Method and system for safely running executable file

A technology for executing files and running safely, applied in the computer field, can solve problems such as not being able to meet the security requirements of IoT terminals, and achieve the effect of safe operation

Active Publication Date: 2020-06-09
STATE GRID INFORMATION & TELECOMM GRP +1
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are a large number of variants of viruses, and the use of virus signature detection methods to prevent the spread of viruses can no longer meet the security needs of IoT terminals in the new situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely running executable file
  • Method and system for safely running executable file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] The embodiment of the present invention discloses a method and system for safely running an executable file. When it is detected that the executable file is called, the executable file, the calling subject of the executable file, and the operation instruction of the calling subject on the executable file are obtained, When it is determined that the call subject is valid for the operation instruction of the executable file, the operation instruction will ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for safely running an executable file. The method comprises the steps of: when it is detected that the executable file is called, obtaining an executablefile, the calling main body of the executable file and the operation instruction of the calling main body to the executable file, when it is determined that the operation instruction of the calling main body on the executable file is valid; further verifying whether the executable file, the calling main body and the operation instruction exist in a preset ACL or not; verifying whether the executable file is tampered or not and whether the digital signature of the executable file is credible or not by matching the digital signature of the executable file with the digital signature of the executable file corresponding to the ACL, loading the executable file only when all verification passes, and starting a new process to run the executable file. Before the executable file is operated, the executable file is verified for multiple times, the executable file carrying viruses and / or malicious programs is filtered out, and safe operation of the executable file is achieved.

Description

technical field [0001] The present invention relates to the field of computer technology, more specifically, to a method and system for safely running executable files. Background technique [0002] With the integration of industrialization and informatization in the national grid, and the rapid development of network communication technology in recent years, while the network application is developing vigorously, the openness of the network has also brought huge security risks, and there is a risk of being attacked by viruses. As computer viruses have gradually evolved from being highly dependent on "zero-day" vulnerabilities to highly customized special viruses that do not rely on "zero-day" vulnerabilities, how to intercept viruses has become an important condition to ensure the safe operation of the power Internet of Things. [0003] At present, the virus interception method is mainly the virus feature detection technology, and the virus is targeted to be intercepted by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/56G06F21/64
CPCG06F21/125G06F21/564G06F21/64
Inventor 赵明明廖逍李科马皓许勇刚刘欣张津明刘圣龙冯亮星刘晓曦赵建伟刘柱李文璞白景坡曾令康张喆
Owner STATE GRID INFORMATION & TELECOMM GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products