CN110532775A - A kind of Method and kit for of computer processes control - Google Patents
A kind of Method and kit for of computer processes control Download PDFInfo
- Publication number
- CN110532775A CN110532775A CN201910684687.8A CN201910684687A CN110532775A CN 110532775 A CN110532775 A CN 110532775A CN 201910684687 A CN201910684687 A CN 201910684687A CN 110532775 A CN110532775 A CN 110532775A
- Authority
- CN
- China
- Prior art keywords
- certificate
- information
- computer processes
- sequence number
- analysis
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 145
- 230000008569 process Effects 0.000 title claims abstract description 121
- 238000004458 analytical method Methods 0.000 claims abstract description 48
- 238000012795 verification Methods 0.000 claims abstract description 22
- 238000004454 trace mineral analysis Methods 0.000 claims abstract description 11
- 239000000284 extract Substances 0.000 claims abstract description 6
- 230000007246 mechanism Effects 0.000 claims description 8
- 230000006399 behavior Effects 0.000 description 25
- 238000012360 testing method Methods 0.000 description 8
- 238000000605 extraction Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Computer Networks & Wireless Communication (AREA)
- Bioethics (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Virology (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of Method and kit fors of computer processes control, which comprises extracts the information of all certificates in the digital signature information and operating system of computer Chinese part;Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;Process behavior trace analysis is carried out, by analysis process position and behavior, judges whether the process belongs to legitimate processes, obtains intellectual analysis result;Control is carried out to computer processes according to the intellectual analysis result.The embodiment of the present invention can authenticate this tool by digital certificate signature and be analyzed, and obtain the legitimacy and behavior confidence level of process, to realize the control to computer processes.
Description
Technical field
The present invention relates to computer intellectual technology, espespecially a kind of Method and kit for of computer processes control.
Background technique
Today that computer intellectual technology rapidly develops, the business that server undertakes is more and more, and management difficulty is increasingly
Greatly.Digital certificate signature is a kind of recognizer reliability, authoritative method.Digital signature has non-repudiation, is electricity
The core technology of sub- contract field, by realizing the data encryption of electronic contract using digital signature in different links, to ensure
It can not distort, is legal credible.There are two effects for digital signature, first is that can determine that message is strictly to be signed and issued by sender
Come, second is that digital signature can determine that whether electronic message content is tampered, guarantees the integrality of message.It is introduced in program control
Digital signature technology can efficient, accurate Verification System and user executable program legitimacy.
Whether credible controlling program by digital certificate at present is a reliable technology, but the prior art provides
Digital certificate authentication technology have many problems, or even collapse sometimes.A core industry is generally run in many servers
Business, core business have Partial Process, and if rogue program operation, main business, which is affected, seriously will lead to service
Delay machine, influence using.It is mostly believable by the process of digital certificate authentication, the behavior of malicious process and common user
The involved party of process is to be difficult to differentiate between, and traditional program control and antivirus technique depend on Secure Hash Algorithm (Secure unduly
HashAlgorithm, abbreviation sha1), the slow low efficiency of speed is acquired, security breaches are big.
Summary of the invention
In order to solve the above-mentioned technical problem, the embodiment of the invention provides the methods and work of a kind of computer processes control
Tool, can authenticate this tool, analysis process legitimacy and behavior confidence level by digital certificate signature.
In order to reach the object of the invention, on the one hand, the embodiment of the invention provides a kind of method of computer processes control,
Include:
Extract the information of all certificates in the digital signature information and operating system of computer Chinese part;
Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;
It carries out process behavior trace analysis and judges whether the process belongs to by analysis process position and behavior
Legitimate processes obtain intellectual analysis result;
Control is carried out to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file
There is the sequence number information of certificate.
Wherein, described to include: by the progress certification authentication of autonomous verification algorithm
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test
Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test
Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the method also includes:
Certification authority white list, pre-set business software document term keyword are preset, for use in being demonstrate,proved
The inquiring and authenticating of book.
Wherein, the progress process behavior trace analysis includes:
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
On the other hand, the embodiment of the invention also provides a kind of tools of computer processes control, comprising:
Extract information module, all cards in the digital signature information and operating system for extracting computer Chinese part
The information of book;
Authentication module determines certificate legitimacy for carrying out certification authentication by autonomous verification algorithm;
Analysis module, for carrying out process behavior trace analysis, by analysis process position and behavior, described in judgement
Whether process belongs to legitimate processes, obtains intellectual analysis result;
Control module, for carrying out control to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file
There is the sequence number information of certificate.
Wherein, the authentication module is used for:
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test
Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test
Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the tool further include:
Certification authority white list, pre-set business software document term keyword are preset, for use in being demonstrate,proved
The inquiring and authenticating of book.
Wherein, the analysis module is used for: by process trace mechanism analysis process Catalog Documents Keywords matching degree, really
Whether fixed is pre-set business software.
All cards in digital signature information and operating system of the embodiment of the present invention by extracting computer Chinese part
The information of book;Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;Process behavior trace analysis is carried out, is led to
Analysis process position and behavior are crossed, judges whether the process belongs to legitimate processes, obtains intellectual analysis result;According to institute
It states intellectual analysis result and control is carried out to computer processes.The embodiment of the present invention can authenticate this work by digital certificate signature
Tool is analyzed, and the legitimacy and behavior confidence level of process are obtained, to realize the control to computer processes.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right
Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical solution of the present invention, and constitutes part of specification, with this
The embodiment of application technical solution for explaining the present invention together, does not constitute the limitation to technical solution of the present invention.
Fig. 1 is a kind of flow chart of the method for computer processes control of the embodiment of the present invention;
Fig. 2 is autonomous certification authentication flow chart in a kind of method of computer processes control of the embodiment of the present invention;
Fig. 3 is a kind of structure chart of the tool of computer processes control of the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention
Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application
Feature can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions
It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable
Sequence executes shown or described step.
The embodiment of the present invention solves the problems, such as slow prior art digital certification authentication and Caton, collapse, by parsing number
Word certificate is simultaneously matched step by step under system and forms autonomous verification tool.There is the journey of feature additionally by analysis part
The action selection of sequence whether the control program.Control includes stopping or deleting.
The embodiment of the present invention can extract the information of the certificate of digital signature in PE file, can also be under extraction operation system
The information of all certificates, can be realized the verifying for the certificate directly signed at present because the sequence number for the certificate directly signed and
The sequence number of certificate is consistent in PE file, by the unsuccessful process of signature authentication, then carries out behavior tracking, non-by analyzing
The behavior property of business process takes measure of control.
Wherein the full name of PE file is Portable Executable, is transplantable executable file, common
EXE, DLL, OCX, SYS, COM are PE files.
Fig. 1 is a kind of flow chart of the method for computer processes control of the embodiment of the present invention, as shown in Figure 1, the present invention is real
Apply the method for example the following steps are included:
Step 101: extracting the information of all certificates in the digital signature information and operating system of computer Chinese part;
Wherein, the embodiment of the present invention obtains the information of PE file, and the PE acquisition of information that file is read by writing program is believed
Digital certificate relevant information in breath;
Read all certificate serial number information in system cache.
Step 102: certification authentication being carried out by autonomous verification algorithm, determines certificate legitimacy;
Wherein, it in the digital certificate authentication mechanism of autonomous Design, is carried out accurately, fastly by the way that autonomous verification algorithm is added
Fast, stable certificate verification.
Step 103: carrying out process behavior trace analysis by analysis process position and behavior and judge the process
Whether belong to legitimate processes, obtains intellectual analysis result;
Specifically, by analysis process position and behavior, whether determining program is suspicious, is adopted according to intellectual analysis result
Collect measure of control.
Step 104: control is carried out to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file
There is the sequence number information of certificate.
Wherein, described to include: by the progress certification authentication of autonomous verification algorithm
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test
Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test
Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the method also includes:
Certification authority white list, pre-set business software document term keyword are preset, for use in being demonstrate,proved
The inquiring and authenticating of book.Wherein, pre-set business is some conversational traffics.
Wherein, the progress process behavior trace analysis includes:
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
Fig. 2 is autonomous certification authentication flow chart in a kind of method of computer processes control of the embodiment of the present invention, such as Fig. 2 institute
Show, concrete methods of realizing of the embodiment of the present invention is as follows:
The information for obtaining PE file reads digital certificate correlation in the PE acquisition of information information of file by writing program and believes
Breath;
Read all certificate serial number information in system cache.
First carry out sequence number verifying, if sequence number unanimously if continue, issuer Information Authentication, if system root
Certificate cache issuer is consistent with current certificates issuer, then continues validity verification.
If it is above all by verifying if carry out certificate revocation list inquiry, if the verification passes if think that certificate is legal not
It is further continued for verifying.
The embodiment of the present invention is presented above, if sequence number is consistent, and promulgation person belongs to the special authoritative certificate machine in part
Structure white list then directly carries out validity verification, and certificate verification white list is preset in the invention patent embodiment, such as can
To be the prior art, provide in digital certificate supplier GlobalSign, wosign.By validity verification, simple certificate
Checking procedure terminates.
Specific implementation of the embodiment of the present invention is by the process list of the main occupancy resource on Analysis server, by dividing
Some nonsystematic process list is analysed, the main process for occupying resource is listed, arrives place catalogue by the way that the process is available, into
And analyze whether the process belongs to business process.According further to whether service lists are belonged to, resource shared by current process is judged
Situation, progress operational circumstances judge the property of process.
Algorithm realizes step:
Step 1: take out committed memory and the higher process list of processor by process list, the number of taking-up can be with
It is specified, whether be then common business process according to process, by digital signature identification, such as: apache, IIS, tomcat,
Nginx, mysql etc., then to path where process analysis, traverse the text text under the catalogue if not these common processes
Shelves obtain content of text messages.
Step 2: carrying out keyword match according to the content of text of acquisition, keyword is provided in an embodiment of the present invention normal
See business software term, such as: the information such as management, user, database, table, log, authorization, identifying code, if matching 50%
Then think to belong to operation list above, otherwise continues to match.
Step 3: the matching by the above common process and the common attribute of keyword, can determine operation list.
Step 4: if some process do not pass through digital signature occupy CPU and memory it is fluctuated, and be not belonging to be
System process and first three step business process, and the behavior of the process to operation list or system directory often have kill,
The operation such as delete, write, it is believed that the process behavior is abnormal, can whithin a period of time if frequently executing this operation
With by its list with PognM-epo administrator or forced termination.
The embodiment of the present invention process can have much in current server, can not monitor identification for a long time, and it is soft to kill virus
In the case that part also can not be identified quickly, this credible theory of certificate is issued using authority, authenticates this by digital certificate signature
One tool, analysis process legitimacy and behavior confidence level, if it find that it is nonnumeric signature and often delete or terminate business into
Journey.Then think that its is suspicious.
In the embodiment of the present invention, following technology is utilized:
The digital signature verification technology of independent development and simple verification technique;
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether the skill of conversational traffic software
Art;
By digital signature and specific behavior be made whether be can be with the technology of program;
Certification authority white list technology, common business software file term keyword white list technology.
The system that the embodiment of the present invention is realized, which can satisfy, is applied to this computer intelligence algorithm in safety product.
Fig. 3 is a kind of structure chart of the tool of computer processes control of the embodiment of the present invention, as shown in figure 3, the present invention is real
Apply a kind of tool of on the other hand computer processes control that example provides, comprising:
Extract information module 301, institute in the digital signature information and operating system for extracting computer Chinese part
There is the information of certificate;
Authentication module 302 determines certificate legitimacy for carrying out certification authentication by autonomous verification algorithm;
Analysis module 303 passes through analysis process position and behavior, judgement for carrying out process behavior trace analysis
Whether the process belongs to legitimate processes, obtains intellectual analysis result;
Control module 304, for carrying out control to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file
There is the sequence number information of certificate.
Wherein, the authentication module 302 is used for:
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test
Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test
Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the tool further include:
Certification authority white list, common business software file term keyword are preset, for use in being demonstrate,proved
The inquiring and authenticating of book.
Wherein, the analysis module 303 is used for: passing through process trace mechanism analysis process Catalog Documents Keywords matching
Degree, it is determined whether be pre-set business software.
In conclusion digital signature information and operating system of the embodiment of the present invention by extraction computer Chinese part
In all certificates information;Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;Carry out process behavior tracking
Analysis judges whether the process belongs to legitimate processes by analysis process position and behavior, obtains intellectual analysis knot
Fruit;Control is carried out to computer processes according to the intellectual analysis result.The embodiment of the present invention can be by digital certificate signature
It authenticates this tool to be analyzed, obtains the legitimacy and behavior confidence level of process, to realize the control to computer processes.
Although disclosed herein embodiment it is as above, the content only for ease of understanding the present invention and use
Embodiment is not intended to limit the invention.Technical staff in any fields of the present invention is taken off not departing from the present invention
Under the premise of the spirit and scope of dew, any modification and variation, but the present invention can be carried out in the form and details of implementation
Scope of patent protection, still should be subject to the scope of the claims as defined in the appended claims.
Claims (10)
1. a kind of method of computer processes control characterized by comprising
Extract the information of all certificates in the digital signature information and operating system of computer Chinese part;
Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;
It carries out process behavior trace analysis and it is legal to judge whether the process belongs to by analysis process position and behavior
Process obtains intellectual analysis result;
Control is carried out to computer processes according to the intellectual analysis result.
2. a kind of method of computer processes control according to claim 1, which is characterized in that the packet of the certificate
It includes:
All cards in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file
The sequence number information of book.
3. a kind of method of computer processes control according to claim 2, which is characterized in that described by independently verifying
Algorithm carries out certification authentication
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continue issuer Information Authentication;
If it is consistent with current certificates issuer that system root certificate caches issuer, continue validity period of certificate verifying;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
4. a kind of method of computer processes control according to claim 3, which is characterized in that further include:
Certification authority white list, pre-set business software document term keyword are preset, for use in certificate is carried out
Inquiring and authenticating.
5. a kind of method of computer processes control according to claim 4, which is characterized in that the carry out process behavior
Trace analysis includes:
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
6. a kind of tool of computer processes control characterized by comprising
Information module is extracted, all certificates in the digital signature information and operating system for extracting computer Chinese part
Information;
Authentication module determines certificate legitimacy for carrying out certification authentication by autonomous verification algorithm;
Analysis module, by analysis process position and behavior, judges the process for carrying out process behavior trace analysis
Whether belong to legitimate processes, obtains intellectual analysis result;
Control module, for carrying out control to computer processes according to the intellectual analysis result.
7. a kind of tool of computer processes control according to claim 6, which is characterized in that the packet of the certificate
It includes:
All cards in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file
The sequence number information of book.
8. a kind of tool of computer processes control according to claim 7, which is characterized in that the authentication module is used
In:
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continue issuer Information Authentication;
If it is consistent with current certificates issuer that system root certificate caches issuer, continue validity period of certificate verifying;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
9. a kind of tool of computer processes control according to claim 8, which is characterized in that further include:
Certification authority white list, pre-set business software document term keyword are preset, for use in certificate is carried out
Inquiring and authenticating.
10. a kind of tool of computer processes control according to claim 9, which is characterized in that the analysis module is used
In: pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910684687.8A CN110532775A (en) | 2019-07-26 | 2019-07-26 | A kind of Method and kit for of computer processes control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910684687.8A CN110532775A (en) | 2019-07-26 | 2019-07-26 | A kind of Method and kit for of computer processes control |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110532775A true CN110532775A (en) | 2019-12-03 |
Family
ID=68661956
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910684687.8A Pending CN110532775A (en) | 2019-07-26 | 2019-07-26 | A kind of Method and kit for of computer processes control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110532775A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115549966A (en) * | 2022-08-25 | 2022-12-30 | 支付宝(杭州)信息技术有限公司 | Security audit method and device for service request |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1437375A (en) * | 2002-02-08 | 2003-08-20 | 泰康亚洲(北京)科技有限公司 | Confirmation method for safe mobile e-business platform digital certificate |
CN1885224A (en) * | 2005-06-23 | 2006-12-27 | 福建东方微点信息安全有限责任公司 | Computer anti-virus protection system and method |
CN104461830A (en) * | 2014-12-19 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for monitored progress |
CN104680061A (en) * | 2015-02-28 | 2015-06-03 | 国鼎网络空间安全技术有限公司 | Method and system for verifying code signing during startup of application in Android environment |
CN104753676A (en) * | 2013-12-31 | 2015-07-01 | 北龙中网(北京)科技有限责任公司 | Identity verifying method and device for mobile application developer |
CN106126388A (en) * | 2009-10-16 | 2016-11-16 | 阿里巴巴集团控股有限公司 | The method of monitor event, regulation engine device and rule engine system |
CN106603242A (en) * | 2016-12-29 | 2017-04-26 | 哈尔滨安天科技股份有限公司 | Offline digital signature verification method and system for domestic operating system |
CN106650320A (en) * | 2016-09-27 | 2017-05-10 | 武汉米企通网络科技有限公司 | Generation method of software certificate |
CN107544470A (en) * | 2017-09-29 | 2018-01-05 | 杭州安恒信息技术有限公司 | A kind of controller guard technology based on white list |
CN107944260A (en) * | 2017-12-04 | 2018-04-20 | 郑州云海信息技术有限公司 | A kind of Behavior blocking device and method of Malware |
CN108229171A (en) * | 2018-02-11 | 2018-06-29 | 腾讯科技(深圳)有限公司 | Driver processing method, device and storage medium |
CN108881104A (en) * | 2017-05-08 | 2018-11-23 | ***通信有限公司研究院 | The method and apparatus that a kind of pair of application program is verified |
CN108985051A (en) * | 2018-08-02 | 2018-12-11 | 郑州云海信息技术有限公司 | A kind of intrusion prevention method and system of Behavior-based control tracking |
CN109063480A (en) * | 2018-07-25 | 2018-12-21 | 郑州云海信息技术有限公司 | A kind of the executable file starting control method and system of oneself signature |
CN109101813A (en) * | 2018-09-03 | 2018-12-28 | 郑州云海信息技术有限公司 | A kind of application program hold-up interception method and relevant apparatus |
CN109117628A (en) * | 2018-08-20 | 2019-01-01 | 郑州云海信息技术有限公司 | A kind of white list control method and system |
CN109359465A (en) * | 2018-08-29 | 2019-02-19 | 郑州云海信息技术有限公司 | A kind of program defence method and system based on digital certificate |
-
2019
- 2019-07-26 CN CN201910684687.8A patent/CN110532775A/en active Pending
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1437375A (en) * | 2002-02-08 | 2003-08-20 | 泰康亚洲(北京)科技有限公司 | Confirmation method for safe mobile e-business platform digital certificate |
CN1885224A (en) * | 2005-06-23 | 2006-12-27 | 福建东方微点信息安全有限责任公司 | Computer anti-virus protection system and method |
CN106126388A (en) * | 2009-10-16 | 2016-11-16 | 阿里巴巴集团控股有限公司 | The method of monitor event, regulation engine device and rule engine system |
CN104753676A (en) * | 2013-12-31 | 2015-07-01 | 北龙中网(北京)科技有限责任公司 | Identity verifying method and device for mobile application developer |
CN104461830A (en) * | 2014-12-19 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for monitored progress |
CN104680061A (en) * | 2015-02-28 | 2015-06-03 | 国鼎网络空间安全技术有限公司 | Method and system for verifying code signing during startup of application in Android environment |
CN106650320A (en) * | 2016-09-27 | 2017-05-10 | 武汉米企通网络科技有限公司 | Generation method of software certificate |
CN106603242A (en) * | 2016-12-29 | 2017-04-26 | 哈尔滨安天科技股份有限公司 | Offline digital signature verification method and system for domestic operating system |
CN108881104A (en) * | 2017-05-08 | 2018-11-23 | ***通信有限公司研究院 | The method and apparatus that a kind of pair of application program is verified |
CN107544470A (en) * | 2017-09-29 | 2018-01-05 | 杭州安恒信息技术有限公司 | A kind of controller guard technology based on white list |
CN107944260A (en) * | 2017-12-04 | 2018-04-20 | 郑州云海信息技术有限公司 | A kind of Behavior blocking device and method of Malware |
CN108229171A (en) * | 2018-02-11 | 2018-06-29 | 腾讯科技(深圳)有限公司 | Driver processing method, device and storage medium |
CN109063480A (en) * | 2018-07-25 | 2018-12-21 | 郑州云海信息技术有限公司 | A kind of the executable file starting control method and system of oneself signature |
CN108985051A (en) * | 2018-08-02 | 2018-12-11 | 郑州云海信息技术有限公司 | A kind of intrusion prevention method and system of Behavior-based control tracking |
CN109117628A (en) * | 2018-08-20 | 2019-01-01 | 郑州云海信息技术有限公司 | A kind of white list control method and system |
CN109359465A (en) * | 2018-08-29 | 2019-02-19 | 郑州云海信息技术有限公司 | A kind of program defence method and system based on digital certificate |
CN109101813A (en) * | 2018-09-03 | 2018-12-28 | 郑州云海信息技术有限公司 | A kind of application program hold-up interception method and relevant apparatus |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115549966A (en) * | 2022-08-25 | 2022-12-30 | 支付宝(杭州)信息技术有限公司 | Security audit method and device for service request |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10721245B2 (en) | Method and device for automatically verifying security event | |
CN103581187B (en) | Method and system for controlling access rights | |
CN108171088A (en) | A kind of guard method of server hardware credibility and device based on BMC | |
CN108777675B (en) | Electronic device, block chain-based identity authentication method, and computer storage medium | |
WO2020181809A1 (en) | Data processing method and system based on interface checking, and computer device | |
US20210306369A1 (en) | Methods of monitoring and protecting access to online services | |
CN110740140A (en) | network information security supervision system based on cloud platform | |
CN102456102A (en) | Method for carrying out identity recertification on particular operation of information system by using Usb key technology | |
CN111143808B (en) | System security authentication method and device, computing equipment and storage medium | |
US11899770B2 (en) | Verification method and apparatus, and computer readable storage medium | |
KR101684016B1 (en) | Apparatus for processing a plurality of logging policy and method thereof | |
CN112380501B (en) | Equipment operation method, device, equipment and storage medium | |
KR101725404B1 (en) | Method and apparatus for testing web site | |
JP6258189B2 (en) | Specific apparatus, specific method, and specific program | |
CN110532775A (en) | A kind of Method and kit for of computer processes control | |
CN112910883B (en) | Data transmission method and device and electronic equipment | |
US20230125703A1 (en) | Method for predicting the identity of a user associated to an anonymous browsing session on an online service | |
JP6890559B2 (en) | Access analysis system and access analysis method | |
CN114584313A (en) | Equipment physical identity authentication method, system and device and first platform | |
KR101725450B1 (en) | Reputation management system provides safety in html5 and method of the same | |
CN111291044A (en) | Sensitive data identification method and device, electronic equipment and storage medium | |
CN117499163B (en) | WebRTC-based server remote maintenance method, system and equipment | |
CN113949568B (en) | Middleware identification method, device, computing equipment and storage medium | |
CN108416218A (en) | A kind of Web server validating vulnerability method | |
EP3885947A1 (en) | Method of monitoring and protecting access to an online service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191203 |
|
RJ01 | Rejection of invention patent application after publication |