Supercharge Your Innovation With Domain-Expert AI Agents!

White list protection matching method, system, terminal and storage medium

A matching method and whitelist technology, applied in the field of cloud platforms, can solve problems such as time-consuming consumption, large host resources and time, and achieve the effect of reducing storage space, simple structure, and reliable design principle.

Active Publication Date: 2020-11-20
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Obviously, when there are a large number of Hash values ​​in the whitelist library, when the whitelist library matches the running program, it is very time-consuming and the completion of this process consumes a lot of host resources and time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White list protection matching method, system, terminal and storage medium
  • White list protection matching method, system, terminal and storage medium
  • White list protection matching method, system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0050] figure 1 is a schematic flowchart of a method in one embodiment of the present invention. in, figure 1 The execution subject can be a whitelist protection matching system.

[0051] Such as figure 1 As shown, the method 100 includes:

[0052] Step 110, splitting the hash value in the whitelist into multiple parts, and saving ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a white list protection matching method, a system, a terminal and a storage medium. The method comprises the steps: splitting a hash value in a white list into a plurality of parts, and storing each part in a corresponding database; establishing a mapping relationship among all parts of the same white list hash value, and generating a mapping relationship table among all databases according to the mapping relationship; splitting the hash value of the request program into a plurality of parts according to a splitting method of the hash value in the white list, and searching a matching part from a corresponding database for each part of the hash value of the request program according to the mapping relation table; if the hash value of the request program has a matchingpart in each database, judging that the hash value of the request program is in a white list. According to the method, the storage space of the white list library is reduced, the hash values of the request programs are subjected to subsection matching, the matching efficiency is improved, and most non-white list programs are quickly screened out.

Description

technical field [0001] The present invention relates to the technical field of cloud platforms, in particular to a whitelist protection matching method, system, terminal and storage medium. Background technique [0002] In the cloud platform environment, it often takes a long time to protect the host with the whitelist function. The longest time-consuming is often the matching of the huge whitelist library and the hash of the running program of the protected host. The main reason is that the whitelist library The Hash value of the entire whitelist program is stored in . [0003] The conventional hash matching method is: [0004] Maintain a huge whitelist library, which stores all the hash values ​​listed in the whitelist. When the protection host wants to run a certain program, it calculates the Hash value of the program and matches it with the huge white list library, and finds whether there is a Hash value consistent with the program in the white list library. If the ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/22G06F16/215G06F16/2455
CPCG06F16/2255G06F16/215G06F16/24558
Inventor 唐超甄鹏
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More