CN109740341A - A kind of program white list strategy fusion method and emerging system - Google Patents

A kind of program white list strategy fusion method and emerging system Download PDF

Info

Publication number
CN109740341A
CN109740341A CN201811587665.1A CN201811587665A CN109740341A CN 109740341 A CN109740341 A CN 109740341A CN 201811587665 A CN201811587665 A CN 201811587665A CN 109740341 A CN109740341 A CN 109740341A
Authority
CN
China
Prior art keywords
white list
strategy
program
list strategy
equation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811587665.1A
Other languages
Chinese (zh)
Other versions
CN109740341B (en
Inventor
李晓勇
郭煜
贺丽红
邓霄霄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HUAHUI DATA SERVICE Co.,Ltd.
Original Assignee
Beijing Guang Cheng Tong Tai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guang Cheng Tong Tai Technology Co Ltd filed Critical Beijing Guang Cheng Tong Tai Technology Co Ltd
Priority to CN201811587665.1A priority Critical patent/CN109740341B/en
Publication of CN109740341A publication Critical patent/CN109740341A/en
Application granted granted Critical
Publication of CN109740341B publication Critical patent/CN109740341B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The present invention relates to a kind of program white list strategy fusion method and emerging system, which includes: the third equation white list strategy for receiving multiple mechanisms, trusted third party and sending;Local program white list strategy and multiple third equation white list strategies are merged according to program white list strategy pooled model, fusion program white list strategy is generated, is sent to host.Program white list strategy fusion method and emerging system of the invention merges local program white list strategy and multiple third equation white list strategies, farthest to cover the software program that user may use, and guarantees best tactful timeliness.

Description

A kind of program white list strategy fusion method and emerging system
Technical field
The present invention relates to computer security technical field more particularly to a kind of program white list strategy fusion method and fusions System.
Background technique
Program white list controling mechanism is according to program white list strategy to program installation, calling and the operation in host It is controlled, only the program in program white list strategy just can be by normal mounting, calling and operation.Program white list peace Full controlling mechanism can guarantee host operational safety well.
The feature (such as file hash value) that program white list strategy is generally basede on program generates, it is program white list peace The core of full controlling mechanism.Program white list strategy is bigger to the coverage area of trusted software, updates more timely, the use of user Experience will be better, conversely, the puzzlement that user will frequently encounter software installation and operation is intercepted, eventually affecting user makes With the wish of program white list controling mechanism.
It receives and can effectively improve program white list strategy from the program white list strategy that mechanism, trusted third party provides To the coverage area of trusted software, while it also can promote and improve the timeliness of program white list strategy.In general, credible Tripartite mechanism is more, and program white list strategy will be more comprehensive, more timely to the covering of trusted software, and the experience of user will be got over It is good.
Therefore it provides a kind of program white list strategy fusion method and emerging system.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind The program white list strategy fusion method and emerging system for stating problem, the program provided by merging multiple mechanisms, trusted third party White list strategy expands program white list strategy to the coverage area of trusted software, improves the timeliness of program white list, promoted User is experienced using the practical operation of program white list controling mechanism.
According to an aspect of the present invention, a kind of program white list strategy fusion method is provided, comprising the following steps:
Receive the third equation white list strategy that multiple mechanisms, trusted third party are sent;
According to program white list strategy pooled model to local program white list strategy and multiple third equation white lists Strategy is merged, and is generated fusion program white list strategy, is sent to host.
Further, above procedure white list strategy fusion method, further includes: receiving third equation white list strategy Certification is digitally signed to third equation white list strategy later.
Further, local program white list strategy and third equation white list strategy include: dbase, software Unique features value, feature extraction algorithm mark, the strategy generating time, strategy mark, digital signature.
Further, program white list strategy pooled model includes screening model and duplicate removal computation model,
According to program white list strategy pooled model to local program white list strategy and multiple third equation white lists Strategy is merged, and is implemented as follows: based on software source, software action and software code first to local program white list plan It is slightly screened with the software in third equation white list strategy, then software-based unique features value and trusted third party's machine The unique identity of structure removes the software in local program white list strategy and multiple third equation white list strategies Weight, strategically identifies the plan to local program white list strategy and multiple third equation white list strategies during duplicate removal Slightly mark carries out fusion treatment.
Further, above procedure white list strategy fusion method, further includes: according to the unique features value of software to fusion Software in program white list strategy is ranked up.
Further, above procedure white list strategy fusion method, further includes: be sent in fusion program white list strategy Before host, fusion program white list strategy is digitally signed.
Further, above procedure white list strategy fusion method, further includes: trusted third party's organization information and third party Program white list strategy is associated.
Further, multiple third equation white list strategies are received in the following manner:
The third equation white list strategy of automatic downloading mechanism, trusted third party publication, reception mechanism, trusted third party push away The third equation white list strategy that send receives the program white list strategy that mechanism, trusted third party is sent by other media.
According to another aspect of the present invention, program white list strategy emerging system is provided, comprising:
Third equation white list Policy receipt module, the third equation sent for receiving multiple mechanisms, trusted third party Sequence white list strategy;
Program white list policy generation module is merged, for white to local program according to program white list strategy pooled model List strategy and multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.
According to another aspect of the invention, a kind of computer readable storage medium is provided, computer program is stored thereon with, It realizes when the program is executed by processor such as the step of the above method.
The present invention has the advantage that compared with prior art
1. program white list strategy fusion method and emerging system of the invention are to local program white list strategy and multiple Third equation white list strategy is merged, and farthest to cover the software program that user may use, and is guaranteed most Good tactful timeliness;
2. program white list strategy fusion method and emerging system of the invention are according to program white list strategy pooled model Local program white list strategy and multiple third equation white list strategies are merged, then wanted according to local security management It asks and therefrom selects specific strategy, can neatly meet and realize that local security manages target;
3. program white list strategy fusion method of the invention and emerging system can to fusion program white list strategy into Row sequence, greatly reduces the policy lookup time loss of program white list strategy in use;
4. program white list strategy fusion method and emerging system of the invention count fusion program white list strategy Word signature authentication guarantees the authenticity and integrity during policy distribution.
Detailed description of the invention
Below in conjunction with drawings and examples, the invention will be further described.
Fig. 1 is program white list strategy fusion method flow chart of the invention;
Fig. 2 is program white list strategy emerging system block diagram of the invention;
Fig. 3 is the application schematic diagram of program white list strategy emerging system of the invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless otherwise will not be explained in an idealized or overly formal meaning by specific definitions.
Fig. 1 is program white list strategy fusion method flow chart of the invention, and referring to Fig. 1, program provided by the invention is white List strategy fusion method, comprising the following steps:
Step S11, the third equation white list strategy that multiple mechanisms, trusted third party are sent is received;Step S15, basis Program white list strategy pooled model merges local program white list strategy and multiple third equation white list strategies, Fusion program white list strategy is generated, host is sent to.
The present invention from multiple mechanisms, trusted third party obtain program white list strategy, and select wherein all or part as Local program white list strategy is issued to local host after signature, as program white list controling mechanism strategy therein Foundation.
Program white list strategy fusion method of the invention is white to local program white list strategy and multiple third equations List strategy is merged, and farthest to cover the software program that user may use, and guarantees best tactful timeliness Property.
Referring to Fig. 1, above procedure white list strategy fusion method, further includes: receiving third equation white list strategy Later, certification step S12, is digitally signed to third equation white list strategy.In addition, mechanism, trusted third party is being sent Third equation white list strategy is digitally signed before third equation white list strategy.
Further, local program white list strategy and third equation white list strategy include: dbase, software Unique features value, feature extraction algorithm mark, the strategy generating time, strategy mark, digital signature.Wherein, strategy mark packet Source identification, type identification, the capability identification etc. for including but being not limited to software.Strategy mark includes policy-source mark, policy class Type mark, policy permissions mark etc..
Specifically, third equation white list strategy indicates to derive from the program white list strategy of mechanism, trusted third party, Including but not limited to the following contents: dbase, the unique features value of software and its feature extraction algorithm identify such as hash value With SHA-1 etc., strategy generating time, tactful mark, third-party institution's digital signature etc..Local program white list strategy should wrap Contain but be not limited to the following contents: dbase, the unique features value of software and its feature extraction algorithm mark for example hash value and SHA-1 etc., strategy generating time, tactful mark, program white list strategy emerging system digital signature etc..
Further, program white list strategy pooled model includes screening model and duplicate removal computation model,
According to program white list strategy pooled model to local program white list strategy and multiple third equation white lists Strategy is merged, and is implemented as follows: based on software source, software action and software code first to local program white list plan It is slightly screened with the software in third equation white list strategy, then software-based unique features value and trusted third party's machine The unique identity of structure removes the software in local program white list strategy and multiple third equation white list strategies Weight, strategically identifies the plan to local program white list strategy and multiple third equation white list strategies during duplicate removal Slightly mark carries out fusion treatment, such as policy-source mark will obtain new policy-source according to collection union operation and identify.
Program white list strategy emerging system is that each mechanism, trusted third party establishes the unique identity that can be recognized, And it is based on this identity, there is the label that can not be distorted and deny to third equation white list strategy, for example require Mechanism, trusted third party is digitally signed its program white list strategy.
Screening model uses the credible behavior analysis method of program based on software source, software action and software code, right Software carries out credibility Analysis.For example, having this to can prove that the software developed and provided by credible manufacturer, such as in software attributes The digital signature of manufacturer, and to be evaluated as market standing extensively higher for the manufacturer, it is believed that the software trust;For example, logical The antivirus software for crossing multiple manufacturers carries out viral diagnosis to software, if unanimously thinking no malicious code, it is also assumed that should Software trust;It can also be using other software action Dynamic analysis tools, static program analysis tool based on code etc..More than Method can be applied in combination.
Program white list strategy fusion method of the invention is white to local program according to program white list strategy pooled model List strategy and multiple third equation white list strategies merge, and then require therefrom selection to have according to local security management Body strategy can neatly meet and realize that local security manages target.
Referring to Fig. 1, above procedure white list strategy fusion method, further includes: step S13, according to the unique features of software Value is ranked up the software in fusion program white list strategy.Such as software-based hash value, by dichotomy interpolation or Bubble sort method is ranked up each policy entry, that is, software in fusion program white list strategy.
Program white list strategy fusion method of the invention can be ranked up fusion program white list strategy, greatly Reduce the policy lookup time loss of program white list strategy in use.
Referring to Fig. 1, above procedure white list strategy fusion method, further includes: be sent in fusion program white list strategy Before host, S14, fusion program white list strategy is digitally signed.The present invention carries out fusion program white list strategy Digital signature, to ensure the authenticity and integrity of program white list strategy.Specifically, in fusion program white list strategy under Before hair, using public private key mechanism, fusion program white list strategy is carried out using the private key of program white list strategy emerging system Digital signature;After host receives fusion program white list strategy, program white list strategy is merged by digital signature authentication Authenticity and integrity such as effectively prevent fusion program white list policy distribution, transmission and personation in application process, distorts at the wind Danger.
Program white list strategy fusion method of the invention is digitally signed certification to fusion program white list strategy, protects Demonstrate,prove the authenticity and integrity during policy distribution.
Further, above procedure white list strategy fusion method, further includes: trusted third party's organization information and third party Program white list strategy is associated, and is able to record the specific source of program white list strategy, that is, which credible third come from Square mechanism enables calling program white list strategy emerging system to trace to the source third equation white list strategy, judges these Policy-source is in which mechanism, trusted third party.
Further, multiple third equation white list strategies are received in the following manner:
The third equation white list strategy of automatic downloading mechanism, trusted third party publication, reception mechanism, trusted third party push away The third equation white list strategy that send receives the program white list strategy that mechanism, trusted third party is sent by other media.
For embodiment of the method, for simple description, therefore, it is stated as a series of action combinations, but this field Technical staff should be aware of, and embodiment of that present invention are not limited by the describe sequence of actions, because implementing according to the present invention Example, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know that, specification Described in embodiment belong to preferred embodiment, the actions involved are not necessarily necessary for embodiments of the present invention.
Fig. 2 is program white list strategy emerging system block diagram of the invention, and referring to fig. 2, the present invention also provides a kind of programs White list strategy emerging system, comprising:
Third equation white list Policy receipt module, for receiving multiple third equation white list strategies;
Program white list policy generation module is merged, for white to local program according to program white list strategy pooled model List strategy and multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.
Program white list strategy emerging system of the invention is white to local program white list strategy and multiple third equations List strategy is merged, and farthest to cover the software program that user may use, and guarantees best tactful timeliness Property.
Fig. 3 is the application schematic diagram of program white list strategy emerging system of the invention, referring to Fig. 3, program white list plan Slightly emerging system obtains third equation white list strategy from multiple mechanisms, trusted third party, and verifies the authenticity of these strategies And integrality;The third party third equation white list strategy received being saved in program white list strategy emerging system In program white list policy library;Program white list strategy emerging system is required according to local security management, using file hash value, Such as unique features of the SHA-1 as program, corresponding program white list strategy is generated to local trusted software, and be stored in this In ground program white list policy library;Program whitelist management module in local security management module manages plan according to local security Slightly, program white list strategy appropriate is selected from third equation white list policy library and local program white list policy library; Program white list strategy after selection is ranked up by program white list strategy emerging system, is then added digital signature, is issued To local host.
The third party third equation white list strategy received being saved in program white list strategy emerging system In program white list policy library, be implemented as follows: program white list strategy emerging system provides software trust verification tool, soft Part trust authentication method includes but is not limited to: 1, based on the verifying of software source;2, based on the verifying of code analysis;3, based on soft The verifying etc. of part behavior.The support of program white list strategy emerging system automates or manual type carries out designated software credible Verifying, after being only verified as trusted software, program white list strategy emerging system just can be the software generator white list Strategy, and the strategy is stored in third equation white list policy library.Program white list strategy emerging system can be using certainly Dynamicization or manual method provide program white list strategy generating tool to being verified as the white name of the corresponding program of believable Software Create Single strategy.
Whether the present invention supports locally may be used using a variety of methods (being such as based on software source, code and behavior) verifying software Letter guarantees the correctness of local program white list strategy itself;Program white list strategy emerging system can using automation or Manual method, whether verifying specific software is credible.
Local program whitelist management module can be according to local security management strategy, to third equation white list strategy After library and local program white list policy library carry out policy selection, merging and duplicate removal, program white list strategy to be issued is generated.
Program white list strategy emerging system can generate local program white list strategy according to local security management strategy Library, the software that this feature can support other mechanisms, trusted third party not find or do not support, such as local proprietary application Software etc..
Local security management strategy changes according to the different demands of different hosts, for example, local security management strategy can To use loose management mode, host installation and operation is allowed to be not considered the software of malicious code, then program white list Program whitelist management module in tactful emerging system is just from third equation white list policy library and local program white list Whole strategies is selected in policy library, after sorting and adding digital signature, is issued to host;Local security management strategy can be with Using strict control mode, permission host installation and operation applies relevant software to local service, then program white list Program whitelist management module in tactful emerging system just only selects corresponding software from local program white list policy library Program white list strategy is issued to host after sorting and adding digital signature.
For system embodiments, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
In addition, it is stored thereon with computer program the embodiment of the invention also provides a kind of computer readable storage medium, The step of program realizes method as described above when being executed by processor.
In the present embodiment, if the module/unit integrated based on program white list strategy emerging system is with software function Can the form of unit realize and when sold or used as an independent product, can store in computer-readable storage Jie In matter.Based on this understanding, the present invention realizes all or part of the process in above-described embodiment method, can also pass through calculating Machine program is completed to instruct relevant hardware, and the computer program can be stored in a computer readable storage medium, The computer program is when being executed by processor, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer journey Sequence includes computer program code, and the computer program code can be source code form, object identification code form, executable text Part or certain intermediate forms etc..The computer-readable medium may include: that can carry appointing for the computer program code What entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunications letter Number and software distribution medium etc..It should be noted that the content that the computer-readable medium includes can be managed according to the administration of justice Local legislation and the requirement of patent practice carry out increase and decrease appropriate, such as in certain jurisdictions, according to legislation and patent Practice, computer-readable medium does not include electric carrier signal and telecommunication signal.
Computer equipment provided in an embodiment of the present invention, including memory, processor and storage are on a memory and can be The computer program run on processor, the processor realize above-mentioned each program white list when executing the computer program Step in tactful fusion method embodiment, such as step S11 shown in FIG. 1, the multiple mechanisms, trusted third party of reception are sent Third equation white list strategy;Step S12, certification is digitally signed to third equation white list strategy;Step S13, The software in fusion program white list strategy is ranked up according to the unique features value of software;Step S14, white to fusion program List strategy is digitally signed;Step S15, according to program white list strategy pooled model to local program white list strategy and Multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.Alternatively, described Processor realized when executing the computer program it is above-mentioned respectively based on each module in program white list strategy emerging system embodiment/ The function of unit, such as third equation white list Policy receipt module shown in Fig. 2, fusion program white list strategy generating mould Block.
Illustratively, the computer program can be divided into one or more module/units, one or more A module/unit is stored in the memory, and is executed by the processor, to complete the present invention.It is one or more A module/unit can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing institute Computer program is stated in the implementation procedure based in program white list strategy emerging system.For example, the computer program Third equation white list Policy receipt module, fusion program white list policy generation module can be divided into.
The computer equipment can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The computer equipment may include, but be not limited only to, processor, memory.
The processor can be central processing unit (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng the processor is the control centre of the computer equipment, utilizes various interfaces and the entire computer equipment of connection Various pieces.
The memory can be used for storing the computer program and/or module, and the processor is by operation or executes Computer program in the memory and/or module are stored, and calls the data being stored in memory, described in realization The various functions of computer equipment.The memory can mainly include storing program area and storage data area, wherein storage program It area can application program (such as sound-playing function, image player function etc.) needed for storage program area, at least one function Deng;Storage data area, which can be stored, uses created data (such as audio data, phone directory etc.) etc. according to mobile phone.In addition, Memory may include high-speed random access memory, can also include nonvolatile memory, such as hard disk, memory, grafting Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
It will be appreciated by those of skill in the art that although some embodiments in this include included in other embodiments Certain features rather than other feature, but the combination of the feature of different embodiments means to be within the scope of the present invention simultaneously And form different embodiments.For example, in the following claims, the one of any of embodiment claimed all may be used Come in a manner of in any combination using.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of program white list strategy fusion method, which comprises the following steps:
Receive the third equation white list strategy that multiple mechanisms, trusted third party are sent;
According to program white list strategy pooled model to local program white list strategy and multiple third equation white list strategies It is merged, generates fusion program white list strategy, be sent to host.
2. program white list strategy fusion method according to claim 1, which is characterized in that further include: receiving third Certification is digitally signed to third equation white list strategy after equation white list strategy.
3. program white list strategy fusion method according to claim 2, which is characterized in that local program white list strategy It include: dbase, the unique features value of software, feature extraction algorithm mark, strategy with third equation white list strategy Generate time, strategy mark, digital signature.
4. program white list strategy fusion method according to claim 3, which is characterized in that program white list strategy merges Model includes screening model and duplicate removal computation model,
According to program white list strategy pooled model to local program white list strategy and multiple third equation white list strategies Merged, be implemented as follows: based on software source, software action and software code first to local program white list strategy and Software in third equation white list strategy is screened, then software-based unique features value and mechanism, trusted third party Unique identity carries out duplicate removal to the software in local program white list strategy and multiple third equation white list strategies, The strategy mark to local program white list strategy and multiple third equation white list strategies is strategically identified during duplicate removal Know and carries out fusion treatment.
5. program white list strategy fusion method according to claim 4, which is characterized in that in fusion program white list plan Slightly it is sent to before host, further includes:
The software in fusion program white list strategy is ranked up according to the unique features value of software.
6. program white list strategy fusion method according to claim 5, which is characterized in that further include: in fusion program White list strategy is sent to before host, is digitally signed to fusion program white list strategy.
7. program white list strategy fusion method according to claim 6, which is characterized in that further include: trusted third party Organization information is associated with third equation white list strategy.
8. program white list strategy fusion method according to claim 7, which is characterized in that receive in the following manner more A third equation white list strategy:
The third equation white list strategy of automatic downloading mechanism, trusted third party publication receives the push of mechanism, trusted third party Third equation white list strategy receives the program white list strategy that mechanism, trusted third party is sent by other media.
9. a kind of program white list strategy emerging system for realizing fusion method described in claim 1, comprising:
Third equation white list Policy receipt module, it is white for receiving the third equation that multiple mechanisms, trusted third party are sent List strategy;
Program white list policy generation module is merged, is used for according to program white list strategy pooled model to local program white list Tactful and multiple third equation white list strategies are merged, and are generated fusion program white list strategy, are sent to host.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor It is realized when execution such as the step of any one of claim 1-8 the method.
CN201811587665.1A 2018-12-25 2018-12-25 Program white list strategy fusion method and fusion system Active CN109740341B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811587665.1A CN109740341B (en) 2018-12-25 2018-12-25 Program white list strategy fusion method and fusion system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811587665.1A CN109740341B (en) 2018-12-25 2018-12-25 Program white list strategy fusion method and fusion system

Publications (2)

Publication Number Publication Date
CN109740341A true CN109740341A (en) 2019-05-10
CN109740341B CN109740341B (en) 2021-03-12

Family

ID=66359732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811587665.1A Active CN109740341B (en) 2018-12-25 2018-12-25 Program white list strategy fusion method and fusion system

Country Status (1)

Country Link
CN (1) CN109740341B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547683A (en) * 2011-12-16 2012-07-04 上海华勤通讯技术有限公司 Blacklist sharing system and sharing method
CN103530557A (en) * 2013-03-12 2014-01-22 Tcl集团股份有限公司 Method and system for scanning virus apk based on cloud terminal mass samples
US20150207818A1 (en) * 2014-01-22 2015-07-23 Cisco Technology, Inc. Overcoming circular dependencies when bootstrapping an rpki site
JP2017004334A (en) * 2015-06-12 2017-01-05 三菱電機株式会社 calculator
CN107944232A (en) * 2017-12-08 2018-04-20 郑州云海信息技术有限公司 A kind of design method and system of the Active Defending System Against based on white list technology
WO2018182126A1 (en) * 2017-03-29 2018-10-04 최승환 System and method for authenticating safe software
CN108989304A (en) * 2018-07-05 2018-12-11 北京广成同泰科技有限公司 A kind of trusted software white list construction method
CN109067709A (en) * 2018-07-06 2018-12-21 北京知道创宇信息技术有限公司 A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium
CN109165335A (en) * 2018-06-26 2019-01-08 杭州排列科技有限公司 Internet finance blacklist system and its application method based on big data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547683A (en) * 2011-12-16 2012-07-04 上海华勤通讯技术有限公司 Blacklist sharing system and sharing method
CN103530557A (en) * 2013-03-12 2014-01-22 Tcl集团股份有限公司 Method and system for scanning virus apk based on cloud terminal mass samples
US20150207818A1 (en) * 2014-01-22 2015-07-23 Cisco Technology, Inc. Overcoming circular dependencies when bootstrapping an rpki site
JP2017004334A (en) * 2015-06-12 2017-01-05 三菱電機株式会社 calculator
WO2018182126A1 (en) * 2017-03-29 2018-10-04 최승환 System and method for authenticating safe software
CN107944232A (en) * 2017-12-08 2018-04-20 郑州云海信息技术有限公司 A kind of design method and system of the Active Defending System Against based on white list technology
CN109165335A (en) * 2018-06-26 2019-01-08 杭州排列科技有限公司 Internet finance blacklist system and its application method based on big data
CN108989304A (en) * 2018-07-05 2018-12-11 北京广成同泰科技有限公司 A kind of trusted software white list construction method
CN109067709A (en) * 2018-07-06 2018-12-21 北京知道创宇信息技术有限公司 A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109740341B (en) 2021-03-12

Similar Documents

Publication Publication Date Title
US10735472B2 (en) Container authorization policies for network trust
US10924517B2 (en) Processing network traffic based on assessed security weaknesses
EP3905078A1 (en) Identity verification method and system therefor
US10528765B2 (en) Technologies for secure boot provisioning and management of field-programmable gate array images
US11076295B2 (en) Remote management method, and device
US20170068810A1 (en) Method and apparatus for installing an application program based on an intelligent terminal device
US20150302182A1 (en) Comparing applications and assessing differences
WO2015180690A1 (en) Method and device for reading verification information
EP3120290A1 (en) Techniques to provide network security through just-in-time provisioned accounts
US10425445B2 (en) Deception using screen capture
US10489145B2 (en) Secure update of firmware and software
WO2014209416A1 (en) Process authentication and resource permissions
MX2014009046A (en) Centralized operation management.
JP2012533128A (en) System and method for providing a secure virtual machine
CN103620556A (en) Binding applications to device capabilities
US20190014152A1 (en) Network access by applications in an enterprise managed device system
US20180198620A1 (en) Systems and methods for assuring data on leased computing resources
US10379894B1 (en) Lineage-based trust for virtual machine images
US20140317704A1 (en) Method and system for enabling the federation of unrelated applications
CN107835228A (en) A kind of command processing method and device based on DYNAMIC GENERALIZED route
JP2006350850A (en) Method, device and program for reconstructing software package
WO2023034423A1 (en) Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger
US11979411B2 (en) Control of access to computing resources implemented in isolated environments
US9189629B1 (en) Systems and methods for discouraging polymorphic malware
US20150067766A1 (en) Application service management device and application service management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220325

Address after: 518000 2107b, Shenzhen International Culture Building, Futian street, Futian Road, Futian District, Shenzhen, Guangdong Province

Patentee after: SHENZHEN HUAHUI DATA SERVICE Co.,Ltd.

Address before: Room 8077, 7 / F, building A2, No. 13, Fengzhi East Road, Haidian District, Beijing 100094

Patentee before: BEIJING GUANGCHENG TONGTAI TECHNOLOGY Co.,Ltd.