensitive request receiving module 105 is configur...
Embodiment 3
[0109] Figure 6 It is a schematic diagram of a terminal device provided by an embodiment of the present invention. Such as Figure 6As shown, the terminal device 6 of this embodiment includes: a processor 60 , a memory 61 , and a computer program 62 stored in the memory 61 and operable on the processor 60 . When the processor 60 executes the computer program 62, it realizes the steps in each embodiment as described in Embodiment 1, for example figure 1 Steps S101 to S104 are shown. Alternatively, when the processor 60 executes the computer program 62, it realizes the functions of each module / unit in each system embodiment as described in Embodiment 2, for example Figure 4 The functions of modules 101 to 104 are shown.
[0110] The terminal device 6 refers to a terminal with data processing capabilities, including but not limited to computers, workstations, servers, and even smart phones with excellent performance, palmtop computers, tablet computers, personal digital ass...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


