Unlock instant, AI-driven research and patent intelligence for your innovation.

System process authority control method and device, storage medium, computer equipment

A system process and permission control technology, applied in the field of system security, can solve the problem of system process security reduction and achieve the effect of improving security

Active Publication Date: 2021-07-20
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] It can be seen that when the system process Svchost has no authority restrictions, it is impossible to effectively prevent viruses, Trojan horses and other malicious programs from using the characteristics of the system process Svchost to infect and destroy the system, and when the system process Svchost itself performs unreasonable behavior, it will lead to the security of the system process. reduce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System process authority control method and device, storage medium, computer equipment
  • System process authority control method and device, storage medium, computer equipment
  • System process authority control method and device, storage medium, computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0025] In this embodiment, a permission control method of a system process is provided, such as figure 1 As shown, the method includes:

[0026] Step 101, obtain a system service request.

[0027] In order to ensure that the system process can perform safe operations and not be used by viruses, Trojan horses, etc., it becomes a puppet process and monitors the system process in real time. When the system process receives a system service request and needs to perform a certain task, it uses HOOK technology to monitor the system process. The corresponding system API is hooked up, or the task to be performed is filtered by a function filter driver, and the system service request is obtained in rea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a system process authority control method and device, a storage medium, and a computer device. The method includes: obtaining a system service request; determining an execution subject for executing the system service according to the obtained system service request; The execution authority of the system process of the system service; according to the determined execution authority of the system process calling the system service, determine whether to allow the system process to execute the system service request. This application is based on the execution authority granted to the system process by the execution subject of the execution system service, which can effectively control the legal behavior that needs to be executed in the system service request is allowed, and the illegal behavior that needs to be executed in the control system service request is intercepted, thereby preventing the system from The process is exploited or it does some behaviors that endanger the system, which effectively improves the security of the system process.

Description

technical field [0001] The present application relates to the technical field of system security, in particular to a method and device, a storage medium, and a computer device for controlling authority of a system process. Background technique [0002] With the development of Internet technology, network security is particularly important, but in the existing protection system, the system process Svchost has no authority restrictions. Therefore, when the system process Svchost is exploited or it itself does some behaviors that endanger the system, it is impossible to defend against. For example, malicious programs such as viruses and Trojans can use the characteristics of the system process Svchost to confuse users and make the system process Svchost a virus. , Trojan horse puppet process, downloading viruses and Trojan horses, thereby stealing user information, and even achieving the purpose of infecting and destroying the system. [0003] It can be seen that when the syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/55
Inventor 陈俊儒邹泽华杨小波李阳
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More