Method and device for processing security of operating system
An operating system and security technology, applied in the field of computer systems, can solve problems such as difficult maintenance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] The present invention explores whether an auto generation secure module policy can be developed based on a real time scenario, whether there is an alternative scheme to replace the concept of rules, and under security conditions, whether the auto generation secure module policy supports Interact with security developers (eg adding new rules or requesting permission).
[0017] The problem statement of traditional security modules (eg, Security-Enhanced Linux (SELinux), Application Armor (Apparmor)) is as follows.
[0018] Problem (1): The environment of the operating system is very complex, and it is difficult to apply rules to protect the applications and / or files of the operating system. For example, after a software developer completes software development in a Linux box (eg, device, product, device), the Linux box is provided to a security developer to develop a security module for protecting the software. In one embodiment, the Linux box includes an NGINX (web) ser...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


