Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software white list control method based on message authentication

A technology of message authentication code and control method, which is applied in the field of software whitelist control based on message authentication code on the network, can solve problems such as ineffective inspection, and achieve the effect of improving security performance

Active Publication Date: 2019-02-05
NAT UNIV OF DEFENSE TECH
View PDF19 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that malicious software communication cannot be effectively checked and controlled at present, the present invention proposes a software communication whitelist control method based on a message authentication code, which is a method for realizing a network-to-software communication whitelist control method based on a message authentication code. Its core idea is to combine message authentication codes, software certificates, software whitelists, and terminal whitelist trust bases to judge whether packets need to carry authentication codes, and verify and filter devices through authentication codes deployed on the network to achieve user-transparent network-to-software Communication whitelist control, effective control of unauthorized software and malware communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software white list control method based on message authentication
  • Software white list control method based on message authentication
  • Software white list control method based on message authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in detail below in conjunction with the accompanying drawings. The description in this part is only exemplary and explanatory, and should not have any limiting effect on the protection scope of the present invention. In addition, those skilled in the art may make corresponding combinations of features in the embodiments in this document and in different embodiments according to the descriptions in this document.

[0025] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein, for example, can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software white list control method based on message authentication, and is a method for realizing software communication white list control by a network based on message authentication. The core thought is as follows: a terminal white list credible base judges whether the message needs to carry an authentication code by combining a message authentication code, a softwarecertificate and a software white list, and verifies filter equipment through the authentication code deployed on the network, thereby realizing the software communication white list control by a transparent network of a user, and effectively controlling unauthorized software and malicious software communication. The defect that the current software communication control mechanism can be easily bypassed by malicious software is remedied, and the security performance of a communication control system is effectively improved; the network communication cannot be influenced in the network, and themalicious software communication can be effectively controlled.

Description

technical field [0001] The invention relates to the basic communication field of a trusted and safe network, in particular to a software white list control method based on message authentication codes on the network. Background technique [0002] With the increasing popularity of computer networks and the continuous emergence of various new technologies and equipment, people can access the Internet anytime and anywhere. While the Internet brings great convenience to people's life, work and study, it also makes network users suffer more than ever before. More cyber attacks and threats. When the Internet was founded, it was designed based on the idea of ​​openness and sharing, and basically did not consider the security of the network. As the core of Internet communication, the TCP / IP protocol family mainly considered the reliability of network interconnection and tried its best to transmit data. The authentication of information sources and the encryption and integrity prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3239H04L9/3247H04L9/3268H04L63/123H04L63/145
Inventor 王宝生王小峰王飞王楠郭佳朴罗艳刘宇靖
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products