Unlock instant, AI-driven research and patent intelligence for your innovation.

Active security protection method and system of operating system and terminal device

An operating system, active security technology, applied in computer security devices, digital data protection, instruments, etc., can solve the problems of stealing, easy to be exploited by hackers, and system destruction of data, etc., to avoid automatic installation and improve the effect of system protection level

Inactive Publication Date: 2019-01-11
PAX COMP TECH SHENZHEN
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, an embodiment of the present invention provides an active security protection method, system, and terminal device for an operating system, so as to solve the problem that there are loopholes in the operating system in the prior art, which are easily exploited by hackers, causing malicious programs to damage the system and data The problem of security incidents such as theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active security protection method and system of operating system and terminal device
  • Active security protection method and system of operating system and terminal device
  • Active security protection method and system of operating system and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It shows the implementation flow chart of the active security protection method of the operating system provided by one embodiment of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are shown, and the details are as follows:

[0030] Such as figure 1 As shown, an active security protection method for an operating system provided in an embodiment of the present invention includes:

[0031] Step S101, when receiving a loading request of a third-party driver file, perform signature verification.

[0032] Step S102, using the key of the operating system to verify the signature of the third-party driver file.

[0033] In step S103, if the signature passes the verification, the third-party driver file is allowed to be loaded.

[0034] Step S104, if the signature fails to pass the verification, refuse to load or access the third-party driver file.

[0035] The third-party driver file desc...

Embodiment 2

[0089] Such as Figure 4 As shown, in one embodiment of the present invention, the active safety protection system 100 of the operating system includes:

[0090] The driver request receiving module 101 is configured to perform signature verification when receiving a loading request of a third-party driver file.

[0091] The driver file verification module 102 is configured to use the key of the operating system to verify the signature of the third-party driver file.

[0092] The first driver control module 103 is configured to allow loading of the third-party driver file if the signature is verified.

[0093] The second driver control module 104 is configured to refuse to load or access the third-party driver file if the signature fails the verification.

[0094] Such as Figure 5 As shown, in an embodiment of the present invention, the active safety protection system 100 of the operating system also includes:

[0095] The sensitive request receiving module 105 is configur...

Embodiment 3

[0109] Figure 6 It is a schematic diagram of a terminal device provided by an embodiment of the present invention. Such as Figure 6As shown, the terminal device 6 of this embodiment includes: a processor 60 , a memory 61 , and a computer program 62 stored in the memory 61 and operable on the processor 60 . When the processor 60 executes the computer program 62, it realizes the steps in each embodiment as described in Embodiment 1, for example figure 1 Steps S101 to S104 are shown. Alternatively, when the processor 60 executes the computer program 62, it realizes the functions of each module / unit in each system embodiment as described in Embodiment 2, for example Figure 4 The functions of modules 101 to 104 are shown.

[0110] The terminal device 6 refers to a terminal with data processing capabilities, including but not limited to computers, workstations, servers, and even smart phones with excellent performance, palmtop computers, tablet computers, personal digital ass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an active security protection method and system of an operating system and a terminal device, wherein the method comprises the following steps: when a loading request of a third-party driver file is received, executing a verification signature; verifying the signature of the third-party driver file by using the key of the operating system; if the signature is verified, allowing the third party driver file to be loaded; if the signature is not verified, loading or accessing the third-party driver file is denied. The invention realizes the active safety protection by actively blocking the function points which are easily used by the attacking program in the system, can be used for avoiding the destruction and stealing behavior of the system by the malicious program ofunknown origin, improves the protection level of the system, can be applied to the industry with high safety requirements, and does not affect the normal operation of the application.

Description

technical field [0001] The invention belongs to the technical field of software safety protection, and in particular relates to an active safety protection method, system and terminal equipment of an operating system. Background technique [0002] Android Android is a free and open source operating system based on Linux, mainly used in mobile devices, such as smartphones and tablets. Android's system architecture adopts a layered architecture. Android is divided into four layers, from high to low, which are application layer, application framework layer, system runtime layer and Linux kernel layer. [0003] At present, due to the open nature of the Android system, there are loopholes in the storage partition, Linux kernel, and software installation, which are easy to be exploited by hackers, causing malicious programs to damage the system and data theft and other security incidents. Contents of the invention [0004] In view of this, an embodiment of the present invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64
CPCG06F21/64G06F21/645
Inventor 赵荣辉甘云贤
Owner PAX COMP TECH SHENZHEN