Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security configuration reinforcement method and system and medium

A technology of security configuration and configuration items, applied in the direction of platform integrity maintenance, etc., can solve problems such as the inability to guarantee the security of the operating system

Active Publication Date: 2021-05-11
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention mainly solves the problem that the existing operating system security configuration reinforcement method cannot guarantee the security of the operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security configuration reinforcement method and system and medium
  • Security configuration reinforcement method and system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] This embodiment provides a security configuration hardening method, such as figure 1 shown, including the following steps:

[0054] This embodiment is realized based on the Linux system;

[0055] S100. Initialize the security environment;

[0056] Specifically:

[0057] Create a security management terminal and perform initial configuration operations through the security management terminal;

[0058] The initial configuration operation is: obtain and install the security configuration hardening program; run the security configuration hardening program; set the security access right of the security configuration hardening program to be accessible only through the security management terminal; the security access right includes the process of the security configuration hardening program Control authority and operation authority;

[0059] Setting an initial configuration and a level threshold of the security configuration; the level threshold includes a first level th...

Embodiment 2

[0094] This embodiment provides a security configuration hardening system, such as figure 2 shown, including:

[0095] An initialization module, a configuration processing module and an exception processing module; the configuration processing module includes: a configuration reinforcement module, a configuration locking module and a configuration detection module; the exception processing module is connected to the monitoring server;

[0096] The initialization module creates a security management terminal, and the initialization module performs initial configuration operations through the security management terminal; specifically:

[0097] The initial configuration operation is: the initialization module obtains and installs the security configuration hardening program; the initialization module runs the security configuration hardening program; the initialization module sets the security access right of the security configuration hardening program to be accessible only th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security configuration reinforcement method which is applied to an operating system, and security configuration is arranged in the operating system. The method comprises the following steps: initializing a security environment; setting a reinforcement configuration item and a reinforcement mechanism; reinforcement the security configuration according to the reinforcement configuration item and the reinforcement mechanism in the security environment to obtain insurance configuration; executing a locking operation on the insurance configuration to obtain a locking configuration; and detecting whether the locking configuration is abnormal or not, and if yes, executing repairing operation. The security state of the operating system can be monitored in real time, the operating system is automatically repaired after the security configuration of the operating system is modified, and meanwhile, the abnormal information corresponding to the modification action is reported to an administrator, so that the security of the operating system is greatly improved.

Description

technical field [0001] The present invention relates to the technical field of server security configuration, in particular to a security configuration reinforcement method, system and medium. Background technique [0002] At present, many operating systems are equipped with security configurations. This security configuration is used to protect the security of the system, and the security configuration of the operating system is further reinforced to prevent the operating system from being hacked and DOS (Denial Of Service, a system attack method) / DDOS (Distributed Denial Of Service, a system distributed attack method) attack; however, the existing hardening methods are manually hardened, and the existing hardening methods are easy to be tampered with and cannot be perceived by the administrator; the above disadvantages are extremely serious reduces the security of the operating system. Contents of the invention [0003] The invention mainly solves the problem that the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 曹柱
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products