Computer operating system safety protecting method

An operating system and security protection technology, applied in computing, instrumentation, electrical and digital data processing, etc., can solve problems such as no secure operating system and no foundation for network security.

Inactive Publication Date: 2006-03-08
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a network environment, the security of the network system depends on the security of each host system in the network, and the security of the h

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer operating system safety protecting method
  • Computer operating system safety protecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] as attached figure 2 As shown, the operating system security protection method is implemented in the following ways:

[0014] The operating system security protection steps are as follows:

[0015] (1) Set up a digital signature and certificate database, a security management module and a confidential contract module in the user level of the Unix operating system. When the user requests access, the security management module and the confidential contract module are firstly authenticated, and the application program enters after passing the certification. Operating system kernel, access to resources, use of hardware devices, and communication between processes;

[0016] (2) A digital signature authentication access module is set at the kernel level of the Unix operating system to save relevant system call instructions in the system call interface, and the digital signature authentication access module directs the security-related system call instructions to the operati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method adds database of digital signature and certificate, module of security management and module of security agreement on Unix operating system (OS) at user level, and adds an access control module of digital signature authentication on Unix OS at kernel level. Without changing executable files of system and kernel, the method makes the each added module become an effective section of OS so as to be able to carry out security protection and effective control for whole Unix OS under condition of without rewriting operation and condition of transparence. Advantages are: simple, safety, practical and reliable.

Description

1. Technical field [0001] The invention relates to a computer application technology, in particular to a computer operating system safety protection method. 2. Background technology [0002] With the extensive and in-depth application of the Internet, the issue of information security has increasingly attracted people's attention. [0003] Currently common network security solutions: mainly use firewalls, intrusion detection systems, anti-virus and other security products. Network security is a systematic project, and the above-mentioned products can only address one aspect and solve some security problems. At present, many hackers also use a variety of methods to attack. If only one aspect of security problems is solved, real security cannot be achieved, so a systematic solution is necessary. [0004] Each security technology or product has a certain security effect. For example, the intrusion detection system can detect many intrusions. However, it should also be aware t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00
Inventor 黄家明刘正伟
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products