Safety protection method and system, computer equipment and computer readable storage medium

A security protection and security kernel technology, applied in the field of computer-readable storage media, can solve system security issues and other issues

Active Publication Date: 2020-05-19
BEIJING QIANXIN TECH +1
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, various security products, such as identity authentication platforms, firewalls, etc., are mostly implemented based on software. Due to the inherent deficiencies of the von Neumann architecture, systems based on software implementation can be cracked theoretically. Therefore, this type of security products provide security capabilities. Sometimes, there are often security problems in the system itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and system, computer equipment and computer readable storage medium
  • Safety protection method and system, computer equipment and computer readable storage medium
  • Safety protection method and system, computer equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] An embodiment of the present invention provides a security protection method, which is applied to a daemon process of a security protection system, wherein the security protection system includes the daemon process, and also includes a security kernel module and a security chip, wherein the daemon process and The security core modules are all software devices, and the security chip is a hardware structure, such as TPM (Trusted Platform Module, Trusted Platform Module) and the like. Through this method, the trusted root of the software in the security guard system is put into the security chip, and the security chip protects the root of the reliability verification of the security configuration file, and the daemon process and the security kernel module interact with the security chip separately to realize the Blocking of dangerous processes, specifically, the security protection method provided by this embodiment includes the following steps S101 to S109.

[0032] Step ...

Embodiment 2

[0055] Embodiment 2 of the present invention provides a preferred security protection method, and some technical features are the same as those in Embodiment 1 above. For specific descriptions and corresponding technical effects, reference may be made to Embodiment 1 above. Further, in the second embodiment, when the process identifier matches the process list, the matching between the process file and the file information table is judged, which simplifies the judgment logic. In addition, the security protection method provided by this embodiment can also protect the integrity of the files in the server. Judgment on sex and effectiveness. specifically, figure 2 A flow chart of the security protection method provided in Embodiment 2 of the present invention, such as figure 2 As shown, the security protection method provided in the second embodiment includes the following steps S201 to S214.

[0056] Step S201: Receive the process information of the process to be started sen...

Embodiment 3

[0079] Embodiment 3 of the present invention provides a preferred security protection method, and some technical features are the same as those in Embodiment 1 above. For specific descriptions and corresponding technical effects, please refer to Embodiment 1 above. Further, the third embodiment can update the configuration file information in the security chip, and provides a safe update method. specifically, image 3 The flow chart of the security protection method provided by Embodiment 3 of the present invention, such as image 3 As shown, the security protection method provided by the third embodiment includes the following steps S301 to S314.

[0080] Step S301: Receive update data of the security configuration file.

[0081] Wherein, the update data includes the configuration file to be updated, the signature file corresponding to the configuration file to be updated, and the version information of the configuration file to be updated.

[0082] When the security confi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety protection method and a system, computer equipment and a computer readable storage medium. The method comprises the steps of receiving process information of a to-be-started process sent by a security kernel module; reading configuration file information in the security chip, and when the security configuration file is modified, changing the configuration file information; acquiring and verifying a security configuration file according to the configuration file information; when the security configuration file passes the verification, matching the process identifier with the process list, and matching the process corresponding to the process file with the file information table; and if the process identifier is not matched with the process list and/or the process file is not matched with the file information table, sending an obstruction instruction for obstructing the to-be-started process to a security kernel module, the security kernel module being used for obstructing the to-be-started process when receiving the obstruction instruction. According to the method, the safety performance of the safety protection system can be improved.

Description

technical field [0001] The present invention relates to the technical field of security protection, in particular to a security protection method, system, computer equipment and computer-readable storage medium. Background technique [0002] With the continuous development of computer and network technology, people rely more and more on the network. However, with the expansion of network applications, the situation of network security is becoming more and more severe. How to ensure the security of terminal equipment in the network has become a Important issues. At present, various security products, such as identity authentication platforms, firewalls, etc., are mostly implemented based on software. Due to the inherent deficiencies of the von Neumann architecture, systems based on software implementation can be cracked theoretically. Therefore, this type of security products provide security capabilities. Sometimes, there are often security problems in their own systems. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/53
CPCG06F21/64G06F21/53
Inventor 刘瑞简明魏勇张泽洲
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products