CN104408365A - Progress authentication method based on password - Google Patents

Progress authentication method based on password Download PDF

Info

Publication number
CN104408365A
CN104408365A CN201410780458.3A CN201410780458A CN104408365A CN 104408365 A CN104408365 A CN 104408365A CN 201410780458 A CN201410780458 A CN 201410780458A CN 104408365 A CN104408365 A CN 104408365A
Authority
CN
China
Prior art keywords
password
authentication
gauge tap
hmac value
operation requests
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410780458.3A
Other languages
Chinese (zh)
Other versions
CN104408365B (en
Inventor
廖湘科
丁滟
杨钊
陈松政
黄辰林
魏立峰
董攀
罗军
吴庆波
戴华东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201410780458.3A priority Critical patent/CN104408365B/en
Publication of CN104408365A publication Critical patent/CN104408365A/en
Application granted granted Critical
Publication of CN104408365B publication Critical patent/CN104408365B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a progress authentication method based on a password. The method comprises the following steps: setting an authentication password for a progress, calculating the HMAC value of the progress according to the authentication password and storing the HMAC value in extended attributes; presetting a password acquisition control switch in an operating system and configuring password acquisition control switch states; after receiving an operation request of the progress, judging whether to check the password according to the password acquisition control switch, acquiring the authentication password if needing to check the password; calculating the HMAC value of the progress based on the authentication password, comparing the HMAC value obtained by calculation with the HMAC value in the extended attributes of the progress, judging that the password authentication of the progress is successful and continuing the operation request of the progress if the HMAC values are the same, otherwise rejecting the operation request of the progress. The method disclosed by the invention has the advantages of reducing the risk of falsification of the system progress and being high in safety, good in universality and high in extensibility.

Description

A kind of process authentication method based on password
Technical field
The present invention relates to computer safety field, be specifically related to a kind of process authentication method based on password.
Background technology
Current, along with deepening continuously of the level of informatization, the computer virus such as virus, wooden horse, worm is day by day serious to the destruction of infosystem, and how guarantee information system is extremely urgent from destruction.Can find by analyzing, nearly all computer virus all causes because user has a mind to or be not intended to perform rogue program.Rogue program disguises oneself as normal procedure or be tied in normal program usually, brings out user and performs the rogue program that was tampered to reach demolition purpose.Therefore install and have the software of potential safety hazard very easily to damage the security of infosystem with running, gently then destroy the stability of system, the normal operation of influential system, heavy then cause the security incidents such as information leakage.Therefore, in control information system, the execution of process is with most important to the protection of process.
The authentication techniques mainly used at present have:
1) certificate verification: whether legally distinguish process by the presence or absence of certificate and correctness, this can control the execution of process to a certain extent, reaches the object of protection system safety, but effectively can not protect process.Such as, when certificate is correct, the executive routine malice of process is distorted, the safety of system can be threatened.
2) signature authentication: only can ensure whether process source is legal, but effectively can not protect process, there is the risk be tampered, and then the security of influential system.
When identical platform multi-user, certain user needs to protect for certain process, does not allow other users to perform this protected process simultaneously, gets up by process and user-association.Current authentication techniques can reach this requirement, but underaction, transplantability are bad.As certificate verification, during certificate associated user, this effect can be reached, but underaction, and when the multiple certificate of process context, the execution principle of single user to process will be run counter to.
Summary of the invention
The technical problem to be solved in the present invention be easily controlled by virus/wooden horse etc. for system process in the unshielded situation of existing operating system process and distort, system process performs and is tampered the shortcoming that risk is high, security of system is low, provide a kind of and can reduce the risk that system process is tampered, the process authentication method based on password that security is high, versatility good, extendability is strong.
In order to solve the problems of the technologies described above, the technical solution used in the present invention is:
Based on a process authentication method for password, implementation step is as follows:
1) for process arranges authentication password, be stored in the extended attribute of process according to the HMAC value of described authentication password calculation procedure; Password is set in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser; After receiving the operation requests of process, redirect performs next step;
2) obtain gauge tap according to password to judge whether to need to carry out password authentification, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process.
Preferably, described step 2) detailed implementation step as follows:
2.1) arrange password in advance in an operating system obtain gauge tap and force gauge tap, and the state configuring password and obtain gauge tap and force gauge tap is set according to the start-up parameter of operating system or superuser, initialization is 0 for recording the counter of the number of times successfully passing certification; After receiving the operation requests of process, detect the state of forcing gauge tap, if force gauge tap to be opened, then redirect performs step 2.6); If force gauge tap to be closed, then redirect performs step 2.2);
2.2) detect the state that password obtains gauge tap, close if password obtains gauge tap, then redirect performs step 2.3), open if password obtains gauge tap, then redirect performs step 2.4);
2.3) obtain authentication password, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, continue the operation requests of process; Otherwise judge this process cipher authentication failure, the operation requests of refusal process; Certification terminates and exits;
2.4) read the number of times successfully passing certification in described counter, if the number of times successfully passing certification is 0, then redirect performs step 2.5), if the number of times successfully passing certification is more than or equal to 1, then redirect performs step 2.6);
2.5) authentication password is obtained, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; The operation requests proceeding process is determined whether according to result of determination, if the success of process cipher authentication, create temporary file corresponding to process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification put 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.6) authentication password after reading encryption from temporary file corresponding to process is also decrypted, then based on the HMAC value of deciphering the authentication password calculation procedure obtained, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; Determine whether according to result of determination the operation requests proceeding process, if the success of process cipher authentication, the counter being used for recording the number of times successfully passing certification is added 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.7) determinating processes operation requests does not need to carry out cipher authentication, directly carries out process operation and exits.
Preferably, specifically refer to direct input authentication password for process arranges authentication password in described step 1), read authentication password from memory device, obtain the one authentication password from credible chip.
Preferably, described step 2.3) in obtain that authentication password specifically refers to direct input authentication password, reads authentication password from memory device, the one obtained from credible chip authentication password.
The process authentication method that the present invention is based on password has following advantage:
1, the present invention is by arranging authentication password for process, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure, after receiving the operation requests of process, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, by the HMAC value calculated, HMAC value in the extended attribute of process compares, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process, process can be controlled not by illegal execution by authentication password and extended attribute, can prevent the process after being tampered from continuing to perform simultaneously, reach the object that process is protected.Reduce system process by this authentication method perform and be tampered equivalent risk, add the security of system.
2, the present invention is by arranging authentication password for process, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure, adopt the HMAC value of extended attribute space storage process, as long as therefore process extended attribute supported by goal systems platform, just can use the process authentication method that the present invention is based on password, so kylin operating system and Linux system can be supported, equally also can support that other supports the operating system of process extended attribute, can the diversity of supporting platform, there is the advantage that versatility is good, extendability is strong.
3, the present invention arranges password in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser, after receiving the operation requests of process, obtain gauge tap according to password to judge whether to need to carry out password authentification, thus can control the need of carrying out password authentification easily, during process operation request, need first to detect the state of gauge tap, determine whether carry out cipher authentication again, manually input password carry out certification the need of reading password or user from peripheral hardware, thus the carrying out that can effectively prevent some from frequently allowing needs frequently to obtain the problem of authentication password, thus make enforcement more convenient.
Accompanying drawing explanation
Fig. 1 is the implementing procedure schematic diagram of the embodiment of the present invention.
Fig. 2 is embodiment of the present invention step 2) detailed implementing procedure schematic diagram.
Embodiment
As shown in Figure 1, the present embodiment is as follows based on the implementation step of the process authentication method of password:
1) for process arranges authentication password, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure; Password is set in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser; After receiving the operation requests of process, redirect performs next step;
2) obtain gauge tap according to password to judge whether to need to carry out password authentification, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process.
By arranging authentication password for process in the present embodiment, be stored in the extended attribute of process according to the HMAC value of authentication password calculation procedure, after receiving the operation requests of process, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, by the HMAC value calculated, HMAC value in the extended attribute of process compares, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process, process can be controlled not by illegal execution by authentication password and extended attribute, when certain user in identical platform does not allow other users perform and revise certain process, the present embodiment can be utilized to be that this process arranges cipher authentication, reach the object of protection.
Specifically can select direct input authentication password as required for process arranges authentication password in step 1), read authentication password from memory device (USB flash disk, UKey, disk, CD etc.), obtain the one authentication password from credible chip (such as TPM chip etc.).In the present embodiment, specifically read authentication password from UKey for process arranges authentication password.The safety label of the file extent property store process that the present embodiment utilizes operating system to support, the operating system environment of the present embodiment is the kylin operating system that School of Computer Science of the National University of Defense technology develops, kylin operating system can support the mark that process extended attribute is classified, the HMAC value of calculation procedure specifically refers to and adopts SHA1 cryptographic algorithm to calculate SHA1 value, HMAC value is stored into and specifically refers in the extended attribute of process in the extended attribute space security.auth of the process of being stored into.In addition, the present embodiment equally also can support that other supports the operating system of process extended attribute, and the diversity of supporting platform, has the advantage that versatility is good, extendability is strong.
As shown in Figure 2, step 2) detailed implementation step as follows:
2.1) arrange password in advance in an operating system obtain gauge tap and force gauge tap, and the state configuring password and obtain gauge tap and force gauge tap is set according to the start-up parameter (grub parameter) of operating system or superuser, initialization is 0 for recording the counter of the number of times successfully passing certification; After receiving the operation requests of process, detect the state of forcing gauge tap, if force gauge tap to be opened, then redirect performs step 2.6); If force gauge tap to be closed, then redirect performs step 2.2);
2.2) detect the state that password obtains gauge tap, close if password obtains gauge tap, then redirect performs step 2.3), open if password obtains gauge tap, then redirect performs step 2.4);
2.3) obtain authentication password, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, continue the operation requests of process; Otherwise judge this process cipher authentication failure, the operation requests of refusal process; Certification terminates and exits;
2.4) read the number of times successfully passing certification in described counter, if the number of times successfully passing certification is 0, then redirect performs step 2.5), if the number of times successfully passing certification is more than or equal to 1, then redirect performs step 2.6);
2.5) authentication password is obtained, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; The operation requests proceeding process is determined whether according to result of determination, if the success of process cipher authentication, create temporary file corresponding to process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification put 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.6) authentication password after reading encryption from temporary file corresponding to process is also decrypted, then based on the HMAC value of deciphering the authentication password calculation procedure obtained, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; Determine whether according to result of determination the operation requests proceeding process, if the success of process cipher authentication, the counter being used for recording the number of times successfully passing certification is added 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.7) determinating processes operation requests does not need to carry out cipher authentication, directly carries out process operation and exits.
What needs were said is, password obtains gauge tap and closes corresponding step 2.3), the number of times of process success identity be 0 step 2.5 corresponding to situation) be first all input password for user to carry out certification, therefore in order to be " input password carries out certification " same picture frame by its co expression in schematic drawing 2.But, both are different about the process after certification, if the success of process cipher authentication, the number of times of process success identity is the step 2.5 corresponding to situation of 0) also comprise temporary file corresponding to establishment process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification is put the step of 1, thus guarantees follow-up step 2.6) can carry out smoothly.
In the present embodiment, step 2.3) in obtain authentication password and specifically can select direct input authentication password as required, read authentication password from memory device (USB flash disk, UKey, disk, CD etc.), obtain the one authentication password from credible chip (such as TPM chip etc.).In the present embodiment, specifically read authentication password from UKey for process arranges authentication password.
Whether the control in order to realize password authentification in the present embodiment is provided with password and obtains gauge tap and force gauge tap: all need input password to carry out cipher authentication when (1) password obtains gauge tap for controlling each process operation request, when password obtains gauge tap unlatching, input password is needed to carry out cipher authentication after system starts during first time process operation request, password encryption is stored in temporary file corresponding to process simultaneously, below this process again operation requests time carry out cipher authentication with regard to not needing additionally to input password, but directly obtaining password from temporary file carries out cipher authentication, when password obtains gauge tap closedown, each operation requests of process all needs input password to carry out cipher authentication.This switch is defaulted as cut out after system starts at every turn.(2) gauge tap is forced whether to carry out cipher authentication for controlling process operation request.When forcing gauge tap to be opened, do not carry out cipher authentication during process operation request, directly carry out process operation; When forcing gauge tap to be closed, need during process operation request to carry out cipher authentication, could determine whether carry out process operation afterwards.This switch is defaulted as cut out after system starts at every turn.Password is obtained gauge tap and forces gauge tap directly can be arranged in kernel by grub parameter, also can be arranged by superuser after the system of entering, thus under the prerequisite ensureing system cloud gray model security, obtain gauge tap by password and force arranging of gauge tap can run process faster.In the present embodiment, step 2.4) in be the counter values being recorded this process number of times of success identity by the temporary file that process is corresponding.After system starts, during process certification, judge whether this process is first time carry out cipher authentication by judging whether corresponding temporary file exists, represent that when this temporary file does not exist process carries out cipher authentication at first time, and create temporary file, if authentication success, the number of times of success identity is added 1, password encryption is stored in temporary file simultaneously, if certification is unsuccessful, success identity number of times is set to 0; During system closing, temporary file is deleted.
The above is only the preferred embodiment of the present invention, protection scope of the present invention be not only confined to above-described embodiment, and all technical schemes belonged under thinking of the present invention all belong to protection scope of the present invention.It should be pointed out that for those skilled in the art, some improvements and modifications without departing from the principles of the present invention, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (4)

1., based on a process authentication method for password, it is characterized in that implementation step is as follows:
1) for process arranges authentication password, be stored in the extended attribute of process according to the HMAC value of described authentication password calculation procedure; Password is set in advance in an operating system and obtains gauge tap, and configure password obtain gauge tap state according to arranging of the start-up parameter of operating system or superuser; After receiving the operation requests of process, redirect performs next step;
2) obtain gauge tap according to password to judge whether to need to carry out password authentification, authentication password is obtained when needs carry out password authentification, based on the HMAC value of authentication password calculation procedure, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge the success of this process cipher authentication and continue the operation requests of process, otherwise the operation requests of refusal process.
2. the process authentication method based on password according to claim 1, is characterized in that, described step 2) detailed implementation step as follows:
2.1) arrange password in advance in an operating system obtain gauge tap and force gauge tap, and the state configuring password and obtain gauge tap and force gauge tap is set according to the start-up parameter of operating system or superuser, initialization is 0 for recording the counter of the number of times successfully passing certification; After receiving the operation requests of process, detect the state of forcing gauge tap, if force gauge tap to be opened, then redirect performs step 2.6); If force gauge tap to be closed, then redirect performs step 2.2);
2.2) detect the state that password obtains gauge tap, close if password obtains gauge tap, then redirect performs step 2.3), open if password obtains gauge tap, then redirect performs step 2.4);
2.3) obtain authentication password, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, continue the operation requests of process; Otherwise judge this process cipher authentication failure, the operation requests of refusal process; Certification terminates and exits;
2.4) read the number of times successfully passing certification in described counter, if the number of times successfully passing certification is 0, then redirect performs step 2.5), if the number of times successfully passing certification is more than or equal to 1, then redirect performs step 2.6);
2.5) authentication password is obtained, based on the HMAC value of authentication password calculation procedure, the HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; The operation requests proceeding process is determined whether according to result of determination, if the success of process cipher authentication, create temporary file corresponding to process and by authentication password cryptographic storage in temporary file corresponding to process, the counter being used for recording the number of times successfully passing certification put 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.6) authentication password after reading encryption from temporary file corresponding to process is also decrypted, then based on the HMAC value of deciphering the authentication password calculation procedure obtained, HMAC value in the extended attribute of the HMAC value calculated, process is compared, if both are identical, then judge this process cipher authentication success, otherwise judge this process cipher authentication failure; Determine whether according to result of determination the operation requests proceeding process, if the success of process cipher authentication, the counter being used for recording the number of times successfully passing certification is added 1 and continues the operation requests of process; If the failure of process cipher authentication, refuses the operation requests of process; Certification terminates and exits;
2.7) determinating processes operation requests does not need to carry out cipher authentication, directly carries out process operation and exits.
3. the process authentication method based on password according to claim 2, is characterized in that: specifically refer to direct input authentication password for process arranges authentication password in described step 1), read authentication password from memory device, obtain the one authentication password from credible chip.
4. the process authentication method based on password according to claim 3, is characterized in that: described step 2.3) in obtain that authentication password specifically refers to direct input authentication password, reads authentication password from memory device, the one obtained from credible chip authentication password.
CN201410780458.3A 2014-12-17 2014-12-17 Progress authentication method based on password Active CN104408365B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410780458.3A CN104408365B (en) 2014-12-17 2014-12-17 Progress authentication method based on password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410780458.3A CN104408365B (en) 2014-12-17 2014-12-17 Progress authentication method based on password

Publications (2)

Publication Number Publication Date
CN104408365A true CN104408365A (en) 2015-03-11
CN104408365B CN104408365B (en) 2017-05-24

Family

ID=52645996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410780458.3A Active CN104408365B (en) 2014-12-17 2014-12-17 Progress authentication method based on password

Country Status (1)

Country Link
CN (1) CN104408365B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933556A (en) * 2015-12-29 2017-07-07 珠海市君天电子科技有限公司 Method and device for opening driver

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599112A (en) * 2009-04-09 2009-12-09 广州市芯德电子技术有限公司 A kind of method of protecting encryption software
CN103078878A (en) * 2013-02-06 2013-05-01 浪潮电子信息产业股份有限公司 Firewall-based protecting method for key progress of virtual machine
CN103220289A (en) * 2013-04-15 2013-07-24 北京京东尚科信息技术有限公司 Resource verification system and resource verification method based on web application
CN103617128A (en) * 2013-12-11 2014-03-05 长城信息产业股份有限公司 Embedded system and implementation method of secure operating system
CN103617388A (en) * 2013-12-11 2014-03-05 长城信息产业股份有限公司 Implementation method for secure operating system with process credibility authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599112A (en) * 2009-04-09 2009-12-09 广州市芯德电子技术有限公司 A kind of method of protecting encryption software
CN103078878A (en) * 2013-02-06 2013-05-01 浪潮电子信息产业股份有限公司 Firewall-based protecting method for key progress of virtual machine
CN103220289A (en) * 2013-04-15 2013-07-24 北京京东尚科信息技术有限公司 Resource verification system and resource verification method based on web application
CN103617128A (en) * 2013-12-11 2014-03-05 长城信息产业股份有限公司 Embedded system and implementation method of secure operating system
CN103617388A (en) * 2013-12-11 2014-03-05 长城信息产业股份有限公司 Implementation method for secure operating system with process credibility authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933556A (en) * 2015-12-29 2017-07-07 珠海市君天电子科技有限公司 Method and device for opening driver

Also Published As

Publication number Publication date
CN104408365B (en) 2017-05-24

Similar Documents

Publication Publication Date Title
EP3779745B1 (en) Code pointer authentication for hardware flow control
CN111723383B (en) Data storage and verification method and device
US20190363894A1 (en) Method and system for protecting computing devices from malwares
US20180101678A1 (en) Method and System for Countering Ransomware
US11601281B2 (en) Managing user profiles securely in a user environment
CN103793334A (en) Mobile storage device based data protecting method and mobile storage device
CN105683990A (en) Method and apparatus for protecting dynamic libraries
Götzfried et al. Analysing Android's Full Disk Encryption Feature.
CN107563192B (en) Lesso software protection method and device, electronic equipment and storage medium
EP2835997B1 (en) Cell phone data encryption method and decryption method
CA2842741C (en) Password audit system
Müller et al. A systematic assessment of the security of full disk encryption
WO2017107896A1 (en) Document protection method and device
RU2015101734A (en) PROTECTED ACCESS METHOD AND APPLIED PROTECTED ACCESS DEVICE
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN105930728B (en) A kind of application checking method and device
CN106603230B (en) A kind of DRM key saves, read method and preservation, reads system
US20140289537A1 (en) Encryption system and method of encrypting a device
US20170262640A1 (en) Database operation method and device
CN104408365A (en) Progress authentication method based on password
CN111259405A (en) Computer safety coefficient based on artificial intelligence
CN111814137B (en) Operation and maintenance method, operation and maintenance system and storage medium of terminal
CN110633585B (en) Hard disk locking and unlocking method, device, equipment and readable storage medium
CN113127141B (en) Container system management method and device, terminal equipment and storage medium
CN115048662A (en) File protection method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant