System and method for unified control of software operation based on whitelist mechanism
A control method and whitelist technology, applied in the field of information security, can solve the problem of lack of a unified software operation control system and method in the whitelist mechanism, and achieve the effect of convenient unified management and preventing tampering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] A local area network has two clients U 1 and U 2 Perform whitelist initialization and software verification function startup.
[0045] S1. Before running the software on the client machine, generate a local software list, and send the local software list to the server machine. First, traverse the client U 1 All executable files (exe) in the system, get the path set P of all executable files 1 ={C:\\1.exe,C:\\2.exe}; Then use the SHA1 algorithm to calculate the set P 1 The eigenvalues of the executable file corresponding to each element in , get the eigenvalue set H 1 ={5ef3...a263,5977...93b0} (Since the SHA1 and RSA encryption values are too long, the middle part of the value is omitted, the same below), the set H 1 content is sent to the server. Similarly, traversing the client U 2 All executable files (exe) in the system, get the path set P of all executable files 2 ={C:\\3.exe,C:\\4.exe}; Then use the SHA1 algorithm to calculate the set P 2 The eigenval...
Embodiment 2
[0049] A user applies for client U 1 Add new software to the local software whitelist.
[0050] S1. The user is on the client computer U 1 Submit the software sample1.exe and its software type that needs to be added to the whitelist to the server machine: directly executable software type.
[0051] S2. After the server receives the application and the software sample1.exe, firstly, it uses the SHA1 algorithm to calculate the characteristic value 3316...de05 of the software sample1.exe, and then judges that the software type is directly executable; then, uses the algorithm EncF to calculate formula l 0 =EncF(h 0 ), to get software whitelist variation L′ 1 = {}; Finally, L' 1 Recorded in the local log and sent to the client U 1 .
[0052] S3, client U 1 Receive software whitelist change amount L′ 1 , add it to the local software whitelist L 1 in; the user can then use the client U 1 Use the software sample1.exe.
Embodiment 3
[0054] User application on client U 2 Remove a software from the local software whitelist.
[0055] S1, client U 2 Submit the feature value 673e...acd3 of the software sample2.exe that needs to be removed from the local software whitelist to the server machine.
[0056] S2. After the server receives the application and the characteristic value 673e...acd3 of the software sample2.exe, it obtains the corresponding software whitelist variation L′ by querying the log 2 ={}, then L' 2 send to client U 2 .
[0057] S3, client U 2 received L' 2 After that, it will belong to L' at the same time 2 and local software whitelist L 2 The software whitelist element values from L 2 Delete in (namely ); then the software sample2.exe cannot be installed on the client computer U 2used on.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


