Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual host program security control method and device, equipment and medium

A virtual host and security control technology, applied in the field of computer security, can solve problems such as the inability to clear unknown viruses, the powerlessness of software firewalls, and the inability of software firewalls to prevent malicious insiders, etc.

Inactive Publication Date: 2019-07-09
ZUNYI BRANCH OF CHINA MOBILE GRP GUIZHOU COMPANY +1
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In summary, the disadvantages of the prior art are: 1. The software firewall cannot prevent malicious insiders. If an intruder has entered the virtual host, the software firewall is powerless; Effective removal of unknown viruses found

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual host program security control method and device, equipment and medium
  • Virtual host program security control method and device, equipment and medium
  • Virtual host program security control method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0020] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual host program security control method and device, equipment and a medium. The method comprises the following steps: obtaining resources required by a to-be-controlledprogram to access a virtual host; setting the authority of the to-be-controlled program to access the virtual host according to the obtained required resources; and establishing a behavior control description library for the virtual host according to the set authority. The embodiment of the invention provides a virtual host program security control method. An authority is set and a behavior control description library is established; according to the method and the device, the monitoring of the to-be-controlled program of the virtual host does not depend on the existing characteristic-based strategy, and further, the to-be-controlled program can be read regularly through the preset time so as to prevent the unknown program from accessing the virtual host and actively protect the virtual host, so that the zero-day attack is effectively resisted, and the virtual host is protected from other attacks.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to a virtual host program security control method, device, equipment and medium. Background technique [0002] As concepts such as cloud computing, virtualization, and big data continue to emerge and gradually change the Internet Technology (IT) environment, how to use new technologies to improve IT service efficiency and adapt to business development needs has become a research direction in this field. From the current point of view, the software-defined data center (Software Define Data Center, referred to as SDDC) will be the ultimate form of cloud computing in the future, and the concepts of elastic services, resource pooling, and on-demand services in cloud computing will be deeper and more comprehensive. delivered in a data center environment. The use of virtualization, the explosive growth of virtual hosts, and virtual hosts have become a new risk point...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F21/31G06F21/45G06F2009/45587
Inventor 谭明强李文华赵耀张彬
Owner ZUNYI BRANCH OF CHINA MOBILE GRP GUIZHOU COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products