CN110502875A - A kind of security of computer software guard system - Google Patents

A kind of security of computer software guard system Download PDF

Info

Publication number
CN110502875A
CN110502875A CN201910679296.7A CN201910679296A CN110502875A CN 110502875 A CN110502875 A CN 110502875A CN 201910679296 A CN201910679296 A CN 201910679296A CN 110502875 A CN110502875 A CN 110502875A
Authority
CN
China
Prior art keywords
software
computer
storage unit
unit
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910679296.7A
Other languages
Chinese (zh)
Inventor
朱琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Yibai Interconnection Technology Co Ltd
Original Assignee
Anhui Yibai Interconnection Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Yibai Interconnection Technology Co Ltd filed Critical Anhui Yibai Interconnection Technology Co Ltd
Priority to CN201910679296.7A priority Critical patent/CN110502875A/en
Publication of CN110502875A publication Critical patent/CN110502875A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of security of computer software guard system, including classification storage module, recognition detection module, encryption protection module, classification storage module includes system software storage unit, application software storage unit and newly enters software storage unit;Recognition detection module includes periodic scanning killing unit, starting verifying scanning element and recognition detection taxon;Encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;The present invention carries out pointedly recognition detection, the detection efficiency of raising by classifying to the software in computer;It is verified by the links soft to computer, it is highly-safe;By the way that encrypted authentication unit is arranged, the leakage of software information is effectively avoided;By carrying out verifying killing and risk assessment to external network address, the running environment of safety is built for computer software;The present invention carries out full protection to computer software, has substantially increased the security performance of computer.

Description

A kind of security of computer software guard system
Technical field
The present invention relates to field of computer, specially a kind of security of computer software guard system.
Background technique
Computer software refers to that program and its document in computer system, program are process object and the place of calculating task Manage the description of rule;Document is for the ease of illustrating property data needed for understanding program;Program must be installed into ability inside machine Work, document are usually to see to people, are not necessarily packed into machine.Software is the connection interface between user and hardware, uses householder If being exchanged by software with computer.Software is the important evidence of Computer System Design, in order to facilitate user, in order to Make computer system overall utility with higher, when designing a calculating machine system, it is necessary to consider every possible angle the knot of software and hardware The requirement of conjunction and the requirement of user and software.
The existing computer software having is difficult to carry out computer software rationally comprehensive protection, to miscellaneous calculating Machine virus can not be avoided and killing, cannot well for may occur in which at any time in software systems the problem of found in time And handle, security performance is poor.
Summary of the invention
The purpose of the present invention is to provide a kind of security of computer software guard systems, to solve to mention in above-mentioned background technique Out the problem of.
To achieve the above object, the invention provides the following technical scheme: a kind of security of computer software guard system, including Classification storage module, recognition detection module, encryption protection module;
Software of the classification storage module for running in server carries out classification planning and stores, including system software Storage unit, application software storage unit and newly enter software storage unit;
The system software storage unit is for the unified system software stored in system, computer;
The application software storage unit is used to store the application software installed in computer;
It is described newly to enter software storage unit for storing the system software and application software newly installed in computer;
The recognition detection module carries out recognition detection with to the software in computer, including periodic scanning killing unit, Starting verifying scanning element and recognition detection taxon;
The periodic scanning killing unit is connect with application software storage unit, for determining software in system software Phase recognition detection;
The starting verifying scanning element is connect with application software storage unit, for in application software storage unit Application software carries out recognition detection in restarting;
The recognition detection taxon with newly enter software storage unit connect, for being identified to the software newly installed Detection and classification store software to corresponding system software storage unit and application software storage unit after detection passes through;
The encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;
The software setting verifying password that the encrypted authentication unit is used to store up calculator memory, including essential information are tested Card, fingerprint authentication and recognition of face verifying;
The external detection authentication unit is used to be scanned detection to external connection of computer network address, and to dangerous network address and Malware is filtered obstruction;
The prevention firewall unit is used to carry out alarm and positive closing to virulent software.
Preferably, system software includes service program, LISP program LISP, operating system and data base management system, application Software includes the functional software separately installed.
Preferably, the recognition detection of the recognition detection module includes checking and killing virus, fault scanning, error code detection etc..
Preferably, the verifying password of the encrypted authentication unit can self-setting verification mode, base can be set as needed One or more of this Information Authentication, fingerprint authentication and recognition of face verifying.
Preferably, the recognition detection module further includes that loophole repairs unit, the software gone out to recognition detection in computer Security breaches are automatically repaired.
Preferably, the encrypted authentication unit is locked to unsanctioned software is verified.
Preferably, the external detection authentication unit further includes carrying out risk assessment to external connection of computer network address, and generate Corresponding assessment report.
Compared with prior art, the beneficial effects of the present invention are: the present invention is by classifying to the software in computer, And carry out pointedly recognition detection, the detection efficiency of raising;By being carried out to links such as the soft starting of computer, installations Verifying, it is highly-safe, greatly reduce the possibility of poisoning intrusion;By the way that encrypted authentication unit is arranged, software information is effectively avoided Leakage;By carrying out verifying killing and risk assessment to external network address, the running environment of safety is built for computer software;This Invention carries out full protection to computer software, has substantially increased the security performance of computer.
Detailed description of the invention
Fig. 1 is overall structure diagram of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the present invention provides a kind of technical solution: a kind of security of computer software guard system, including classification Memory module, recognition detection module, encryption protection module;
Software of the classification storage module for running in server carries out classification planning and stores, including system software Storage unit, application software storage unit and newly enter software storage unit;
The system software storage unit is for the unified system software stored in system, computer;
The application software storage unit is used to store the application software installed in computer;
It is described newly to enter software storage unit for storing the system software and application software newly installed in computer;
The recognition detection module carries out recognition detection with to the software in computer, including periodic scanning killing unit, Starting verifying scanning element and recognition detection taxon;
The periodic scanning killing unit is connect with application software storage unit, for determining software in system software Phase recognition detection;
The starting verifying scanning element is connect with application software storage unit, for in application software storage unit Application software carries out recognition detection in restarting;
The recognition detection taxon with newly enter software storage unit connect, for being identified to the software newly installed Detection and classification store software to corresponding system software storage unit and application software storage unit after detection passes through;
The encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;
The software setting verifying password that the encrypted authentication unit is used to store up calculator memory, including essential information are tested Card, fingerprint authentication and recognition of face verifying;
The external detection authentication unit is used to be scanned detection to external connection of computer network address, and to dangerous network address and Malware is filtered obstruction;
The prevention firewall unit is used to carry out alarm and positive closing to virulent software.
Further, system software includes service program, LISP program LISP, operating system and data base management system, is answered It include the functional software separately installed with software.
Further, the recognition detection of the recognition detection module includes checking and killing virus, fault scanning, error code detection etc..
Further, the verifying password of the encrypted authentication unit can self-setting verification mode, can be set as needed One or more of essential information verifying, fingerprint authentication and recognition of face verifying.
Further, the recognition detection module further includes that loophole repairs unit, is gone out to recognition detection in computer soft Part security breaches are automatically repaired.
Further, the encrypted authentication unit is locked to unsanctioned software is verified.
Further, the external detection authentication unit further includes to the progress risk assessment of external connection of computer network address, and life At corresponding assessment report.
The present invention carries out pointedly recognition detection, the detection of raising by classifying to the software in computer Efficiency;It is highly-safe by being verified to links such as the soft starting of computer, installations, greatly reduce poisoning intrusion Possibility;By the way that encrypted authentication unit is arranged, the leakage of software information is effectively avoided;By carrying out verifying killing to external network address And risk assessment, the running environment of safety is built for computer software;The present invention carries out full protection to computer software, significantly The security performance of computer is improved.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (7)

1. a kind of security of computer software guard system, which is characterized in that including classification storage module, recognition detection module, add Close protection module;
Software of the classification storage module for running in server carries out classification planning and stores, including system software storage Unit, application software storage unit and newly enter software storage unit;
The system software storage unit is for the unified system software stored in system, computer;
The application software storage unit is used to store the application software installed in computer;
It is described newly to enter software storage unit for storing the system software and application software newly installed in computer;
The recognition detection module carries out recognition detection, including periodic scanning killing unit, starting with to the software in computer Verify scanning element and recognition detection taxon;
The periodic scanning killing unit is connect with application software storage unit, for periodically being known to software in system software It does not detect;
The starting verifying scanning element is connect with application software storage unit, for the application in application software storage unit Software carries out recognition detection in restarting;
The recognition detection taxon with newly enter software storage unit connect, for newly install software progress recognition detection And classification stores software to corresponding system software storage unit and application software storage unit after detection passes through;
The encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;
The software setting verifying password that the encrypted authentication unit is used to store up calculator memory, including essential information are verified, are referred to Line verifying and recognition of face verifying;
The external detection authentication unit is used to be scanned detection to external connection of computer network address, and to dangerous network address and malice Software is filtered obstruction;
The prevention firewall unit is used to carry out alarm and positive closing to virulent software.
2. a kind of security of computer software guard system according to claim 1, it is characterised in that: system software includes clothes Business property program, LISP program LISP, operating system and data base management system, application software includes the functional software separately installed.
3. a kind of security of computer software guard system according to claim 1, it is characterised in that: the recognition detection mould The recognition detection of block includes checking and killing virus, fault scanning, error code detection etc..
4. a kind of security of computer software guard system according to claim 1, it is characterised in that: the encrypted authentication list The verifying password of member can self-setting verification mode, essential information verifying, fingerprint authentication and recognition of face can be set as needed One or more of verifying.
5. a kind of security of computer software guard system according to claim 1, it is characterised in that: the recognition detection mould Block further includes that loophole repairs unit, and the software security flaw gone out to recognition detection in computer is automatically repaired.
6. a kind of security of computer software guard system according to claim 1, it is characterised in that: the encrypted authentication list Member is locked to unsanctioned software is verified.
7. a kind of security of computer software guard system according to claim 1, it is characterised in that: the external detection is tested Card unit further includes carrying out risk assessment to external connection of computer network address, and generate corresponding assessment report.
CN201910679296.7A 2019-07-25 2019-07-25 A kind of security of computer software guard system Withdrawn CN110502875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910679296.7A CN110502875A (en) 2019-07-25 2019-07-25 A kind of security of computer software guard system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910679296.7A CN110502875A (en) 2019-07-25 2019-07-25 A kind of security of computer software guard system

Publications (1)

Publication Number Publication Date
CN110502875A true CN110502875A (en) 2019-11-26

Family

ID=68587310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910679296.7A Withdrawn CN110502875A (en) 2019-07-25 2019-07-25 A kind of security of computer software guard system

Country Status (1)

Country Link
CN (1) CN110502875A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115659341A (en) * 2022-12-23 2023-01-31 中国计量大学现代科技学院 Software information safety monitoring system
CN116107912A (en) * 2023-04-07 2023-05-12 石家庄学院 Security detection method and system based on application software
CN117251847A (en) * 2023-08-31 2023-12-19 江苏南工科技集团有限公司 High-robustness monitoring system for running security situation of computer software

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115659341A (en) * 2022-12-23 2023-01-31 中国计量大学现代科技学院 Software information safety monitoring system
CN115659341B (en) * 2022-12-23 2023-03-10 中国计量大学现代科技学院 Software information safety monitoring system
CN116107912A (en) * 2023-04-07 2023-05-12 石家庄学院 Security detection method and system based on application software
CN116107912B (en) * 2023-04-07 2023-07-04 石家庄学院 Security detection method and system based on application software
CN117251847A (en) * 2023-08-31 2023-12-19 江苏南工科技集团有限公司 High-robustness monitoring system for running security situation of computer software
CN117251847B (en) * 2023-08-31 2024-02-13 江苏南工科技集团有限公司 High-robustness monitoring system for running security situation of computer software

Similar Documents

Publication Publication Date Title
Asghar et al. Cybersecurity in industrial control systems: Issues, technologies, and challenges
US11212299B2 (en) System and method for monitoring security attack chains
US11647039B2 (en) User and entity behavioral analysis with network topology enhancement
CN110502875A (en) A kind of security of computer software guard system
JP7470116B2 (en) Secure communication method and system thereof
CN112597462A (en) Industrial network safety system
CN113660224A (en) Situation awareness defense method, device and system based on network vulnerability scanning
CN112804212A (en) Information security assessment system
CN116628705A (en) Data security processing method, system, electronic equipment and storage medium
CN116155531A (en) Method and device for network equipment security management based on SOAR and electronic equipment
CN110955897A (en) Software research and development safety control visualization method and system based on big data
Ginter Secure operations technology
CN106407836B (en) A kind of method and device that the behavior of data illegal modifications detects automatically
CN109981600B (en) Security assessment system for website reinforcement
Line et al. Information and communication technology: Enabling and challenging critical infrastructure
WO2021217239A1 (en) Endpoint security using an action prediction model
Barker et al. Introduction to Resilience Analytics for Cyber–Physical–Social Networks.
Yatagha et al. Security challenges and best practices for resilient IIoT Networks: Network Segmentation
Shin et al. Threat modeling for security failure-tolerant requirements
CN109361652B (en) Car insurance claim settlement safety protection system
CN102739690A (en) Safety data exchange process monitoring method and system
CN116127461B (en) Data protection method and system, storage server and client
Escoses et al. Neil C. Enriquez², and Marlon A. Diloy¹, 2 (—), 1 National University, Manila, Philippines madiloy@ national-u. edu. ph 2 NU Laguna, Calamba, Philippines
CN116545725A (en) Account management method and device based on blockchain technology
Prudnikova Standardized security assessment framework for ICS devices and pilot project

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20191126