Unlock instant, AI-driven research and patent intelligence for your innovation.

Security protection method, device and equipment and computer readable storage medium

A security protection and equipment technology, applied in the field of network information security, to achieve the effect of improving flexibility, avoiding protection redundancy, and reducing the risk of illegal operations

Active Publication Date: 2022-05-10
北京亿赛通科技发展有限责任公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a security protection method, device, equipment and computer-readable storage medium, aiming to solve how to improve the security protection of the Linux operating system real-time technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method, device and equipment and computer readable storage medium
  • Security protection method, device and equipment and computer readable storage medium
  • Security protection method, device and equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0066] Further, based on the first embodiment of the security protection method of the present invention, a second embodiment of the security protection method of the present invention is proposed, the step S100 is to obtain a preset or dynamically updated protection strategy, and determine the protection object in the protection strategy steps, including:

[0067] Obtaining a preset or dynamically updated protection strategy, step a, analyzing the protection strategy, and obtaining the hierarchical condition restrictions in the protection strategy;

[0068] Step b, filtering out the protected objects based on the hierarchical conditions.

[0069]In this embodiment, it should be noted that the protected object refers to the subject that needs to be protected, and if there is a related operation command for the protected object, the operation command needs to be protected. Wherein, the protection object may be determined according to object information such as user type, user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection method, device and equipment and a computer readable storage medium, and belongs to the technical field of network information security. The preset or dynamically updated protection strategy is obtained, the protection object in the protection strategy is determined, whether the operation command matched with the protection object exists or not is detected in real time, the necessity of protection of the operation command is determined, and when the operation command is monitored, the operation command is intercepted in real time based on the command interception function, so that the risk of illegal operation is reduced, and the user experience is improved. And real-time monitoring and interception are realized, so that the real-time performance of safety protection of the operating system is effectively improved. The protection mechanism corresponding to the operation command in the protection strategy is determined, the protection operation is executed on the operation command based on the protection mechanism, the effectiveness and legality of the operation command are ensured, the safety of system operation is improved, the protection information corresponding to the protection operation is determined, and the information flow direction of the protection information is determined according to the protection strategy. And outputting the protection information based on the information flow to improve the utilization rate of the protection information.

Description

technical field [0001] The present invention relates to the technical field of network information security, in particular to a security protection method, device, equipment and computer-readable storage medium. Background technique [0002] The Linux operating system is a clone system developed based on the UNIX operating system. It is widely used by major enterprises for its stable performance and efficient operation. At present, most basic operations of the system are completed using commands. However, these input commands will There are some behaviors that threaten system security, and the losses caused by them will have a non-negligible impact. By obtaining the history records of shell commands and analyzing the shell commands, it is possible to judge whether the input command poses a security risk to the system and record the source of the IP address. However, analyzing some abnormal commands and locating some abnormal IP addresses through the historical records cannot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/566G06F21/57
Inventor 朱贺军邓省三
Owner 北京亿赛通科技发展有限责任公司