CN110502875A - A kind of security of computer software guard system - Google Patents
A kind of security of computer software guard system Download PDFInfo
- Publication number
- CN110502875A CN110502875A CN201910679296.7A CN201910679296A CN110502875A CN 110502875 A CN110502875 A CN 110502875A CN 201910679296 A CN201910679296 A CN 201910679296A CN 110502875 A CN110502875 A CN 110502875A
- Authority
- CN
- China
- Prior art keywords
- software
- computer
- storage unit
- unit
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000001514 detection method Methods 0.000 claims abstract description 63
- 230000000737 periodic effect Effects 0.000 claims abstract description 7
- 230000002265 prevention Effects 0.000 claims abstract description 7
- 238000012502 risk assessment Methods 0.000 claims abstract description 6
- 241000700605 Viruses Species 0.000 claims description 4
- 238000007726 management method Methods 0.000 claims description 3
- 230000008439 repair process Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000000034 method Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 231100000572 poisoning Toxicity 0.000 description 2
- 230000000607 poisoning effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of security of computer software guard system, including classification storage module, recognition detection module, encryption protection module, classification storage module includes system software storage unit, application software storage unit and newly enters software storage unit;Recognition detection module includes periodic scanning killing unit, starting verifying scanning element and recognition detection taxon;Encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;The present invention carries out pointedly recognition detection, the detection efficiency of raising by classifying to the software in computer;It is verified by the links soft to computer, it is highly-safe;By the way that encrypted authentication unit is arranged, the leakage of software information is effectively avoided;By carrying out verifying killing and risk assessment to external network address, the running environment of safety is built for computer software;The present invention carries out full protection to computer software, has substantially increased the security performance of computer.
Description
Technical field
The present invention relates to field of computer, specially a kind of security of computer software guard system.
Background technique
Computer software refers to that program and its document in computer system, program are process object and the place of calculating task
Manage the description of rule;Document is for the ease of illustrating property data needed for understanding program;Program must be installed into ability inside machine
Work, document are usually to see to people, are not necessarily packed into machine.Software is the connection interface between user and hardware, uses householder
If being exchanged by software with computer.Software is the important evidence of Computer System Design, in order to facilitate user, in order to
Make computer system overall utility with higher, when designing a calculating machine system, it is necessary to consider every possible angle the knot of software and hardware
The requirement of conjunction and the requirement of user and software.
The existing computer software having is difficult to carry out computer software rationally comprehensive protection, to miscellaneous calculating
Machine virus can not be avoided and killing, cannot well for may occur in which at any time in software systems the problem of found in time
And handle, security performance is poor.
Summary of the invention
The purpose of the present invention is to provide a kind of security of computer software guard systems, to solve to mention in above-mentioned background technique
Out the problem of.
To achieve the above object, the invention provides the following technical scheme: a kind of security of computer software guard system, including
Classification storage module, recognition detection module, encryption protection module;
Software of the classification storage module for running in server carries out classification planning and stores, including system software
Storage unit, application software storage unit and newly enter software storage unit;
The system software storage unit is for the unified system software stored in system, computer;
The application software storage unit is used to store the application software installed in computer;
It is described newly to enter software storage unit for storing the system software and application software newly installed in computer;
The recognition detection module carries out recognition detection with to the software in computer, including periodic scanning killing unit,
Starting verifying scanning element and recognition detection taxon;
The periodic scanning killing unit is connect with application software storage unit, for determining software in system software
Phase recognition detection;
The starting verifying scanning element is connect with application software storage unit, for in application software storage unit
Application software carries out recognition detection in restarting;
The recognition detection taxon with newly enter software storage unit connect, for being identified to the software newly installed
Detection and classification store software to corresponding system software storage unit and application software storage unit after detection passes through;
The encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;
The software setting verifying password that the encrypted authentication unit is used to store up calculator memory, including essential information are tested
Card, fingerprint authentication and recognition of face verifying;
The external detection authentication unit is used to be scanned detection to external connection of computer network address, and to dangerous network address and
Malware is filtered obstruction;
The prevention firewall unit is used to carry out alarm and positive closing to virulent software.
Preferably, system software includes service program, LISP program LISP, operating system and data base management system, application
Software includes the functional software separately installed.
Preferably, the recognition detection of the recognition detection module includes checking and killing virus, fault scanning, error code detection etc..
Preferably, the verifying password of the encrypted authentication unit can self-setting verification mode, base can be set as needed
One or more of this Information Authentication, fingerprint authentication and recognition of face verifying.
Preferably, the recognition detection module further includes that loophole repairs unit, the software gone out to recognition detection in computer
Security breaches are automatically repaired.
Preferably, the encrypted authentication unit is locked to unsanctioned software is verified.
Preferably, the external detection authentication unit further includes carrying out risk assessment to external connection of computer network address, and generate
Corresponding assessment report.
Compared with prior art, the beneficial effects of the present invention are: the present invention is by classifying to the software in computer,
And carry out pointedly recognition detection, the detection efficiency of raising;By being carried out to links such as the soft starting of computer, installations
Verifying, it is highly-safe, greatly reduce the possibility of poisoning intrusion;By the way that encrypted authentication unit is arranged, software information is effectively avoided
Leakage;By carrying out verifying killing and risk assessment to external network address, the running environment of safety is built for computer software;This
Invention carries out full protection to computer software, has substantially increased the security performance of computer.
Detailed description of the invention
Fig. 1 is overall structure diagram of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, the present invention provides a kind of technical solution: a kind of security of computer software guard system, including classification
Memory module, recognition detection module, encryption protection module;
Software of the classification storage module for running in server carries out classification planning and stores, including system software
Storage unit, application software storage unit and newly enter software storage unit;
The system software storage unit is for the unified system software stored in system, computer;
The application software storage unit is used to store the application software installed in computer;
It is described newly to enter software storage unit for storing the system software and application software newly installed in computer;
The recognition detection module carries out recognition detection with to the software in computer, including periodic scanning killing unit,
Starting verifying scanning element and recognition detection taxon;
The periodic scanning killing unit is connect with application software storage unit, for determining software in system software
Phase recognition detection;
The starting verifying scanning element is connect with application software storage unit, for in application software storage unit
Application software carries out recognition detection in restarting;
The recognition detection taxon with newly enter software storage unit connect, for being identified to the software newly installed
Detection and classification store software to corresponding system software storage unit and application software storage unit after detection passes through;
The encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;
The software setting verifying password that the encrypted authentication unit is used to store up calculator memory, including essential information are tested
Card, fingerprint authentication and recognition of face verifying;
The external detection authentication unit is used to be scanned detection to external connection of computer network address, and to dangerous network address and
Malware is filtered obstruction;
The prevention firewall unit is used to carry out alarm and positive closing to virulent software.
Further, system software includes service program, LISP program LISP, operating system and data base management system, is answered
It include the functional software separately installed with software.
Further, the recognition detection of the recognition detection module includes checking and killing virus, fault scanning, error code detection etc..
Further, the verifying password of the encrypted authentication unit can self-setting verification mode, can be set as needed
One or more of essential information verifying, fingerprint authentication and recognition of face verifying.
Further, the recognition detection module further includes that loophole repairs unit, is gone out to recognition detection in computer soft
Part security breaches are automatically repaired.
Further, the encrypted authentication unit is locked to unsanctioned software is verified.
Further, the external detection authentication unit further includes to the progress risk assessment of external connection of computer network address, and life
At corresponding assessment report.
The present invention carries out pointedly recognition detection, the detection of raising by classifying to the software in computer
Efficiency;It is highly-safe by being verified to links such as the soft starting of computer, installations, greatly reduce poisoning intrusion
Possibility;By the way that encrypted authentication unit is arranged, the leakage of software information is effectively avoided;By carrying out verifying killing to external network address
And risk assessment, the running environment of safety is built for computer software;The present invention carries out full protection to computer software, significantly
The security performance of computer is improved.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (7)
1. a kind of security of computer software guard system, which is characterized in that including classification storage module, recognition detection module, add
Close protection module;
Software of the classification storage module for running in server carries out classification planning and stores, including system software storage
Unit, application software storage unit and newly enter software storage unit;
The system software storage unit is for the unified system software stored in system, computer;
The application software storage unit is used to store the application software installed in computer;
It is described newly to enter software storage unit for storing the system software and application software newly installed in computer;
The recognition detection module carries out recognition detection, including periodic scanning killing unit, starting with to the software in computer
Verify scanning element and recognition detection taxon;
The periodic scanning killing unit is connect with application software storage unit, for periodically being known to software in system software
It does not detect;
The starting verifying scanning element is connect with application software storage unit, for the application in application software storage unit
Software carries out recognition detection in restarting;
The recognition detection taxon with newly enter software storage unit connect, for newly install software progress recognition detection
And classification stores software to corresponding system software storage unit and application software storage unit after detection passes through;
The encryption protection module includes encrypted authentication unit, external detection authentication unit and prevention firewall unit;
The software setting verifying password that the encrypted authentication unit is used to store up calculator memory, including essential information are verified, are referred to
Line verifying and recognition of face verifying;
The external detection authentication unit is used to be scanned detection to external connection of computer network address, and to dangerous network address and malice
Software is filtered obstruction;
The prevention firewall unit is used to carry out alarm and positive closing to virulent software.
2. a kind of security of computer software guard system according to claim 1, it is characterised in that: system software includes clothes
Business property program, LISP program LISP, operating system and data base management system, application software includes the functional software separately installed.
3. a kind of security of computer software guard system according to claim 1, it is characterised in that: the recognition detection mould
The recognition detection of block includes checking and killing virus, fault scanning, error code detection etc..
4. a kind of security of computer software guard system according to claim 1, it is characterised in that: the encrypted authentication list
The verifying password of member can self-setting verification mode, essential information verifying, fingerprint authentication and recognition of face can be set as needed
One or more of verifying.
5. a kind of security of computer software guard system according to claim 1, it is characterised in that: the recognition detection mould
Block further includes that loophole repairs unit, and the software security flaw gone out to recognition detection in computer is automatically repaired.
6. a kind of security of computer software guard system according to claim 1, it is characterised in that: the encrypted authentication list
Member is locked to unsanctioned software is verified.
7. a kind of security of computer software guard system according to claim 1, it is characterised in that: the external detection is tested
Card unit further includes carrying out risk assessment to external connection of computer network address, and generate corresponding assessment report.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910679296.7A CN110502875A (en) | 2019-07-25 | 2019-07-25 | A kind of security of computer software guard system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910679296.7A CN110502875A (en) | 2019-07-25 | 2019-07-25 | A kind of security of computer software guard system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110502875A true CN110502875A (en) | 2019-11-26 |
Family
ID=68587310
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910679296.7A Withdrawn CN110502875A (en) | 2019-07-25 | 2019-07-25 | A kind of security of computer software guard system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110502875A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115659341A (en) * | 2022-12-23 | 2023-01-31 | 中国计量大学现代科技学院 | Software information safety monitoring system |
CN116107912A (en) * | 2023-04-07 | 2023-05-12 | 石家庄学院 | Security detection method and system based on application software |
CN117251847A (en) * | 2023-08-31 | 2023-12-19 | 江苏南工科技集团有限公司 | High-robustness monitoring system for running security situation of computer software |
-
2019
- 2019-07-25 CN CN201910679296.7A patent/CN110502875A/en not_active Withdrawn
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115659341A (en) * | 2022-12-23 | 2023-01-31 | 中国计量大学现代科技学院 | Software information safety monitoring system |
CN115659341B (en) * | 2022-12-23 | 2023-03-10 | 中国计量大学现代科技学院 | Software information safety monitoring system |
CN116107912A (en) * | 2023-04-07 | 2023-05-12 | 石家庄学院 | Security detection method and system based on application software |
CN116107912B (en) * | 2023-04-07 | 2023-07-04 | 石家庄学院 | Security detection method and system based on application software |
CN117251847A (en) * | 2023-08-31 | 2023-12-19 | 江苏南工科技集团有限公司 | High-robustness monitoring system for running security situation of computer software |
CN117251847B (en) * | 2023-08-31 | 2024-02-13 | 江苏南工科技集团有限公司 | High-robustness monitoring system for running security situation of computer software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Asghar et al. | Cybersecurity in industrial control systems: Issues, technologies, and challenges | |
US11212299B2 (en) | System and method for monitoring security attack chains | |
US11647039B2 (en) | User and entity behavioral analysis with network topology enhancement | |
CN110502875A (en) | A kind of security of computer software guard system | |
JP7470116B2 (en) | Secure communication method and system thereof | |
CN112597462A (en) | Industrial network safety system | |
CN113660224A (en) | Situation awareness defense method, device and system based on network vulnerability scanning | |
CN112804212A (en) | Information security assessment system | |
CN116628705A (en) | Data security processing method, system, electronic equipment and storage medium | |
CN116155531A (en) | Method and device for network equipment security management based on SOAR and electronic equipment | |
CN110955897A (en) | Software research and development safety control visualization method and system based on big data | |
Ginter | Secure operations technology | |
CN106407836B (en) | A kind of method and device that the behavior of data illegal modifications detects automatically | |
CN109981600B (en) | Security assessment system for website reinforcement | |
Line et al. | Information and communication technology: Enabling and challenging critical infrastructure | |
WO2021217239A1 (en) | Endpoint security using an action prediction model | |
Barker et al. | Introduction to Resilience Analytics for Cyber–Physical–Social Networks. | |
Yatagha et al. | Security challenges and best practices for resilient IIoT Networks: Network Segmentation | |
Shin et al. | Threat modeling for security failure-tolerant requirements | |
CN109361652B (en) | Car insurance claim settlement safety protection system | |
CN102739690A (en) | Safety data exchange process monitoring method and system | |
CN116127461B (en) | Data protection method and system, storage server and client | |
Escoses et al. | Neil C. Enriquez², and Marlon A. Diloy¹, 2 (—), 1 National University, Manila, Philippines madiloy@ national-u. edu. ph 2 NU Laguna, Calamba, Philippines | |
CN116545725A (en) | Account management method and device based on blockchain technology | |
Prudnikova | Standardized security assessment framework for ICS devices and pilot project |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20191126 |