CN109740341A - A kind of program white list strategy fusion method and emerging system - Google Patents
A kind of program white list strategy fusion method and emerging system Download PDFInfo
- Publication number
- CN109740341A CN109740341A CN201811587665.1A CN201811587665A CN109740341A CN 109740341 A CN109740341 A CN 109740341A CN 201811587665 A CN201811587665 A CN 201811587665A CN 109740341 A CN109740341 A CN 109740341A
- Authority
- CN
- China
- Prior art keywords
- white list
- strategy
- program
- list strategy
- equation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Stored Programmes (AREA)
Abstract
The present invention relates to a kind of program white list strategy fusion method and emerging system, which includes: the third equation white list strategy for receiving multiple mechanisms, trusted third party and sending;Local program white list strategy and multiple third equation white list strategies are merged according to program white list strategy pooled model, fusion program white list strategy is generated, is sent to host.Program white list strategy fusion method and emerging system of the invention merges local program white list strategy and multiple third equation white list strategies, farthest to cover the software program that user may use, and guarantees best tactful timeliness.
Description
Technical field
The present invention relates to computer security technical field more particularly to a kind of program white list strategy fusion method and fusions
System.
Background technique
Program white list controling mechanism is according to program white list strategy to program installation, calling and the operation in host
It is controlled, only the program in program white list strategy just can be by normal mounting, calling and operation.Program white list peace
Full controlling mechanism can guarantee host operational safety well.
The feature (such as file hash value) that program white list strategy is generally basede on program generates, it is program white list peace
The core of full controlling mechanism.Program white list strategy is bigger to the coverage area of trusted software, updates more timely, the use of user
Experience will be better, conversely, the puzzlement that user will frequently encounter software installation and operation is intercepted, eventually affecting user makes
With the wish of program white list controling mechanism.
It receives and can effectively improve program white list strategy from the program white list strategy that mechanism, trusted third party provides
To the coverage area of trusted software, while it also can promote and improve the timeliness of program white list strategy.In general, credible
Tripartite mechanism is more, and program white list strategy will be more comprehensive, more timely to the covering of trusted software, and the experience of user will be got over
It is good.
Therefore it provides a kind of program white list strategy fusion method and emerging system.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
The program white list strategy fusion method and emerging system for stating problem, the program provided by merging multiple mechanisms, trusted third party
White list strategy expands program white list strategy to the coverage area of trusted software, improves the timeliness of program white list, promoted
User is experienced using the practical operation of program white list controling mechanism.
According to an aspect of the present invention, a kind of program white list strategy fusion method is provided, comprising the following steps:
Receive the third equation white list strategy that multiple mechanisms, trusted third party are sent;
According to program white list strategy pooled model to local program white list strategy and multiple third equation white lists
Strategy is merged, and is generated fusion program white list strategy, is sent to host.
Further, above procedure white list strategy fusion method, further includes: receiving third equation white list strategy
Certification is digitally signed to third equation white list strategy later.
Further, local program white list strategy and third equation white list strategy include: dbase, software
Unique features value, feature extraction algorithm mark, the strategy generating time, strategy mark, digital signature.
Further, program white list strategy pooled model includes screening model and duplicate removal computation model,
According to program white list strategy pooled model to local program white list strategy and multiple third equation white lists
Strategy is merged, and is implemented as follows: based on software source, software action and software code first to local program white list plan
It is slightly screened with the software in third equation white list strategy, then software-based unique features value and trusted third party's machine
The unique identity of structure removes the software in local program white list strategy and multiple third equation white list strategies
Weight, strategically identifies the plan to local program white list strategy and multiple third equation white list strategies during duplicate removal
Slightly mark carries out fusion treatment.
Further, above procedure white list strategy fusion method, further includes: according to the unique features value of software to fusion
Software in program white list strategy is ranked up.
Further, above procedure white list strategy fusion method, further includes: be sent in fusion program white list strategy
Before host, fusion program white list strategy is digitally signed.
Further, above procedure white list strategy fusion method, further includes: trusted third party's organization information and third party
Program white list strategy is associated.
Further, multiple third equation white list strategies are received in the following manner:
The third equation white list strategy of automatic downloading mechanism, trusted third party publication, reception mechanism, trusted third party push away
The third equation white list strategy that send receives the program white list strategy that mechanism, trusted third party is sent by other media.
According to another aspect of the present invention, program white list strategy emerging system is provided, comprising:
Third equation white list Policy receipt module, the third equation sent for receiving multiple mechanisms, trusted third party
Sequence white list strategy;
Program white list policy generation module is merged, for white to local program according to program white list strategy pooled model
List strategy and multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.
According to another aspect of the invention, a kind of computer readable storage medium is provided, computer program is stored thereon with,
It realizes when the program is executed by processor such as the step of the above method.
The present invention has the advantage that compared with prior art
1. program white list strategy fusion method and emerging system of the invention are to local program white list strategy and multiple
Third equation white list strategy is merged, and farthest to cover the software program that user may use, and is guaranteed most
Good tactful timeliness;
2. program white list strategy fusion method and emerging system of the invention are according to program white list strategy pooled model
Local program white list strategy and multiple third equation white list strategies are merged, then wanted according to local security management
It asks and therefrom selects specific strategy, can neatly meet and realize that local security manages target;
3. program white list strategy fusion method of the invention and emerging system can to fusion program white list strategy into
Row sequence, greatly reduces the policy lookup time loss of program white list strategy in use;
4. program white list strategy fusion method and emerging system of the invention count fusion program white list strategy
Word signature authentication guarantees the authenticity and integrity during policy distribution.
Detailed description of the invention
Below in conjunction with drawings and examples, the invention will be further described.
Fig. 1 is program white list strategy fusion method flow chart of the invention;
Fig. 2 is program white list strategy emerging system block diagram of the invention;
Fig. 3 is the application schematic diagram of program white list strategy emerging system of the invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless otherwise will not be explained in an idealized or overly formal meaning by specific definitions.
Fig. 1 is program white list strategy fusion method flow chart of the invention, and referring to Fig. 1, program provided by the invention is white
List strategy fusion method, comprising the following steps:
Step S11, the third equation white list strategy that multiple mechanisms, trusted third party are sent is received;Step S15, basis
Program white list strategy pooled model merges local program white list strategy and multiple third equation white list strategies,
Fusion program white list strategy is generated, host is sent to.
The present invention from multiple mechanisms, trusted third party obtain program white list strategy, and select wherein all or part as
Local program white list strategy is issued to local host after signature, as program white list controling mechanism strategy therein
Foundation.
Program white list strategy fusion method of the invention is white to local program white list strategy and multiple third equations
List strategy is merged, and farthest to cover the software program that user may use, and guarantees best tactful timeliness
Property.
Referring to Fig. 1, above procedure white list strategy fusion method, further includes: receiving third equation white list strategy
Later, certification step S12, is digitally signed to third equation white list strategy.In addition, mechanism, trusted third party is being sent
Third equation white list strategy is digitally signed before third equation white list strategy.
Further, local program white list strategy and third equation white list strategy include: dbase, software
Unique features value, feature extraction algorithm mark, the strategy generating time, strategy mark, digital signature.Wherein, strategy mark packet
Source identification, type identification, the capability identification etc. for including but being not limited to software.Strategy mark includes policy-source mark, policy class
Type mark, policy permissions mark etc..
Specifically, third equation white list strategy indicates to derive from the program white list strategy of mechanism, trusted third party,
Including but not limited to the following contents: dbase, the unique features value of software and its feature extraction algorithm identify such as hash value
With SHA-1 etc., strategy generating time, tactful mark, third-party institution's digital signature etc..Local program white list strategy should wrap
Contain but be not limited to the following contents: dbase, the unique features value of software and its feature extraction algorithm mark for example hash value and
SHA-1 etc., strategy generating time, tactful mark, program white list strategy emerging system digital signature etc..
Further, program white list strategy pooled model includes screening model and duplicate removal computation model,
According to program white list strategy pooled model to local program white list strategy and multiple third equation white lists
Strategy is merged, and is implemented as follows: based on software source, software action and software code first to local program white list plan
It is slightly screened with the software in third equation white list strategy, then software-based unique features value and trusted third party's machine
The unique identity of structure removes the software in local program white list strategy and multiple third equation white list strategies
Weight, strategically identifies the plan to local program white list strategy and multiple third equation white list strategies during duplicate removal
Slightly mark carries out fusion treatment, such as policy-source mark will obtain new policy-source according to collection union operation and identify.
Program white list strategy emerging system is that each mechanism, trusted third party establishes the unique identity that can be recognized,
And it is based on this identity, there is the label that can not be distorted and deny to third equation white list strategy, for example require
Mechanism, trusted third party is digitally signed its program white list strategy.
Screening model uses the credible behavior analysis method of program based on software source, software action and software code, right
Software carries out credibility Analysis.For example, having this to can prove that the software developed and provided by credible manufacturer, such as in software attributes
The digital signature of manufacturer, and to be evaluated as market standing extensively higher for the manufacturer, it is believed that the software trust;For example, logical
The antivirus software for crossing multiple manufacturers carries out viral diagnosis to software, if unanimously thinking no malicious code, it is also assumed that should
Software trust;It can also be using other software action Dynamic analysis tools, static program analysis tool based on code etc..More than
Method can be applied in combination.
Program white list strategy fusion method of the invention is white to local program according to program white list strategy pooled model
List strategy and multiple third equation white list strategies merge, and then require therefrom selection to have according to local security management
Body strategy can neatly meet and realize that local security manages target.
Referring to Fig. 1, above procedure white list strategy fusion method, further includes: step S13, according to the unique features of software
Value is ranked up the software in fusion program white list strategy.Such as software-based hash value, by dichotomy interpolation or
Bubble sort method is ranked up each policy entry, that is, software in fusion program white list strategy.
Program white list strategy fusion method of the invention can be ranked up fusion program white list strategy, greatly
Reduce the policy lookup time loss of program white list strategy in use.
Referring to Fig. 1, above procedure white list strategy fusion method, further includes: be sent in fusion program white list strategy
Before host, S14, fusion program white list strategy is digitally signed.The present invention carries out fusion program white list strategy
Digital signature, to ensure the authenticity and integrity of program white list strategy.Specifically, in fusion program white list strategy under
Before hair, using public private key mechanism, fusion program white list strategy is carried out using the private key of program white list strategy emerging system
Digital signature;After host receives fusion program white list strategy, program white list strategy is merged by digital signature authentication
Authenticity and integrity such as effectively prevent fusion program white list policy distribution, transmission and personation in application process, distorts at the wind
Danger.
Program white list strategy fusion method of the invention is digitally signed certification to fusion program white list strategy, protects
Demonstrate,prove the authenticity and integrity during policy distribution.
Further, above procedure white list strategy fusion method, further includes: trusted third party's organization information and third party
Program white list strategy is associated, and is able to record the specific source of program white list strategy, that is, which credible third come from
Square mechanism enables calling program white list strategy emerging system to trace to the source third equation white list strategy, judges these
Policy-source is in which mechanism, trusted third party.
Further, multiple third equation white list strategies are received in the following manner:
The third equation white list strategy of automatic downloading mechanism, trusted third party publication, reception mechanism, trusted third party push away
The third equation white list strategy that send receives the program white list strategy that mechanism, trusted third party is sent by other media.
For embodiment of the method, for simple description, therefore, it is stated as a series of action combinations, but this field
Technical staff should be aware of, and embodiment of that present invention are not limited by the describe sequence of actions, because implementing according to the present invention
Example, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know that, specification
Described in embodiment belong to preferred embodiment, the actions involved are not necessarily necessary for embodiments of the present invention.
Fig. 2 is program white list strategy emerging system block diagram of the invention, and referring to fig. 2, the present invention also provides a kind of programs
White list strategy emerging system, comprising:
Third equation white list Policy receipt module, for receiving multiple third equation white list strategies;
Program white list policy generation module is merged, for white to local program according to program white list strategy pooled model
List strategy and multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.
Program white list strategy emerging system of the invention is white to local program white list strategy and multiple third equations
List strategy is merged, and farthest to cover the software program that user may use, and guarantees best tactful timeliness
Property.
Fig. 3 is the application schematic diagram of program white list strategy emerging system of the invention, referring to Fig. 3, program white list plan
Slightly emerging system obtains third equation white list strategy from multiple mechanisms, trusted third party, and verifies the authenticity of these strategies
And integrality;The third party third equation white list strategy received being saved in program white list strategy emerging system
In program white list policy library;Program white list strategy emerging system is required according to local security management, using file hash value,
Such as unique features of the SHA-1 as program, corresponding program white list strategy is generated to local trusted software, and be stored in this
In ground program white list policy library;Program whitelist management module in local security management module manages plan according to local security
Slightly, program white list strategy appropriate is selected from third equation white list policy library and local program white list policy library;
Program white list strategy after selection is ranked up by program white list strategy emerging system, is then added digital signature, is issued
To local host.
The third party third equation white list strategy received being saved in program white list strategy emerging system
In program white list policy library, be implemented as follows: program white list strategy emerging system provides software trust verification tool, soft
Part trust authentication method includes but is not limited to: 1, based on the verifying of software source;2, based on the verifying of code analysis;3, based on soft
The verifying etc. of part behavior.The support of program white list strategy emerging system automates or manual type carries out designated software credible
Verifying, after being only verified as trusted software, program white list strategy emerging system just can be the software generator white list
Strategy, and the strategy is stored in third equation white list policy library.Program white list strategy emerging system can be using certainly
Dynamicization or manual method provide program white list strategy generating tool to being verified as the white name of the corresponding program of believable Software Create
Single strategy.
Whether the present invention supports locally may be used using a variety of methods (being such as based on software source, code and behavior) verifying software
Letter guarantees the correctness of local program white list strategy itself;Program white list strategy emerging system can using automation or
Manual method, whether verifying specific software is credible.
Local program whitelist management module can be according to local security management strategy, to third equation white list strategy
After library and local program white list policy library carry out policy selection, merging and duplicate removal, program white list strategy to be issued is generated.
Program white list strategy emerging system can generate local program white list strategy according to local security management strategy
Library, the software that this feature can support other mechanisms, trusted third party not find or do not support, such as local proprietary application
Software etc..
Local security management strategy changes according to the different demands of different hosts, for example, local security management strategy can
To use loose management mode, host installation and operation is allowed to be not considered the software of malicious code, then program white list
Program whitelist management module in tactful emerging system is just from third equation white list policy library and local program white list
Whole strategies is selected in policy library, after sorting and adding digital signature, is issued to host;Local security management strategy can be with
Using strict control mode, permission host installation and operation applies relevant software to local service, then program white list
Program whitelist management module in tactful emerging system just only selects corresponding software from local program white list policy library
Program white list strategy is issued to host after sorting and adding digital signature.
For system embodiments, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
In addition, it is stored thereon with computer program the embodiment of the invention also provides a kind of computer readable storage medium,
The step of program realizes method as described above when being executed by processor.
In the present embodiment, if the module/unit integrated based on program white list strategy emerging system is with software function
Can the form of unit realize and when sold or used as an independent product, can store in computer-readable storage Jie
In matter.Based on this understanding, the present invention realizes all or part of the process in above-described embodiment method, can also pass through calculating
Machine program is completed to instruct relevant hardware, and the computer program can be stored in a computer readable storage medium,
The computer program is when being executed by processor, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer journey
Sequence includes computer program code, and the computer program code can be source code form, object identification code form, executable text
Part or certain intermediate forms etc..The computer-readable medium may include: that can carry appointing for the computer program code
What entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, computer storage, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunications letter
Number and software distribution medium etc..It should be noted that the content that the computer-readable medium includes can be managed according to the administration of justice
Local legislation and the requirement of patent practice carry out increase and decrease appropriate, such as in certain jurisdictions, according to legislation and patent
Practice, computer-readable medium does not include electric carrier signal and telecommunication signal.
Computer equipment provided in an embodiment of the present invention, including memory, processor and storage are on a memory and can be
The computer program run on processor, the processor realize above-mentioned each program white list when executing the computer program
Step in tactful fusion method embodiment, such as step S11 shown in FIG. 1, the multiple mechanisms, trusted third party of reception are sent
Third equation white list strategy;Step S12, certification is digitally signed to third equation white list strategy;Step S13,
The software in fusion program white list strategy is ranked up according to the unique features value of software;Step S14, white to fusion program
List strategy is digitally signed;Step S15, according to program white list strategy pooled model to local program white list strategy and
Multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.Alternatively, described
Processor realized when executing the computer program it is above-mentioned respectively based on each module in program white list strategy emerging system embodiment/
The function of unit, such as third equation white list Policy receipt module shown in Fig. 2, fusion program white list strategy generating mould
Block.
Illustratively, the computer program can be divided into one or more module/units, one or more
A module/unit is stored in the memory, and is executed by the processor, to complete the present invention.It is one or more
A module/unit can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing institute
Computer program is stated in the implementation procedure based in program white list strategy emerging system.For example, the computer program
Third equation white list Policy receipt module, fusion program white list policy generation module can be divided into.
The computer equipment can be the calculating such as desktop PC, notebook, palm PC and cloud server and set
It is standby.The computer equipment may include, but be not limited only to, processor, memory.
The processor can be central processing unit (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng the processor is the control centre of the computer equipment, utilizes various interfaces and the entire computer equipment of connection
Various pieces.
The memory can be used for storing the computer program and/or module, and the processor is by operation or executes
Computer program in the memory and/or module are stored, and calls the data being stored in memory, described in realization
The various functions of computer equipment.The memory can mainly include storing program area and storage data area, wherein storage program
It area can application program (such as sound-playing function, image player function etc.) needed for storage program area, at least one function
Deng;Storage data area, which can be stored, uses created data (such as audio data, phone directory etc.) etc. according to mobile phone.In addition,
Memory may include high-speed random access memory, can also include nonvolatile memory, such as hard disk, memory, grafting
Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card
(Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
It will be appreciated by those of skill in the art that although some embodiments in this include included in other embodiments
Certain features rather than other feature, but the combination of the feature of different embodiments means to be within the scope of the present invention simultaneously
And form different embodiments.For example, in the following claims, the one of any of embodiment claimed all may be used
Come in a manner of in any combination using.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of program white list strategy fusion method, which comprises the following steps:
Receive the third equation white list strategy that multiple mechanisms, trusted third party are sent;
According to program white list strategy pooled model to local program white list strategy and multiple third equation white list strategies
It is merged, generates fusion program white list strategy, be sent to host.
2. program white list strategy fusion method according to claim 1, which is characterized in that further include: receiving third
Certification is digitally signed to third equation white list strategy after equation white list strategy.
3. program white list strategy fusion method according to claim 2, which is characterized in that local program white list strategy
It include: dbase, the unique features value of software, feature extraction algorithm mark, strategy with third equation white list strategy
Generate time, strategy mark, digital signature.
4. program white list strategy fusion method according to claim 3, which is characterized in that program white list strategy merges
Model includes screening model and duplicate removal computation model,
According to program white list strategy pooled model to local program white list strategy and multiple third equation white list strategies
Merged, be implemented as follows: based on software source, software action and software code first to local program white list strategy and
Software in third equation white list strategy is screened, then software-based unique features value and mechanism, trusted third party
Unique identity carries out duplicate removal to the software in local program white list strategy and multiple third equation white list strategies,
The strategy mark to local program white list strategy and multiple third equation white list strategies is strategically identified during duplicate removal
Know and carries out fusion treatment.
5. program white list strategy fusion method according to claim 4, which is characterized in that in fusion program white list plan
Slightly it is sent to before host, further includes:
The software in fusion program white list strategy is ranked up according to the unique features value of software.
6. program white list strategy fusion method according to claim 5, which is characterized in that further include: in fusion program
White list strategy is sent to before host, is digitally signed to fusion program white list strategy.
7. program white list strategy fusion method according to claim 6, which is characterized in that further include: trusted third party
Organization information is associated with third equation white list strategy.
8. program white list strategy fusion method according to claim 7, which is characterized in that receive in the following manner more
A third equation white list strategy:
The third equation white list strategy of automatic downloading mechanism, trusted third party publication receives the push of mechanism, trusted third party
Third equation white list strategy receives the program white list strategy that mechanism, trusted third party is sent by other media.
9. a kind of program white list strategy emerging system for realizing fusion method described in claim 1, comprising:
Third equation white list Policy receipt module, it is white for receiving the third equation that multiple mechanisms, trusted third party are sent
List strategy;
Program white list policy generation module is merged, is used for according to program white list strategy pooled model to local program white list
Tactful and multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
It is realized when execution such as the step of any one of claim 1-8 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811587665.1A CN109740341B (en) | 2018-12-25 | 2018-12-25 | Program white list strategy fusion method and fusion system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811587665.1A CN109740341B (en) | 2018-12-25 | 2018-12-25 | Program white list strategy fusion method and fusion system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109740341A true CN109740341A (en) | 2019-05-10 |
CN109740341B CN109740341B (en) | 2021-03-12 |
Family
ID=66359732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811587665.1A Active CN109740341B (en) | 2018-12-25 | 2018-12-25 | Program white list strategy fusion method and fusion system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109740341B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102547683A (en) * | 2011-12-16 | 2012-07-04 | 上海华勤通讯技术有限公司 | Blacklist sharing system and sharing method |
CN103530557A (en) * | 2013-03-12 | 2014-01-22 | Tcl集团股份有限公司 | Method and system for scanning virus apk based on cloud terminal mass samples |
US20150207818A1 (en) * | 2014-01-22 | 2015-07-23 | Cisco Technology, Inc. | Overcoming circular dependencies when bootstrapping an rpki site |
JP2017004334A (en) * | 2015-06-12 | 2017-01-05 | 三菱電機株式会社 | calculator |
CN107944232A (en) * | 2017-12-08 | 2018-04-20 | 郑州云海信息技术有限公司 | A kind of design method and system of the Active Defending System Against based on white list technology |
WO2018182126A1 (en) * | 2017-03-29 | 2018-10-04 | 최승환 | System and method for authenticating safe software |
CN108989304A (en) * | 2018-07-05 | 2018-12-11 | 北京广成同泰科技有限公司 | A kind of trusted software white list construction method |
CN109067709A (en) * | 2018-07-06 | 2018-12-21 | 北京知道创宇信息技术有限公司 | A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium |
CN109165335A (en) * | 2018-06-26 | 2019-01-08 | 杭州排列科技有限公司 | Internet finance blacklist system and its application method based on big data |
-
2018
- 2018-12-25 CN CN201811587665.1A patent/CN109740341B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102547683A (en) * | 2011-12-16 | 2012-07-04 | 上海华勤通讯技术有限公司 | Blacklist sharing system and sharing method |
CN103530557A (en) * | 2013-03-12 | 2014-01-22 | Tcl集团股份有限公司 | Method and system for scanning virus apk based on cloud terminal mass samples |
US20150207818A1 (en) * | 2014-01-22 | 2015-07-23 | Cisco Technology, Inc. | Overcoming circular dependencies when bootstrapping an rpki site |
JP2017004334A (en) * | 2015-06-12 | 2017-01-05 | 三菱電機株式会社 | calculator |
WO2018182126A1 (en) * | 2017-03-29 | 2018-10-04 | 최승환 | System and method for authenticating safe software |
CN107944232A (en) * | 2017-12-08 | 2018-04-20 | 郑州云海信息技术有限公司 | A kind of design method and system of the Active Defending System Against based on white list technology |
CN109165335A (en) * | 2018-06-26 | 2019-01-08 | 杭州排列科技有限公司 | Internet finance blacklist system and its application method based on big data |
CN108989304A (en) * | 2018-07-05 | 2018-12-11 | 北京广成同泰科技有限公司 | A kind of trusted software white list construction method |
CN109067709A (en) * | 2018-07-06 | 2018-12-21 | 北京知道创宇信息技术有限公司 | A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109740341B (en) | 2021-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10735472B2 (en) | Container authorization policies for network trust | |
US10924517B2 (en) | Processing network traffic based on assessed security weaknesses | |
EP3905078A1 (en) | Identity verification method and system therefor | |
US10528765B2 (en) | Technologies for secure boot provisioning and management of field-programmable gate array images | |
US11076295B2 (en) | Remote management method, and device | |
US20170068810A1 (en) | Method and apparatus for installing an application program based on an intelligent terminal device | |
US20150302182A1 (en) | Comparing applications and assessing differences | |
WO2015180690A1 (en) | Method and device for reading verification information | |
EP3120290A1 (en) | Techniques to provide network security through just-in-time provisioned accounts | |
US10425445B2 (en) | Deception using screen capture | |
US10489145B2 (en) | Secure update of firmware and software | |
WO2014209416A1 (en) | Process authentication and resource permissions | |
MX2014009046A (en) | Centralized operation management. | |
JP2012533128A (en) | System and method for providing a secure virtual machine | |
CN103620556A (en) | Binding applications to device capabilities | |
US20190014152A1 (en) | Network access by applications in an enterprise managed device system | |
US20180198620A1 (en) | Systems and methods for assuring data on leased computing resources | |
US10379894B1 (en) | Lineage-based trust for virtual machine images | |
US20140317704A1 (en) | Method and system for enabling the federation of unrelated applications | |
CN107835228A (en) | A kind of command processing method and device based on DYNAMIC GENERALIZED route | |
JP2006350850A (en) | Method, device and program for reconstructing software package | |
WO2023034423A1 (en) | Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger | |
US11979411B2 (en) | Control of access to computing resources implemented in isolated environments | |
US9189629B1 (en) | Systems and methods for discouraging polymorphic malware | |
US20150067766A1 (en) | Application service management device and application service management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220325 Address after: 518000 2107b, Shenzhen International Culture Building, Futian street, Futian Road, Futian District, Shenzhen, Guangdong Province Patentee after: SHENZHEN HUAHUI DATA SERVICE Co.,Ltd. Address before: Room 8077, 7 / F, building A2, No. 13, Fengzhi East Road, Haidian District, Beijing 100094 Patentee before: BEIJING GUANGCHENG TONGTAI TECHNOLOGY Co.,Ltd. |