Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing security of operating system

An operating system and security technology, applied in the field of computer systems, can solve problems such as difficult maintenance

Pending Publication Date: 2022-05-27
MOXA INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Maintaining Linux security modules to protect Linux software is difficult for those who have little knowledge of Linux system features and security threat models

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing security of operating system
  • Method and device for processing security of operating system
  • Method and device for processing security of operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention explores whether an auto generation secure module policy can be developed based on a real time scenario, whether there is an alternative scheme to replace the concept of rules, and under security conditions, whether the auto generation secure module policy supports Interact with security developers (eg adding new rules or requesting permission).

[0017] The problem statement of traditional security modules (eg, Security-Enhanced Linux (SELinux), Application Armor (Apparmor)) is as follows.

[0018] Problem (1): The environment of the operating system is very complex, and it is difficult to apply rules to protect the applications and / or files of the operating system. For example, after a software developer completes software development in a Linux box (eg, device, product, device), the Linux box is provided to a security developer to develop a security module for protecting the software. In one embodiment, the Linux box includes an NGINX (web) ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for handling security of an operating system includes turning on an unlock mode of the operating system and turning off an interactive mode of the operating system; recording a plurality of activities of the operating system in a list; creating a security threat model for the operating system according to the plurality of activities; performing a first system test on the security threat model; and closing the unlocking mode and opening the interaction mode.

Description

【Technical field】 [0001] The present invention relates to a method and apparatus for a computer system, and more particularly, to a method and apparatus for handling the security of an operating system. 【Background technique】 [0002] Over the past few years, various Linux security modules (LSMs) have been developed on Linux distributions, such as Security-Enhanced Linux (SELinux), Application Armor (Application Armor, Apparmor), Simplified Mandatory Access Control Kernel (Simplified Mandatory Access Control Kernel, Smack), and Tomoyoproject. Nevertheless, the Linux security module still needs to be improved. In detail, the high barrier to entry of Linux security modules discourages most developers (eg security developers). Maintaining Linux security modules to protect Linux software is difficult for those with little knowledge of Linux system characteristics and security threat models. [0003] In most cases, Linux security modules are developed at a later stage of produ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F21/52G06F2221/2113G06F2221/2105G06F11/302G06F11/3476G06F21/577G06F2221/034G06F2221/2149
Inventor 永达·陈
Owner MOXA INC