A program defense method and system based on digital certificate

A digital certificate, defense system technology, applied in the direction of platform integrity maintenance, can solve problems such as zero-day attacks, and achieve the effect of blocking malware and spam

Inactive Publication Date: 2019-02-19
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, if the system is not upgraded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A program defense method and system based on digital certificate
  • A program defense method and system based on digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0026] Such as figure 1 As shown, a digital certificate-based program defense method of the embodiment includes steps:

[0027] The user program signature identification library is established. The specific operations of this embodiment include collecting protection programs that require user signatures to form a user program signature identification library.

[0028] Detect whether the digital signature of the program is legal; in this embodiment, judge whether the digital signature of the program is legal by judging whether the digital signature of the program is in the user program signature identification library. The specific operations include, when it is detected that the user program is running or modified, verifying the digital certificate signature information of the program with the information stored in the user program signature identifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a program defense method and system based on a digital certificate, belonging to the field of operating system security design. The embodiment of the invention can detect whether a program digital signature is legal or not. If the program's digital signature is valid, it is allowed to execute and monitor the program in real time. If it is detected that the modified program has been authenticated by the user's signature, a report is made to the user. Embodiments of the present invention do not need to run antivirus software that must be constantly updated, and anything that is not on the list will be blocked from running; The system is protected from zero-day attacks. Users cannot run unauthorized programs that are not on the list, so don't worry about installing executable pests, etc., intentionally or unintentionally. The embodiment of the invention can very effectively prevent malware and spam.

Description

technical field [0001] The invention belongs to the field of operating system security design. Background technique [0002] Traditional active detection and defense technologies are very common in the field of security software. Many detections are carried out in the kernel, but many detection principles are to collect the hash value of the program in advance. [0003] The traditional integrity detection technology has poor real-time performance, and it is very dangerous to be easily infected with viruses or attacked, especially in many secret-related industries. Some defense techniques require constant updates to antivirus software. At the same time, if the system is not upgraded in time, it may also suffer from zero-day attacks. Contents of the invention [0004] The present invention aims to solve the above-mentioned technical problems. Therefore, the present invention provides a program defense method and system based on a digital certificate, which has the advanta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/54
CPCG06F21/54
Inventor 路廷文
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products