CN110532775A - A kind of Method and kit for of computer processes control - Google Patents

A kind of Method and kit for of computer processes control Download PDF

Info

Publication number
CN110532775A
CN110532775A CN201910684687.8A CN201910684687A CN110532775A CN 110532775 A CN110532775 A CN 110532775A CN 201910684687 A CN201910684687 A CN 201910684687A CN 110532775 A CN110532775 A CN 110532775A
Authority
CN
China
Prior art keywords
certificate
information
computer processes
sequence number
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910684687.8A
Other languages
Chinese (zh)
Inventor
路廷文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910684687.8A priority Critical patent/CN110532775A/en
Publication of CN110532775A publication Critical patent/CN110532775A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Virology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of Method and kit fors of computer processes control, which comprises extracts the information of all certificates in the digital signature information and operating system of computer Chinese part;Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;Process behavior trace analysis is carried out, by analysis process position and behavior, judges whether the process belongs to legitimate processes, obtains intellectual analysis result;Control is carried out to computer processes according to the intellectual analysis result.The embodiment of the present invention can authenticate this tool by digital certificate signature and be analyzed, and obtain the legitimacy and behavior confidence level of process, to realize the control to computer processes.

Description

A kind of Method and kit for of computer processes control
Technical field
The present invention relates to computer intellectual technology, espespecially a kind of Method and kit for of computer processes control.
Background technique
Today that computer intellectual technology rapidly develops, the business that server undertakes is more and more, and management difficulty is increasingly Greatly.Digital certificate signature is a kind of recognizer reliability, authoritative method.Digital signature has non-repudiation, is electricity The core technology of sub- contract field, by realizing the data encryption of electronic contract using digital signature in different links, to ensure It can not distort, is legal credible.There are two effects for digital signature, first is that can determine that message is strictly to be signed and issued by sender Come, second is that digital signature can determine that whether electronic message content is tampered, guarantees the integrality of message.It is introduced in program control Digital signature technology can efficient, accurate Verification System and user executable program legitimacy.
Whether credible controlling program by digital certificate at present is a reliable technology, but the prior art provides Digital certificate authentication technology have many problems, or even collapse sometimes.A core industry is generally run in many servers Business, core business have Partial Process, and if rogue program operation, main business, which is affected, seriously will lead to service Delay machine, influence using.It is mostly believable by the process of digital certificate authentication, the behavior of malicious process and common user The involved party of process is to be difficult to differentiate between, and traditional program control and antivirus technique depend on Secure Hash Algorithm (Secure unduly HashAlgorithm, abbreviation sha1), the slow low efficiency of speed is acquired, security breaches are big.
Summary of the invention
In order to solve the above-mentioned technical problem, the embodiment of the invention provides the methods and work of a kind of computer processes control Tool, can authenticate this tool, analysis process legitimacy and behavior confidence level by digital certificate signature.
In order to reach the object of the invention, on the one hand, the embodiment of the invention provides a kind of method of computer processes control, Include:
Extract the information of all certificates in the digital signature information and operating system of computer Chinese part;
Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;
It carries out process behavior trace analysis and judges whether the process belongs to by analysis process position and behavior Legitimate processes obtain intellectual analysis result;
Control is carried out to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file There is the sequence number information of certificate.
Wherein, described to include: by the progress certification authentication of autonomous verification algorithm
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the method also includes:
Certification authority white list, pre-set business software document term keyword are preset, for use in being demonstrate,proved The inquiring and authenticating of book.
Wherein, the progress process behavior trace analysis includes:
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
On the other hand, the embodiment of the invention also provides a kind of tools of computer processes control, comprising:
Extract information module, all cards in the digital signature information and operating system for extracting computer Chinese part The information of book;
Authentication module determines certificate legitimacy for carrying out certification authentication by autonomous verification algorithm;
Analysis module, for carrying out process behavior trace analysis, by analysis process position and behavior, described in judgement Whether process belongs to legitimate processes, obtains intellectual analysis result;
Control module, for carrying out control to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file There is the sequence number information of certificate.
Wherein, the authentication module is used for:
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the tool further include:
Certification authority white list, pre-set business software document term keyword are preset, for use in being demonstrate,proved The inquiring and authenticating of book.
Wherein, the analysis module is used for: by process trace mechanism analysis process Catalog Documents Keywords matching degree, really Whether fixed is pre-set business software.
All cards in digital signature information and operating system of the embodiment of the present invention by extracting computer Chinese part The information of book;Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;Process behavior trace analysis is carried out, is led to Analysis process position and behavior are crossed, judges whether the process belongs to legitimate processes, obtains intellectual analysis result;According to institute It states intellectual analysis result and control is carried out to computer processes.The embodiment of the present invention can authenticate this work by digital certificate signature Tool is analyzed, and the legitimacy and behavior confidence level of process are obtained, to realize the control to computer processes.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical solution of the present invention, and constitutes part of specification, with this The embodiment of application technical solution for explaining the present invention together, does not constitute the limitation to technical solution of the present invention.
Fig. 1 is a kind of flow chart of the method for computer processes control of the embodiment of the present invention;
Fig. 2 is autonomous certification authentication flow chart in a kind of method of computer processes control of the embodiment of the present invention;
Fig. 3 is a kind of structure chart of the tool of computer processes control of the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable Sequence executes shown or described step.
The embodiment of the present invention solves the problems, such as slow prior art digital certification authentication and Caton, collapse, by parsing number Word certificate is simultaneously matched step by step under system and forms autonomous verification tool.There is the journey of feature additionally by analysis part The action selection of sequence whether the control program.Control includes stopping or deleting.
The embodiment of the present invention can extract the information of the certificate of digital signature in PE file, can also be under extraction operation system The information of all certificates, can be realized the verifying for the certificate directly signed at present because the sequence number for the certificate directly signed and The sequence number of certificate is consistent in PE file, by the unsuccessful process of signature authentication, then carries out behavior tracking, non-by analyzing The behavior property of business process takes measure of control.
Wherein the full name of PE file is Portable Executable, is transplantable executable file, common EXE, DLL, OCX, SYS, COM are PE files.
Fig. 1 is a kind of flow chart of the method for computer processes control of the embodiment of the present invention, as shown in Figure 1, the present invention is real Apply the method for example the following steps are included:
Step 101: extracting the information of all certificates in the digital signature information and operating system of computer Chinese part;
Wherein, the embodiment of the present invention obtains the information of PE file, and the PE acquisition of information that file is read by writing program is believed Digital certificate relevant information in breath;
Read all certificate serial number information in system cache.
Step 102: certification authentication being carried out by autonomous verification algorithm, determines certificate legitimacy;
Wherein, it in the digital certificate authentication mechanism of autonomous Design, is carried out accurately, fastly by the way that autonomous verification algorithm is added Fast, stable certificate verification.
Step 103: carrying out process behavior trace analysis by analysis process position and behavior and judge the process Whether belong to legitimate processes, obtains intellectual analysis result;
Specifically, by analysis process position and behavior, whether determining program is suspicious, is adopted according to intellectual analysis result Collect measure of control.
Step 104: control is carried out to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file There is the sequence number information of certificate.
Wherein, described to include: by the progress certification authentication of autonomous verification algorithm
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the method also includes:
Certification authority white list, pre-set business software document term keyword are preset, for use in being demonstrate,proved The inquiring and authenticating of book.Wherein, pre-set business is some conversational traffics.
Wherein, the progress process behavior trace analysis includes:
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
Fig. 2 is autonomous certification authentication flow chart in a kind of method of computer processes control of the embodiment of the present invention, such as Fig. 2 institute Show, concrete methods of realizing of the embodiment of the present invention is as follows:
The information for obtaining PE file reads digital certificate correlation in the PE acquisition of information information of file by writing program and believes Breath;
Read all certificate serial number information in system cache.
First carry out sequence number verifying, if sequence number unanimously if continue, issuer Information Authentication, if system root Certificate cache issuer is consistent with current certificates issuer, then continues validity verification.
If it is above all by verifying if carry out certificate revocation list inquiry, if the verification passes if think that certificate is legal not It is further continued for verifying.
The embodiment of the present invention is presented above, if sequence number is consistent, and promulgation person belongs to the special authoritative certificate machine in part Structure white list then directly carries out validity verification, and certificate verification white list is preset in the invention patent embodiment, such as can To be the prior art, provide in digital certificate supplier GlobalSign, wosign.By validity verification, simple certificate Checking procedure terminates.
Specific implementation of the embodiment of the present invention is by the process list of the main occupancy resource on Analysis server, by dividing Some nonsystematic process list is analysed, the main process for occupying resource is listed, arrives place catalogue by the way that the process is available, into And analyze whether the process belongs to business process.According further to whether service lists are belonged to, resource shared by current process is judged Situation, progress operational circumstances judge the property of process.
Algorithm realizes step:
Step 1: take out committed memory and the higher process list of processor by process list, the number of taking-up can be with It is specified, whether be then common business process according to process, by digital signature identification, such as: apache, IIS, tomcat, Nginx, mysql etc., then to path where process analysis, traverse the text text under the catalogue if not these common processes Shelves obtain content of text messages.
Step 2: carrying out keyword match according to the content of text of acquisition, keyword is provided in an embodiment of the present invention normal See business software term, such as: the information such as management, user, database, table, log, authorization, identifying code, if matching 50% Then think to belong to operation list above, otherwise continues to match.
Step 3: the matching by the above common process and the common attribute of keyword, can determine operation list.
Step 4: if some process do not pass through digital signature occupy CPU and memory it is fluctuated, and be not belonging to be System process and first three step business process, and the behavior of the process to operation list or system directory often have kill, The operation such as delete, write, it is believed that the process behavior is abnormal, can whithin a period of time if frequently executing this operation With by its list with PognM-epo administrator or forced termination.
The embodiment of the present invention process can have much in current server, can not monitor identification for a long time, and it is soft to kill virus In the case that part also can not be identified quickly, this credible theory of certificate is issued using authority, authenticates this by digital certificate signature One tool, analysis process legitimacy and behavior confidence level, if it find that it is nonnumeric signature and often delete or terminate business into Journey.Then think that its is suspicious.
In the embodiment of the present invention, following technology is utilized:
The digital signature verification technology of independent development and simple verification technique;
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether the skill of conversational traffic software Art;
By digital signature and specific behavior be made whether be can be with the technology of program;
Certification authority white list technology, common business software file term keyword white list technology.
The system that the embodiment of the present invention is realized, which can satisfy, is applied to this computer intelligence algorithm in safety product.
Fig. 3 is a kind of structure chart of the tool of computer processes control of the embodiment of the present invention, as shown in figure 3, the present invention is real Apply a kind of tool of on the other hand computer processes control that example provides, comprising:
Extract information module 301, institute in the digital signature information and operating system for extracting computer Chinese part There is the information of certificate;
Authentication module 302 determines certificate legitimacy for carrying out certification authentication by autonomous verification algorithm;
Analysis module 303 passes through analysis process position and behavior, judgement for carrying out process behavior trace analysis Whether the process belongs to legitimate processes, obtains intellectual analysis result;
Control module 304, for carrying out control to computer processes according to the intellectual analysis result.
Wherein, the information of the certificate includes:
Institute in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file There is the sequence number information of certificate.
Wherein, the authentication module 302 is used for:
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continues issuer information and test Card;
If it is consistent with current certificates issuer that system root certificate caches issuer, continues validity period of certificate and test Card;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
Further, the tool further include:
Certification authority white list, common business software file term keyword are preset, for use in being demonstrate,proved The inquiring and authenticating of book.
Wherein, the analysis module 303 is used for: passing through process trace mechanism analysis process Catalog Documents Keywords matching Degree, it is determined whether be pre-set business software.
In conclusion digital signature information and operating system of the embodiment of the present invention by extraction computer Chinese part In all certificates information;Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;Carry out process behavior tracking Analysis judges whether the process belongs to legitimate processes by analysis process position and behavior, obtains intellectual analysis knot Fruit;Control is carried out to computer processes according to the intellectual analysis result.The embodiment of the present invention can be by digital certificate signature It authenticates this tool to be analyzed, obtains the legitimacy and behavior confidence level of process, to realize the control to computer processes.
Although disclosed herein embodiment it is as above, the content only for ease of understanding the present invention and use Embodiment is not intended to limit the invention.Technical staff in any fields of the present invention is taken off not departing from the present invention Under the premise of the spirit and scope of dew, any modification and variation, but the present invention can be carried out in the form and details of implementation Scope of patent protection, still should be subject to the scope of the claims as defined in the appended claims.

Claims (10)

1. a kind of method of computer processes control characterized by comprising
Extract the information of all certificates in the digital signature information and operating system of computer Chinese part;
Certification authentication is carried out by autonomous verification algorithm, determines certificate legitimacy;
It carries out process behavior trace analysis and it is legal to judge whether the process belongs to by analysis process position and behavior Process obtains intellectual analysis result;
Control is carried out to computer processes according to the intellectual analysis result.
2. a kind of method of computer processes control according to claim 1, which is characterized in that the packet of the certificate It includes:
All cards in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file The sequence number information of book.
3. a kind of method of computer processes control according to claim 2, which is characterized in that described by independently verifying Algorithm carries out certification authentication
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continue issuer Information Authentication;
If it is consistent with current certificates issuer that system root certificate caches issuer, continue validity period of certificate verifying;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
4. a kind of method of computer processes control according to claim 3, which is characterized in that further include:
Certification authority white list, pre-set business software document term keyword are preset, for use in certificate is carried out Inquiring and authenticating.
5. a kind of method of computer processes control according to claim 4, which is characterized in that the carry out process behavior Trace analysis includes:
Pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
6. a kind of tool of computer processes control characterized by comprising
Information module is extracted, all certificates in the digital signature information and operating system for extracting computer Chinese part Information;
Authentication module determines certificate legitimacy for carrying out certification authentication by autonomous verification algorithm;
Analysis module, by analysis process position and behavior, judges the process for carrying out process behavior trace analysis Whether belong to legitimate processes, obtains intellectual analysis result;
Control module, for carrying out control to computer processes according to the intellectual analysis result.
7. a kind of tool of computer processes control according to claim 6, which is characterized in that the packet of the certificate It includes:
All cards in the sequence number information of digital signature and the caching of operating system in transplantable executable PE file The sequence number information of book.
8. a kind of tool of computer processes control according to claim 7, which is characterized in that the authentication module is used In:
Carry out the verifying of the sequence number information;
If digital signature sequence number information is consistent with system certificate repository information, continue issuer Information Authentication;
If it is consistent with current certificates issuer that system root certificate caches issuer, continue validity period of certificate verifying;
If be all verified above, it is determined that certificate is legal and stops continuing to verify.
9. a kind of tool of computer processes control according to claim 8, which is characterized in that further include:
Certification authority white list, pre-set business software document term keyword are preset, for use in certificate is carried out Inquiring and authenticating.
10. a kind of tool of computer processes control according to claim 9, which is characterized in that the analysis module is used In: pass through process trace mechanism analysis process Catalog Documents Keywords matching degree, it is determined whether be pre-set business software.
CN201910684687.8A 2019-07-26 2019-07-26 A kind of Method and kit for of computer processes control Pending CN110532775A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910684687.8A CN110532775A (en) 2019-07-26 2019-07-26 A kind of Method and kit for of computer processes control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910684687.8A CN110532775A (en) 2019-07-26 2019-07-26 A kind of Method and kit for of computer processes control

Publications (1)

Publication Number Publication Date
CN110532775A true CN110532775A (en) 2019-12-03

Family

ID=68661956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910684687.8A Pending CN110532775A (en) 2019-07-26 2019-07-26 A kind of Method and kit for of computer processes control

Country Status (1)

Country Link
CN (1) CN110532775A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115549966A (en) * 2022-08-25 2022-12-30 支付宝(杭州)信息技术有限公司 Security audit method and device for service request

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437375A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Confirmation method for safe mobile e-business platform digital certificate
CN1885224A (en) * 2005-06-23 2006-12-27 福建东方微点信息安全有限责任公司 Computer anti-virus protection system and method
CN104461830A (en) * 2014-12-19 2015-03-25 北京奇虎科技有限公司 Method and device for monitored progress
CN104680061A (en) * 2015-02-28 2015-06-03 国鼎网络空间安全技术有限公司 Method and system for verifying code signing during startup of application in Android environment
CN104753676A (en) * 2013-12-31 2015-07-01 北龙中网(北京)科技有限责任公司 Identity verifying method and device for mobile application developer
CN106126388A (en) * 2009-10-16 2016-11-16 阿里巴巴集团控股有限公司 The method of monitor event, regulation engine device and rule engine system
CN106603242A (en) * 2016-12-29 2017-04-26 哈尔滨安天科技股份有限公司 Offline digital signature verification method and system for domestic operating system
CN106650320A (en) * 2016-09-27 2017-05-10 武汉米企通网络科技有限公司 Generation method of software certificate
CN107544470A (en) * 2017-09-29 2018-01-05 杭州安恒信息技术有限公司 A kind of controller guard technology based on white list
CN107944260A (en) * 2017-12-04 2018-04-20 郑州云海信息技术有限公司 A kind of Behavior blocking device and method of Malware
CN108229171A (en) * 2018-02-11 2018-06-29 腾讯科技(深圳)有限公司 Driver processing method, device and storage medium
CN108881104A (en) * 2017-05-08 2018-11-23 ***通信有限公司研究院 The method and apparatus that a kind of pair of application program is verified
CN108985051A (en) * 2018-08-02 2018-12-11 郑州云海信息技术有限公司 A kind of intrusion prevention method and system of Behavior-based control tracking
CN109063480A (en) * 2018-07-25 2018-12-21 郑州云海信息技术有限公司 A kind of the executable file starting control method and system of oneself signature
CN109101813A (en) * 2018-09-03 2018-12-28 郑州云海信息技术有限公司 A kind of application program hold-up interception method and relevant apparatus
CN109117628A (en) * 2018-08-20 2019-01-01 郑州云海信息技术有限公司 A kind of white list control method and system
CN109359465A (en) * 2018-08-29 2019-02-19 郑州云海信息技术有限公司 A kind of program defence method and system based on digital certificate

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437375A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Confirmation method for safe mobile e-business platform digital certificate
CN1885224A (en) * 2005-06-23 2006-12-27 福建东方微点信息安全有限责任公司 Computer anti-virus protection system and method
CN106126388A (en) * 2009-10-16 2016-11-16 阿里巴巴集团控股有限公司 The method of monitor event, regulation engine device and rule engine system
CN104753676A (en) * 2013-12-31 2015-07-01 北龙中网(北京)科技有限责任公司 Identity verifying method and device for mobile application developer
CN104461830A (en) * 2014-12-19 2015-03-25 北京奇虎科技有限公司 Method and device for monitored progress
CN104680061A (en) * 2015-02-28 2015-06-03 国鼎网络空间安全技术有限公司 Method and system for verifying code signing during startup of application in Android environment
CN106650320A (en) * 2016-09-27 2017-05-10 武汉米企通网络科技有限公司 Generation method of software certificate
CN106603242A (en) * 2016-12-29 2017-04-26 哈尔滨安天科技股份有限公司 Offline digital signature verification method and system for domestic operating system
CN108881104A (en) * 2017-05-08 2018-11-23 ***通信有限公司研究院 The method and apparatus that a kind of pair of application program is verified
CN107544470A (en) * 2017-09-29 2018-01-05 杭州安恒信息技术有限公司 A kind of controller guard technology based on white list
CN107944260A (en) * 2017-12-04 2018-04-20 郑州云海信息技术有限公司 A kind of Behavior blocking device and method of Malware
CN108229171A (en) * 2018-02-11 2018-06-29 腾讯科技(深圳)有限公司 Driver processing method, device and storage medium
CN109063480A (en) * 2018-07-25 2018-12-21 郑州云海信息技术有限公司 A kind of the executable file starting control method and system of oneself signature
CN108985051A (en) * 2018-08-02 2018-12-11 郑州云海信息技术有限公司 A kind of intrusion prevention method and system of Behavior-based control tracking
CN109117628A (en) * 2018-08-20 2019-01-01 郑州云海信息技术有限公司 A kind of white list control method and system
CN109359465A (en) * 2018-08-29 2019-02-19 郑州云海信息技术有限公司 A kind of program defence method and system based on digital certificate
CN109101813A (en) * 2018-09-03 2018-12-28 郑州云海信息技术有限公司 A kind of application program hold-up interception method and relevant apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115549966A (en) * 2022-08-25 2022-12-30 支付宝(杭州)信息技术有限公司 Security audit method and device for service request

Similar Documents

Publication Publication Date Title
US10721245B2 (en) Method and device for automatically verifying security event
CN103581187B (en) Method and system for controlling access rights
CN108171088A (en) A kind of guard method of server hardware credibility and device based on BMC
CN108777675B (en) Electronic device, block chain-based identity authentication method, and computer storage medium
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
US20210306369A1 (en) Methods of monitoring and protecting access to online services
CN110740140A (en) network information security supervision system based on cloud platform
CN102456102A (en) Method for carrying out identity recertification on particular operation of information system by using Usb key technology
CN111143808B (en) System security authentication method and device, computing equipment and storage medium
US11899770B2 (en) Verification method and apparatus, and computer readable storage medium
KR101684016B1 (en) Apparatus for processing a plurality of logging policy and method thereof
CN112380501B (en) Equipment operation method, device, equipment and storage medium
KR101725404B1 (en) Method and apparatus for testing web site
JP6258189B2 (en) Specific apparatus, specific method, and specific program
CN110532775A (en) A kind of Method and kit for of computer processes control
CN112910883B (en) Data transmission method and device and electronic equipment
US20230125703A1 (en) Method for predicting the identity of a user associated to an anonymous browsing session on an online service
JP6890559B2 (en) Access analysis system and access analysis method
CN114584313A (en) Equipment physical identity authentication method, system and device and first platform
KR101725450B1 (en) Reputation management system provides safety in html5 and method of the same
CN111291044A (en) Sensitive data identification method and device, electronic equipment and storage medium
CN117499163B (en) WebRTC-based server remote maintenance method, system and equipment
CN113949568B (en) Middleware identification method, device, computing equipment and storage medium
CN108416218A (en) A kind of Web server validating vulnerability method
EP3885947A1 (en) Method of monitoring and protecting access to an online service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191203

RJ01 Rejection of invention patent application after publication