CN101667232B - 基于可信计算的终端可信保障系统与方法 - Google Patents
基于可信计算的终端可信保障系统与方法 Download PDFInfo
- Publication number
- CN101667232B CN101667232B CN200910088242.XA CN200910088242A CN101667232B CN 101667232 B CN101667232 B CN 101667232B CN 200910088242 A CN200910088242 A CN 200910088242A CN 101667232 B CN101667232 B CN 101667232B
- Authority
- CN
- China
- Prior art keywords
- hash value
- credible security
- program
- sub
- credible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910088242.XA CN101667232B (zh) | 2009-07-13 | 2009-07-13 | 基于可信计算的终端可信保障系统与方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910088242.XA CN101667232B (zh) | 2009-07-13 | 2009-07-13 | 基于可信计算的终端可信保障系统与方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101667232A CN101667232A (zh) | 2010-03-10 |
CN101667232B true CN101667232B (zh) | 2014-12-10 |
Family
ID=41803851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910088242.XA Active CN101667232B (zh) | 2009-07-13 | 2009-07-13 | 基于可信计算的终端可信保障系统与方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101667232B (zh) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475671B (zh) * | 2010-08-18 | 2017-12-29 | 北京奇虎科技有限公司 | 恶意程序检测方法 |
CN102789558A (zh) * | 2011-05-20 | 2012-11-21 | 北京网秦天下科技有限公司 | 分析移动设备中程序安装和程序运行的方法和系统 |
CN102404157A (zh) * | 2011-12-26 | 2012-04-04 | 苏州风采信息技术有限公司 | 系统管理员功能的实现方法 |
CN102831355B (zh) * | 2011-12-30 | 2015-08-26 | 中国科学院软件研究所 | 安全操作系统中建立可信路径的方法 |
CN105488404B (zh) * | 2014-12-23 | 2019-01-15 | 哈尔滨安天科技股份有限公司 | 一种防止数据被后门窃取的方法及系统 |
US10162767B2 (en) * | 2015-06-27 | 2018-12-25 | Mcafee, Llc | Virtualized trusted storage |
CN105553720A (zh) * | 2015-12-15 | 2016-05-04 | 浪潮电子信息产业股份有限公司 | 一种具有可信运行环境的客户端及系统 |
CN106936768B (zh) * | 2015-12-29 | 2020-04-10 | 大唐高鸿信安(浙江)信息科技有限公司 | 基于可信芯片的白名单网络管控系统及方法 |
CN107770200A (zh) * | 2017-12-11 | 2018-03-06 | 湖南中科优信科技有限公司 | 一种存储系统进程访问安全保护方法和系统 |
CN111083089A (zh) * | 2018-10-19 | 2020-04-28 | 北京国铁盛阳技术有限公司 | 安全摆渡系统及方法 |
CN110555293A (zh) * | 2019-09-10 | 2019-12-10 | 百度在线网络技术(北京)有限公司 | 用于保护数据的方法、装置、电子设备和计算机可读介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6567917B1 (en) * | 1999-02-01 | 2003-05-20 | Cisco Technology, Inc. | Method and system for providing tamper-resistant executable software |
CN1900941A (zh) * | 2006-04-28 | 2007-01-24 | 傅玉生 | 一种基于软件身份认证技术的计算机安全保护方法 |
CN101136048A (zh) * | 2007-09-30 | 2008-03-05 | 广东南方信息安全产业基地有限公司 | 软件认证方法 |
CN101231682A (zh) * | 2007-01-26 | 2008-07-30 | 李贵林 | 计算机信息安全的方法 |
CN201191510Y (zh) * | 2007-11-21 | 2009-02-04 | 北京中软华泰信息技术有限责任公司 | 防摆渡u盘存储器 |
-
2009
- 2009-07-13 CN CN200910088242.XA patent/CN101667232B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6567917B1 (en) * | 1999-02-01 | 2003-05-20 | Cisco Technology, Inc. | Method and system for providing tamper-resistant executable software |
CN1900941A (zh) * | 2006-04-28 | 2007-01-24 | 傅玉生 | 一种基于软件身份认证技术的计算机安全保护方法 |
CN101231682A (zh) * | 2007-01-26 | 2008-07-30 | 李贵林 | 计算机信息安全的方法 |
CN101136048A (zh) * | 2007-09-30 | 2008-03-05 | 广东南方信息安全产业基地有限公司 | 软件认证方法 |
CN201191510Y (zh) * | 2007-11-21 | 2009-02-04 | 北京中软华泰信息技术有限责任公司 | 防摆渡u盘存储器 |
Also Published As
Publication number | Publication date |
---|---|
CN101667232A (zh) | 2010-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101667232B (zh) | 基于可信计算的终端可信保障系统与方法 | |
EP3462698B1 (en) | System and method of cloud detection, investigation and elimination of targeted attacks | |
CN109766699B (zh) | 操作行为的拦截方法及装置、存储介质、电子装置 | |
CN106326699B (zh) | 一种基于文件访问控制和进程访问控制的服务器加固方法 | |
Shabtai et al. | Google android: A comprehensive security assessment | |
EP3029593B1 (en) | System and method of limiting the operation of trusted applications in the presence of suspicious programs | |
US7665139B1 (en) | Method and apparatus to detect and prevent malicious changes to tokens | |
CN102270287B (zh) | 一种提供主动安全服务的可信软件基 | |
CN113660224B (zh) | 基于网络漏洞扫描的态势感知防御方法、装置及系统 | |
CN113037713B (zh) | 网络攻击的对抗方法、装置、设备及存储介质 | |
Deng et al. | Lexical analysis for the webshell attacks | |
US8978150B1 (en) | Data recovery service with automated identification and response to compromised user credentials | |
Sikder et al. | A survey on android security: development and deployment hindrance and best practices | |
CN110087238B (zh) | 一种移动电子设备信息安全保护系统 | |
Omar et al. | Android application security | |
CN113660222A (zh) | 基于强制访问控制的态势感知防御方法及系统 | |
Zlatanov | Computer security and mobile security challenges | |
Zeybek et al. | A study on security awareness in mobile devices | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Powers et al. | Whitelist malware defense for embedded control system devices | |
US11449605B2 (en) | Systems and methods for detecting a prior compromise of a security status of a computer system | |
US20230394146A1 (en) | Analyzing files using a kernel mode of a virtual machine | |
Ahmad et al. | Implementation of a behavior driven methodology for insider threats detection of misuse of information in windows environment | |
US20230388307A1 (en) | System and Method for Improved Security when Working Remotely | |
Kedia et al. | A Unique Approach for Detection and Removal of Key Loggers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: SHEN JUN Free format text: FORMER OWNER: BEIJING CS+S HUATECH INFORMATION TECHNOLOGY CO., LTD. Effective date: 20120903 |
|
C41 | Transfer of patent application or patent right or utility model | ||
C53 | Correction of patent for invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Shen Jun Inventor before: Shen Jun Inventor before: Zhao Yong Inventor before: Han Yue Inventor before: Li Yu Inventor before: Chen Yasha |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: SHEN JUN ZHAO YONG HAN YUE LI YU CHEN YASHA TO: SHEN JUN |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20120903 Address after: B District of Beijing city Haidian District landianchang Jin Yuan mall No. 2 B block, room 706, 705 Applicant after: Shen Jun Address before: 100086, room 1811, Hengrun center, No. 32 West Third Ring Road, Beijing, Haidian District Applicant before: Beijing Huatech Information Technology Co., Ltd. |
|
ASS | Succession or assignment of patent right |
Owner name: BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO., L Free format text: FORMER OWNER: SHEN JUN Effective date: 20120906 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: HAIDIAN, BEIJING TO: 100097 HAIDIAN, BEIJING |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20120906 Address after: 100097 Beijing city Haidian District landianchang Jin Yuan mall B District No. 2, room 706, block B 705 Applicant after: Beijing Huatech Trusted Computing Information Technology Co., Ltd. Address before: B District of Beijing city Haidian District landianchang Jin Yuan mall No. 2 B block, room 706, 705 Applicant before: Shen Jun |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |