CN110162962A - Program security recognition methods, device, equipment and computer readable storage medium - Google Patents

Program security recognition methods, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110162962A
CN110162962A CN201910464979.0A CN201910464979A CN110162962A CN 110162962 A CN110162962 A CN 110162962A CN 201910464979 A CN201910464979 A CN 201910464979A CN 110162962 A CN110162962 A CN 110162962A
Authority
CN
China
Prior art keywords
list
program
identified
trust
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910464979.0A
Other languages
Chinese (zh)
Inventor
张彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910464979.0A priority Critical patent/CN110162962A/en
Publication of CN110162962A publication Critical patent/CN110162962A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of program security recognition methods, including when receiving list to be identified, determine the attribute-bit of the list to be identified;Judge in default list library with the presence or absence of the program list with the list to be identified with same alike result mark;If it exists, then the level of trust of described program list is obtained;Set the level of trust of described program list to the level of trust of the list to be identified;The program security recognition methods can the legitimacy to computer program effectively identified, to guarantee the normal operation of computer.Disclosed herein as well is a kind of program security identification device, equipment and computer readable storage mediums, all have above-mentioned beneficial effect.

Description

Program security recognition methods, device, equipment and computer readable storage medium
Technical field
This application involves computer software technical field, in particular to a kind of program security recognition methods further relates to one Kind program security identification device, equipment and computer readable storage medium.
Background technique
In general, corresponding flow chart of data processing can be realized by running computer program on the client, but if When illegalities computer program involved in the computer program of client, biggish crisis often is brought to client, is influenced The normal operation of computer.
In order to protect client, the operation permission of computer program in client can be controlled by inventory, specifically, The legitimacy of computer program can be indicated in program listing in detail, blacklist and unknown program do not allow to run, white list and ash List is allowed to run.However, in the prior art, often being carried out by administrator for the validity judgement of computer program What manual identified was realized, judging result is largely dependent upon the level of expertise of administrator, but only relies on people's Knowledge and intuition judge that computer program whether be harmful program is extremely insecure.
Therefore, how the legitimacy of computer program is effectively identified, to guarantee that the normal operation of computer is this Field technical staff's urgent problem to be solved.
Summary of the invention
The purpose of the application is to provide a kind of program security recognition methods, and this method can be to the legitimacy of computer program It is effectively identified, ensure that the normal operation of computer;The another object of the application is to provide a kind of program security identification Device, equipment and computer readable storage medium, it may have above-mentioned beneficial effect.
In order to solve the above technical problems, this application provides a kind of program security recognition methods, comprising:
When receiving list to be identified, the attribute-bit of the list to be identified is determined;
Judge in default list library with the presence or absence of the program list with the list to be identified with same alike result mark;
If it exists, then the level of trust of described program list is obtained;
Set the level of trust of described program list to the level of trust of the list to be identified.
Preferably, the attribute-bit is hash value.
Preferably, the building process in the default list library includes:
File acquisition is carried out by sampling instrument, obtains each program list;
Determine the level of trust and attribute-bit of each described program list;
Judged in the default list library according to the attribute-bit with the presence or absence of corresponding program list;
If it exists, then the described program list of acquisition is deleted;
If it does not exist, then the described program list of acquisition is inserted into corresponding level of trust and attribute-bit described pre- If list library.
Preferably, the described program list by acquisition is inserted into described pre- with corresponding level of trust and attribute-bit If list library, comprising:
System type judgement is carried out to described program list;
If described program list is Windows file, by described program list and corresponding level of trust and attribute mark Knowledge is inserted into Windows list library;
If described program list is Linux file, by described program list and corresponding level of trust and attribute-bit It is inserted into Linux list library.
Preferably, described program safety recognition methods further include:
It is carried out according to the program list in the program name single pair program listing and client inventory in the default list library Level of trust updates.
Preferably, described to judge that there is same alike result mark with the presence or absence of with the list to be identified in default list library Before program list, further includes:
Judge that the inventory to be identified whether there is in described program inventory according to the attribute-bit;
If it exists, then the level of trust of the list to be identified is obtained in described program inventory;
If it does not exist, then executing in the default list library of the judgement has same genus with the presence or absence of with the list to be identified Property mark program list the step of.
Preferably, described program safety recognition methods further include:
If the program list that there is same alike result mark with the list to be identified is not present in the default list library, After the level of trust for determining the list to be identified, the attribute-bit of the list to be identified is calculated, and by the institute after identification It states list to be identified and is inserted into the default list library with corresponding level of trust and attribute-bit.
In order to solve the above technical problems, present invention also provides a kind of program security identification devices, comprising:
Attribute-bit determining module, for when receiving list to be identified, determining the attribute mark of the list to be identified Know;
Program list judgment module is identical with the presence or absence of having with the list to be identified in default list library for judging The program list of attribute-bit;
Level of trust obtains module, if having same genus with the list to be identified for existing in the default list library Property mark program list, then obtain the level of trust of described program list;
Level of trust setup module, for setting the level of trust of described program list in the letter of the list to be identified Appoint rank.
In order to solve the above technical problems, present invention also provides a kind of program securities to identify equipment, comprising:
Memory, for storing computer program;
Processor realizes the step of any one of the above program security recognition methods when for executing the computer program Suddenly.
In order to solve the above technical problems, the computer can present invention also provides a kind of computer readable storage medium It reads to be stored with computer program on storage medium, the computer program realizes any one of the above program when being executed by processor The step of safety recognition methods.
A kind of program security recognition methods provided herein, including when receiving list to be identified, determine institute State the attribute-bit of list to be identified;Judge that there is same alike result mark with the presence or absence of with the list to be identified in default list library The program list of knowledge;If it exists, then the level of trust of described program list is obtained;The level of trust of described program list is arranged For the level of trust of the list to be identified.
As it can be seen that program security recognition methods provided herein, constructs list library to store known legitimate in advance The program list of property, can be direct after obtaining its attribute-bit as a result, when receiving the list to be identified of unknown legitimacy Judge to whether there is program list identical with its attribute-bit in default list library, if the attribute-bit of list to be identified with The attribute-bit of a certain program list is identical in default list library, then list to be identified and the program list are same computer journey Sequence realizes the effective judgement for treating identification list legitimacy then the level of trust of the two also must be the same as a result, into One step guarantees that the computer program of client operation is legitimacy program, ensure that the normal operation of computer.
A kind of program security identification device, equipment and computer readable storage medium provided herein, has There is above-mentioned beneficial effect, details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of program security recognition methods provided herein;
Fig. 2 is a kind of flow diagram of the construction method in default list library provided herein;
Fig. 3 is the flow diagram of another program security recognition methods provided herein;
Fig. 4 is a kind of structural schematic diagram of program security identification device provided herein;
Fig. 5 is the structural schematic diagram that a kind of program security provided herein identifies equipment.
Specific embodiment
The core of the application is to provide a kind of program security recognition methods, and this method can be to the legitimacy of computer program It is effectively identified, ensure that the normal operation of computer;Another core of the application is to provide a kind of program security identification Device, equipment and computer readable storage medium, it may have above-mentioned beneficial effect.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art All other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram of program security recognition methods provided herein, the party Method may include:
S101: when receiving list to be identified, the attribute-bit of list to be identified is determined;
This step aim at treat identification list attribute-bit acquisition, wherein the list to be identified be it is unknown its The program list of legitimacy, each program list have its unique corresponding attribute-bit.Therefore, when management platform receive to When identifying list, it can be calculated, to obtain its corresponding unique identification, i.e., above-mentioned attribute-bit.It is contemplated that, The concrete type of the attribute-bit has no effect on the implementation of the technical program, need to only can be realized and represent program list uniqueness Function.
Preferably, above-mentioned attribute-bit can be hash value.
A kind of concrete type of attribute-bit, i.e. hash value are present embodiments provided, for list hash value to be identified Acquisition can be realized by hash algorithm.Specifically, the binary value of random length can be mapped as regular length by hash algorithm Smaller binary value, which is cryptographic Hash, i.e., above-mentioned hash value.Due to cryptographic Hash be one piece of data it is unique and Extremely compact numerical value representation, even if only changing a letter in paragraph in one section of plaintext of hash, subsequent Hash all will Generate different values, therefore, to find hash be the same hash value two different inputs, computationally for substantially It is impossible, thus can be using hash value as above-mentioned attribute-bit, to represent the uniqueness of program list.
S102: judge in default list library with the presence or absence of the program list with list to be identified with same alike result mark;
Specifically, can judge default list library based on the attribute-bit after the attribute-bit for obtaining list to be identified In whether there is the computer program, that is, judge that there is same alike result mark with the presence or absence of with list to be identified in default list library Program list.According to the uniqueness of attribute-bit, if attribute-bit is identical, illustrate in list to be identified and default list library Program list be same computer program, be otherwise different computer programs.Wherein, above-mentioned default list library is preparatory structure The list library built, wherein being stored with the program list of a large amount of known legitimate.
Further, this application provides a kind of construction methods in specific default list library, referring to FIG. 2, Fig. 2 is this Shen Please provided by a kind of flow chart of default list base construction method, this method can include:
S201: file acquisition is carried out by sampling instrument, obtains each program list;
S202: the level of trust and attribute-bit of each program list are determined;
S203: judged to whether there is corresponding program list in default list library according to attribute-bit;If it exists, then it executes S204 then executes S205 if it does not exist;
S204: the program list of acquisition is deleted;
S205: the program list of acquisition is inserted into default list library with corresponding level of trust and attribute-bit.
Firstly, carrying out file acquisition by preset sampling instrument, all kinds of program lists are obtained with as much as possible, In, the sampling instrument which can carry for system, for example, sampling instrument is one for linux system Shell script, for Windows system, sampling instrument is an exe program, it is seen then that the concrete type of sampling instrument According to depending on system type, the application is not limited this.Further, to each program list carry out level of trust setting and The calculating of attribute-bit, the process can carry out multiple audit and verification, to guarantee the standard of program list level of trust setting result True property, and then guarantee the subsequent accuracy treated identification list and compare judgement.Further, since program list is slotting one by one Enter to default list library, and the case where the program list in system also will appear repetition, therefore, inserted by each program list Enter to before default list library, first can judge whether it has been stored in default list library according to its attribute-bit, if It is inserted into default list library, then is directly deleted the program list of the acquisition, to avoid repeating, certainly, if default The program list of the acquisition is not present in list library, then is inserted into the program list together together with its confidence levels and attribute-bit Into default list library.
Preferably, the program list of acquisition is inserted into default list library with corresponding level of trust and attribute-bit, wrapped It includes: system type judgement is carried out to program list;If program list is Windows file, by program list and corresponding letter Rank and attribute-bit is appointed to be inserted into Windows list library;If program list be Linux file, by program list with it is corresponding Level of trust and attribute-bit be inserted into Linux list library.
For the identification convenient for list to be identified, for the program list in default list library, system class according to locating for it The difference of type is stored in different list libraries, specifically, before program list is inserted into default list library, System type judgement first can be carried out to it, the program list for belonging to Windows system is inserted into Windows list library, will be belonged to Linux list library is inserted into the program list of linux system.Wherein, above-mentioned Windows file is to belong to Windows system The program list of system, Linux file are the program list for belonging to linux system.
As a kind of preferred embodiment, which can also include: according in default list library Program list in program name single pair program listing and client inventory carries out level of trust update.
Specifically, due to presetting its known level of trust of the program list in list library and attribute-bit, to protect The normal operation of card system and client can also be based further on the level of trust of each program list in default list library to being The program list in internal program inventory and client inventory of uniting carries out the update of level of trust, i.e., to being already present on default list In library and it is under the jurisdiction of the program name of program listing and client inventory and sets up surely corresponding level of trust.
S103: it if there is the program list that there is same alike result mark with list to be identified in default list library, obtains The level of trust of program list;
S104: the level of trust of program list is set to the level of trust of list to be identified.
It is aforementioned it is stated that if there is the program name that there is same alike result mark with list to be identified in default list library It is single, then illustrate that the program list in list to be identified and default list library is same computer program, then, the program list Level of trust is the level of trust of list to be identified, at this point, the program list directly can be obtained in default list library Level of trust, and set the level of trust of program list to the level of trust of list to be identified, identification name is treated to realize Single validity decision, the i.e. identification of completion program list.Further, white or grey program name is judged as level of trust It is single, it directly operates normally on the client, black or unknown program program list is judged as level of trust, then Forbid running on the client, so that the normal operation of computer system be effectively ensured.
Program security recognition methods provided herein constructs journey of the list library to store known legitimate in advance Sequence list after obtaining its attribute-bit, can directly judge pre- as a result, when receiving the list to be identified of unknown legitimacy If whether there is program list identical with its attribute-bit in list library, if the attribute-bit of list to be identified and default name The attribute-bit of a certain program list is identical in single library, then list to be identified and the program list are same computer program, that The level of trust of the two also must be the same, and realizes the effective judgement for treating identification list legitimacy as a result, further protects The computer program for demonstrate,proving client operation is legitimacy program, ensure that the normal operation of computer.
On the basis of the various embodiments described above, referring to FIG. 3, Fig. 3 is another program security provided herein The flow diagram of recognition methods, the program security recognition methods can include:
S301: when receiving list to be identified, determine list to be identified attribute-bit;
S302: judge that inventory to be identified whether there is in program listing according to attribute-bit;If it exists, then it executes S303;If it does not exist, then S304 is executed;
S303: the level of trust of list to be identified is obtained in program listing;
Specifically, due to can be by presetting in the program name single pair system program inventory and client inventory in list library Program list has carried out the update of level of trust, therefore each program list in program listing is also to have completed level of trust to sentence Therefore the fixed and legal computer program run when receiving new list to be identified, can be inquired first in program listing With the presence or absence of the program list with the list to be identified with same alike result mark, and if it exists, then no longer need to and default list library In program list compared one by one, identification name is directly treated according to the level of trust of program list corresponding in program listing It is single to carry out level of trust setting, to guarantee recognition efficiency.
S304: judge in default list library with the presence or absence of the program list with list to be identified with same alike result mark; If it exists, then S305 is executed;If it does not exist, then S306 is executed;
S305: the level of trust of institute's program list is obtained, sets list to be identified for the level of trust of program list Level of trust;
S306: after the level of trust for determining list to be identified, the attribute-bit of list to be identified is calculated, and will be after identification List to be identified be inserted into default list library with corresponding level of trust and attribute-bit.
Specifically, if not inquiring the program name that there is same alike result mark with list to be identified in default list library It is single, then illustrate that the list to be identified is new list, do not stored in default list library in advance, at this point, can be by artificial right It carries out level of trust judgement, after completing level of trust setting, its attribute-bit can be calculated, finally by the completion level of trust The list to be identified not determined is stored together together with its level of trust and attribute-bit to default list library, so as to subsequent to again The identical program list received carries out identification decision.
The content that can refer to previous embodiment for the specific implementation process of above-mentioned steps S301 and S304, S305, This is not being repeated.
Program security recognition methods provided herein is realized based on default list library and attribute-bit and treats knowledge Effective judgement of alias list legitimacy is further ensured that the computer program of client operation is legitimacy program, ensure that The normal operation of computer.
On the basis of the various embodiments described above, this application provides a kind of more specifically program security recognition methods, This method can include:
(1) building of list library is preset:
Firstly, carrying out the acquisition of program list.Specifically, can be by default sampling instrument under specified directory or file Program list is acquired, and obtains its hash value, then, generates corresponding file after level of trust setting is carried out to it, And each file corresponds to a record, specific format are as follows: hash#osType#trustlevel, wherein osType=1 table Show Windows system, osType=2 indicates linux system;TurstLevel=1 indicates that level of trust is black, turstLevel =2 indicate that level of trust is white.
Further, the program list of acquisition is directed into default list library.Specifically, due to being acquired by sampling instrument File be encryption file, therefore before importing default list library, first it is decrypted, it is right after the completion of decryption All program name individual palpations are classified according to OSType, that is, are divided into two class of Windows and Linux;Later, can to two class method lists into The following processing of row: firstly, being filtered to two class method lists, to filter out already existing program in current preset list library List avoids repeating;Further, by program name individual palpation lighting system type remaining after filtering be inserted into respectively windows and In two libraries Linux;Finally, filtering out level of trust in default list library based on hash value is black program list, and utilize Program list in remaining program name single pair system program inventory and client inventory carries out the update of level of trust, to guarantee All program lists that active client is run are the legal computer program run.
(2) list identification to be identified:
In system operation, when receiving the list to be identified that client reports, it can determine whether it whether first Through being present in the program listing of system, and if it exists, then directly treat identification list progress level of trust by program listing and sentence It is fixed, it if it does not exist, is then compared with the program list in default list library, if it find that being stored in default list library Identical program list then directly carries out the modification of level of trust according to program name single pair list to be identified, thus real Existing program list identification.
In addition, can also further realize the inquiry of program listing, specifically can be preset do not shown for system default it is default Program list in list library is defaulted and is not shown built-in white list, only when receiving modification request, can carry out to it Display.
Program security recognition methods provided herein constructs journey of the list library to store known legitimate in advance Sequence list after obtaining its attribute-bit, can directly judge pre- as a result, when receiving the list to be identified of unknown legitimacy If whether there is program list identical with its attribute-bit in list library, if the attribute-bit of list to be identified and default name The attribute-bit of a certain program list is identical in single library, then list to be identified and the program list are same computer program, that The level of trust of the two also must be the same, and realizes the effective judgement for treating identification list legitimacy as a result, further protects The computer program for demonstrate,proving client operation is legitimacy program, ensure that the normal operation of computer.
To solve the above problems, referring to FIG. 4, Fig. 4 is a kind of program security identification device provided herein Structural schematic diagram, the device can include:
Attribute-bit determining module 10, for when receiving list to be identified, determining the attribute-bit of list to be identified;
Program list judgment module 20, for judging that there is same genus with the presence or absence of with list to be identified in default list library Property mark program list;
Level of trust obtains module 30, if identifying with list to be identified with same alike result for existing in default list library Program list, then obtain the level of trust of program list;
Level of trust setup module 40, for setting the level of trust of program list to the level of trust of list to be identified Not.
As a kind of preferred embodiment, which may also include default list library building module, use In carrying out file acquisition by sampling instrument, each program list is obtained;Determine the level of trust and attribute-bit of each program list; Judged to whether there is corresponding program list in default list library according to attribute-bit;If it exists, then the program name of acquisition is deleted It is single;If it does not exist, then the program list of acquisition is inserted into default list library with corresponding level of trust and attribute-bit.
As a kind of preferred embodiment, which may also include inventory update module, be used for basis The program list in program name single pair program listing and client inventory in default list library carries out level of trust update.
As a kind of preferred embodiment, which may also include program list and prejudges disconnected module, use According to attribute-bit judge inventory to be identified whether there is in program listing;If it exists, then in program listing obtain to Identify the level of trust of list;If it does not exist, then enter above procedure list judgment module 20.
As a kind of preferred embodiment, which may also include program list memory module, is used for If determining list to be identified there is no the program list with list to be identified with same alike result mark in default list library Level of trust after, calculate the attribute-bit of list to be identified, and by list to be identified and the corresponding level of trust after identification Default list library is inserted into attribute-bit.
Above method embodiment is please referred to for the introduction of device provided by the present application, this will not be repeated here by the application.
To solve the above problems, referring to FIG. 5, Fig. 5 is that a kind of program security provided herein identifies equipment Structural schematic diagram, the equipment can include:
Memory 1, for storing computer program;
Processor 2, realizes following steps when for executing computer program:
When receiving list to be identified, the attribute-bit of list to be identified is determined;Judge whether deposit in default list library In the program list with list to be identified with same alike result mark;If it exists, then the level of trust of program list is obtained;By journey The level of trust of sequence list is set as the level of trust of list to be identified.
Above method embodiment is please referred to for the introduction of equipment provided by the present application, this will not be repeated here by the application.
To solve the above problems, present invention also provides a kind of computer readable storage medium, the computer-readable storage It is stored with computer program on medium, can be realized when computer program is executed by processor following rapid:
When receiving list to be identified, the attribute-bit of list to be identified is determined;Judge whether deposit in default list library In the program list with list to be identified with same alike result mark;If it exists, then the level of trust of program list is obtained;By journey The level of trust of sequence list is set as the level of trust of list to be identified.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
Above method embodiment is please referred to for the introduction of computer readable storage medium provided by the present application, the application exists This is not repeated them here.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Above to program security recognition methods, device, equipment and computer-readable storage medium provided herein Matter is described in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, above The explanation of embodiment is merely used to help understand the present processes and its core concept.It should be pointed out that for the art Those of ordinary skill for, under the premise of not departing from the application principle, can also to the application carry out it is several improvement and repair Decorations, these improvement and modification also fall into the protection scope element of the claim of this application.

Claims (10)

1. a kind of program security recognition methods characterized by comprising
When receiving list to be identified, the attribute-bit of the list to be identified is determined;
Judge in default list library with the presence or absence of the program list with the list to be identified with same alike result mark;
If it exists, then the level of trust of described program list is obtained;
Set the level of trust of described program list to the level of trust of the list to be identified.
2. program security recognition methods as described in claim 1, which is characterized in that the attribute-bit is hash value.
3. program security recognition methods as described in claim 1, which is characterized in that the building process in the default list library Include:
File acquisition is carried out by sampling instrument, obtains each program list;
Determine the level of trust and attribute-bit of each described program list;
Judged in the default list library according to the attribute-bit with the presence or absence of corresponding program list;
If it exists, then the described program list of acquisition is deleted;
If it does not exist, then the described program list of acquisition is inserted into the default name with corresponding level of trust and attribute-bit Dan Ku.
4. program security recognition methods as claimed in claim 3, which is characterized in that the described program list by acquisition The default list library is inserted into corresponding level of trust and attribute-bit, comprising:
System type judgement is carried out to described program list;
If described program list is Windows file, described program list is inserted with corresponding level of trust and attribute-bit Enter to Windows list library;
If described program list is Linux file, described program list is inserted into corresponding level of trust and attribute-bit To Linux list library.
5. the program security recognition methods as described in Claims 1-4 any one, which is characterized in that further include:
Trusted according to the program list in the program name single pair program listing and client inventory in the default list library Grade renewal.
6. program security recognition methods as claimed in claim 5, which is characterized in that it is described judge in default list library whether Before the program list with the list to be identified with same alike result mark, further includes:
Judge that the inventory to be identified whether there is in described program inventory according to the attribute-bit;
If it exists, then the level of trust of the list to be identified is obtained in described program inventory;
If it does not exist, then executing in the default list library of the judgement has same alike result mark with the presence or absence of with the list to be identified The step of program list of knowledge.
7. program security recognition methods as described in claim 1, which is characterized in that further include:
If there is no the program lists with the list to be identified with same alike result mark in the default list library, true After the level of trust of the fixed list to be identified, calculate the attribute-bit of the list to be identified, and by described in after identification to Identify that list is inserted into the default list library with corresponding level of trust and attribute-bit.
8. a kind of program security identification device characterized by comprising
Attribute-bit determining module, for when receiving list to be identified, determining the attribute-bit of the list to be identified;
Program list judgment module, for judging that there is same alike result with the presence or absence of with the list to be identified in default list library The program list of mark;
Level of trust obtains module, if having same alike result mark with the list to be identified for existing in the default list library The program list of knowledge, then obtain the level of trust of described program list;
Level of trust setup module, for setting the level of trust of described program list to the level of trust of the list to be identified Not.
9. a kind of program security identifies equipment characterized by comprising
Memory, for storing computer program;
Processor realizes program security as claimed in any one of claims 1 to 7 when for executing the computer program The step of recognition methods.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize that program security as claimed in any one of claims 1 to 7 is known when being executed by processor The step of other method.
CN201910464979.0A 2019-05-30 2019-05-30 Program security recognition methods, device, equipment and computer readable storage medium Pending CN110162962A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910464979.0A CN110162962A (en) 2019-05-30 2019-05-30 Program security recognition methods, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910464979.0A CN110162962A (en) 2019-05-30 2019-05-30 Program security recognition methods, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110162962A true CN110162962A (en) 2019-08-23

Family

ID=67630629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910464979.0A Pending CN110162962A (en) 2019-05-30 2019-05-30 Program security recognition methods, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110162962A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069352A (en) * 2015-07-29 2015-11-18 浪潮电子信息产业股份有限公司 Method for constructing operating environment of trusted application program on server
US20170237754A1 (en) * 2016-02-17 2017-08-17 Sophos Limited Evaluating installers and installer payloads
CN107766731A (en) * 2017-09-22 2018-03-06 郑州云海信息技术有限公司 A kind of anti-virus attack realization method and system based on application program management and control
CN107944232A (en) * 2017-12-08 2018-04-20 郑州云海信息技术有限公司 A kind of design method and system of the Active Defending System Against based on white list technology
CN108549810A (en) * 2018-04-03 2018-09-18 郑州云海信息技术有限公司 A kind of program white list service method and system based on OS Type
CN108763933A (en) * 2018-05-23 2018-11-06 郑州云海信息技术有限公司 A kind of application management method and system based on auto-programming inventory
CN109413042A (en) * 2018-09-25 2019-03-01 郑州云海信息技术有限公司 Method and system based on centralized management platform management blacklist rule

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069352A (en) * 2015-07-29 2015-11-18 浪潮电子信息产业股份有限公司 Method for constructing operating environment of trusted application program on server
US20170237754A1 (en) * 2016-02-17 2017-08-17 Sophos Limited Evaluating installers and installer payloads
CN107766731A (en) * 2017-09-22 2018-03-06 郑州云海信息技术有限公司 A kind of anti-virus attack realization method and system based on application program management and control
CN107944232A (en) * 2017-12-08 2018-04-20 郑州云海信息技术有限公司 A kind of design method and system of the Active Defending System Against based on white list technology
CN108549810A (en) * 2018-04-03 2018-09-18 郑州云海信息技术有限公司 A kind of program white list service method and system based on OS Type
CN108763933A (en) * 2018-05-23 2018-11-06 郑州云海信息技术有限公司 A kind of application management method and system based on auto-programming inventory
CN109413042A (en) * 2018-09-25 2019-03-01 郑州云海信息技术有限公司 Method and system based on centralized management platform management blacklist rule

Similar Documents

Publication Publication Date Title
CN107483509A (en) A kind of auth method, server and readable storage medium storing program for executing
CN112231647A (en) Software authorization verification method
CN108255505A (en) A kind of firmware update, device, equipment and computer readable storage medium
CN105678192B (en) A kind of key application method and application apparatus based on smart card
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
CN109829294A (en) A kind of firmware validation method, system, server and electronic equipment
US10740491B2 (en) Method and device for verifying instructions of diagnostic equipment, and lower computer
CN106452786A (en) Encryption and decryption processing method, apparatus and device
CN113656780B (en) Cross-chain access control method and device
CN107194237B (en) Method and device for application program security authentication, computer equipment and storage medium
KR20160110276A (en) Method and apparatus for generating Dynamic Secure Module
CN104751049A (en) Application program installing method and mobile terminal
CN112507326B (en) Encryption method and device for password information based on SM3 hash algorithm and computer equipment
CN102833247A (en) Method for anti-sweeping ciphers in user login system and device thereof
CN112231702A (en) Application protection method, device, equipment and medium
KR20040078593A (en) System for binding secrets to a computer system having tolerance for hardware changes
CN112000933B (en) Application software activation method and device, electronic equipment and storage medium
CN111090616B (en) File management method, corresponding device, equipment and storage medium
CN112651039A (en) Electric power data differentiation desensitization method and device fusing service scenes
CN110971609A (en) Anti-cloning method of DRM client certificate, storage medium and electronic equipment
US10862831B2 (en) System, method, and computer program product providing end-to-end security of centrally accessible group membership information
CN110162962A (en) Program security recognition methods, device, equipment and computer readable storage medium
CN102426592A (en) Method for initializing database based on dynamic password
CN106130968A (en) A kind of identity identifying method and system
CN113792304B (en) Database access system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190823