CN1591329A - Intelligent identifying and protecting method for software and hardware - Google Patents

Intelligent identifying and protecting method for software and hardware Download PDF

Info

Publication number
CN1591329A
CN1591329A CN 03153856 CN03153856A CN1591329A CN 1591329 A CN1591329 A CN 1591329A CN 03153856 CN03153856 CN 03153856 CN 03153856 A CN03153856 A CN 03153856A CN 1591329 A CN1591329 A CN 1591329A
Authority
CN
China
Prior art keywords
hardware
software
layer
intelligent identification
identification layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 03153856
Other languages
Chinese (zh)
Other versions
CN100547546C (en
Inventor
高保卫
陈长征
王卫
王晚丁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CNB031538568A priority Critical patent/CN100547546C/en
Publication of CN1591329A publication Critical patent/CN1591329A/en
Application granted granted Critical
Publication of CN100547546C publication Critical patent/CN100547546C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A method includes the following steps: loading filter driving layer and intelligent identification layer; after the described intelligent identification layer is started, loading compatible hardware and software information; collecting current hardware information of system and comparing it with information in compatible list to give out correspondent prompt; the intelligent identification layer can bulletin the starting information and receive the registration of application program; returning registration result into application program by intelligent identification layer; the filter driving layer can receive the access request of application program to access hardware, and can retransmit the request to intelligent identification layer; after the request of application program is identified by intelligent identification layer, the identified result can be returned into filter driving layer; then the filter driving layer can make correspondent access control according to said returned result. A protective layer is added between hardware and software.

Description

A kind of software and hardware Intelligent Recognition and guard method
Technical field
The present invention relates to field of computer technology, particularly a kind of software and hardware is carried out Intelligent Recognition and guard method.
Background technology
Along with development of computer, the utilization of computing machine also more and more widely at present.The software and hardware kind that domestic consumer can select is also more and more.When the user will finish a kind of function, the hardware that can select was a lot, and the software that can select also has multiple, but these software and hardwares not necessarily all can co-ordination.Though some free softwares are convenient in some respects easy-to-use, dragons and fishes jumbled together in free software market, and many times hacker software is mixed the genuine with the fictitious, and causes the collapse of system sometimes, and more serious also can damage hardware.Some hardware may be realized the function that the user needs, but can less stable a lot of the time, will bring a lot of troubles to the user like this.How to select suitable software and hardware, how to make the system of oneself more stable, efficient, this may be the problem that has always perplexed the multi-user.
Concerning computer hardware manufacturer, Yu Zhuan a lot of copyrighted softwares are not only arbitrarily duplicated by the user easily at random, and can be by user's running on different hardware environment, and this has caused the piracy of software on the one hand, and on the other hand, it is unstable that custom system can be tending towards; Can can't stand the visit of some free softwares and hacker software and the performance decline that becomes when a lot of special hardware at random is a lot of, more serious also can damage.How to protect the software and hardware of oneself, this has been a very stubborn problem of pendulum in face of a lot of computer vendors.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of Intelligent Recognition and automatic protecting method of software and hardware, employing can have domestic consumer and selects to use some hardware and softwares, and the operation of filtering illegal hardware and software, thereby reach the purpose that system stability is provided; Can also make software and hardware not by random duplicating and usurping, thereby make the computer system of issue more stable, thereby improve user satisfaction.
The Intelligent Recognition of a kind of software and hardware of the present invention and automatic protecting method, be included in to load in the driver layer of computing machine and be used for the filter driving layer of controlling application program, in application layer, load the intelligent identification layer of the control of the collection that is used for system hardware information and corresponding access rights the visit of bottom hardware;
After described intelligent identification layer starts, load compatible hardware and software information; The hardware information that collection system is current, and compare and make corresponding prompting with information in the compatibility tabulation;
Then, intelligent identification layer bulletin log-on message, and the registration of reception application program;
Intelligent identification layer is returned registering result and is given application program;
Filter driving layer receives the request of application access access hardware, and forwards the request to intelligent identification layer;
After the request of intelligent identification layer application programs is discerned, recognition result is replied to filter driving layer;
The result that filter driving layer is returned according to intelligent identification layer carries out corresponding access control.
The Intelligent Recognition of aforesaid software and hardware and automatic protecting method, if there is incompatible hardware, intelligent identification layer can be pointed out and have incompatible hardware, the user can should join in the compatible tabulation by incompatible hardware by request.
The Intelligent Recognition of aforesaid software and hardware and automatic protecting method; in the described application program registration process; application program sends to intelligent identification layer with the manufacturer that comprises hardware that oneself moves, the detailed environmental information of chip type; intelligent identification layer is compared the compatible hardware tabulation of current system; if there is no compatible hardware then returns prompting application program forbidding correlation function.
The Intelligent Recognition of aforesaid software and hardware and automatic protecting method, the request of described intelligent identification layer application programs is discerned, and comprising:
Whether was determining program registered? if judge that then its institute's access hardware is a compatible hardware? if not the program of having registered, judge whether visit into compatible software.
The Intelligent Recognition of aforesaid software and hardware and automatic protecting method are if compatible hardware just allows visit, not log; If not, with regard to denied access.
Do the Intelligent Recognition of aforesaid software and hardware and automatic protecting method if not the program of having registered, judge whether it is the visit of compatible software? if the visit of compatible software just allows visit, and notes daily record; If not the visit of compatible software, with regard to denied access.
The Intelligent Recognition of aforesaid software and hardware and automatic protecting method, intelligent identification layer sends to filter driving layer with above-mentioned judged result, and the intelligent identification layer bulletin withdraws from information and withdraws from.
The present invention adopts increases intelligent identification layer and filter driving layer as protective seam between computer software and hardware; realize automatic identification by it to system hardware and software; software is only operated on the specific or compatible hardware; and refuse illegal software to access hardware; thereby protected computer software and hardware, improved the stability of computer system.
Description of drawings
Fig. 1 is the synoptic diagram of system of the present invention;
Fig. 2 is the process flow diagram of intelligent identification layer of the present invention and filter driving layer collaborative work;
Fig. 3 is the process flow diagram of intelligent identification layer work of the present invention.
Embodiment
As shown in Figure 1; system of the present invention is a protective seam between computer software and hardware; realize the automatic identification of software and hardware by it; software is only operated on the specific or compatible hardware; and refuse illegal software to access hardware; thereby reach the purpose of protection computer software and hardware, thereby improve the stability of computer system.Described protective seam is divided into two parts: intelligent identification layer and filter driving layer.
Intelligent identification layer
It loads in os starting with the form of system service.It mainly is responsible for the collection of system hardware information and the control of corresponding access rights.It mainly realizes the access control to some peripherals such as sound card, network interface card, modem at present, it the is more built-in compatibility information of hardware and softwares, concrete structure is: type of hardware (sound card, network interface card, modem), compatible hardware tabulation, compatible software matrix.(annotate: compatible hardware and compatible software matrix are provided with when machine dispatches from the factory by computer vendors, later stage can increase and delete) intelligent identification layer allows the visit of compatible hardware and software, but can note them and move the time in system to the daily record of access hardware.It has following several to the access rights control of software:
Allow visit:
The software that succeeds in registration does not write down running log at the visit compatible hardware.
Compatible software (not registration) visit compatible hardware, at this moment filter driving layer can be noted the daily record of visit automatically.
Do not allow visit:
The softward interview incompatibility hardware that succeeds in registration, in application software in intelligent identification layer registration, the information of the hardware environment that meeting transmission application software need be moved (such as: the brand of hardware, manufacturer, specific function etc.), if the hardware environment of current system do not meet (such as: certainly used hardware brand or the function of system is not suitable for), intelligent identification layer prompting hardware environment is improper, and exemplary application software forbidding correlation function.
Compatible software (not registration) is visited incompatible hardware.
Incompatible softward interview system hardware, filter driving layer will directly be forbidden the visit of software.
Filter driving layer
Its major control application program is to the visit of bottom hardware, any program in the system is all finished by visit corresponding driving program the visit of hardware device, filter driving layer has been taken over original direct visit to the bottom layer driving layer, all all at first are filtered layer intercepting and capturing by the I/O request that visit bottom layer driving layer visits equipment, by some specific actuating logics, just can reach the control purpose of application programs visit bottom hardware, concrete principle is as follows:
Windows operating system all writes down and manages by I/O request package (IRP) the all-access of hardware device, and each I/O visit all can impel an I/O request package to be sent to driver.In each I/O request package, write down the handle that obtains when process is opened this equipment, the Thread Id of carrying out request of access or the like information, by checking these information, can be used to judge the visitor.Can be sent to equipment if wish an I/O request, just once can be carried out the visit of equipment, only the IRP of this time visit need be delivered to bsp driver and get final product, bsp driver can continue to finish the required I/O accessing operation that gets.By checking the visitor, for an I/O request of maybe need not wishing to forbid, this IRP directly can be refused, the system of returning does not transmit this IRP to bsp driver.In the present invention, use filter driving layer to cooperate intelligent identification layer to reach the purpose of identification and protection system software and hardware exactly.
The flow process of intelligent identification layer and filter driving layer collaborative work such as Fig. 2:
In S201, when os starting, load the intelligent identification layer service.
In S202, after intelligent identification layer starts, load compatible hardware and software information, these information are that computer vendors is default when computing machine dispatches from the factory, in the later stage, the user can join in the compatible tabulation by request.
In S203, the hardware information that the intelligent identification layer collection system is current, and compare with information in the compatibility tabulation, if there is incompatible hardware, which incompatible hardware is intelligent identification layer just prompting exist, and at this moment the user can join this incompatible hardware in the compatible tabulation by request.
In S204, intelligent identification layer bulletin log-on message, and the registration of reception application program.In the registration process, application program can send to intelligent identification layer to the detailed environmental information of oneself moving (manufacturer, the chip type that comprise hardware), intelligent identification layer is compared the compatible hardware tabulation of current system, and if there is no compatible hardware then returns prompting application program forbidding correlation function.
In S205, intelligent identification layer is returned registering result and is given application program.
At S206, among the S207, if when application access hardware is arranged, filter driving layer can be received request of access in the very first time, and forwards the request to intelligent identification layer.
In S208, the request of intelligent identification layer application programs is discerned, and idiographic flow can be with reference to Fig. 3.
In S209, intelligent identification layer replies to filter driving layer to recognition result, if do not allow visit, filter driving layer is then replied the application access failure.
In S210, the result that filter driving layer is returned according to intelligent identification layer carries out corresponding access control, specifically can be with reference to Fig. 3.
In S211, when operating system withdrawed from, the intelligent identification layer bulletin withdrawed from information, and withdraws from.
Fig. 3 is the process flow diagram of intelligent identification layer work of the present invention.
After intelligent identification layer starts, load default hardware and software compatible information, collect the hardware information of current system;
After the bulletin log-on message, accept the application program registration, receive the request of application access hardware then;
Whether was determining program registered? if then judge whether compatible hardware of its institute's access hardware? if compatible hardware just allows visit, not log; If not, with regard to denied access.
If not the program of having registered, judge whether the visit of compatible software? if the visit of compatible software just allows visit, and notes daily record; If not the visit of compatible software, with regard to denied access.
Above-mentioned judged result is sent to filter driving layer, and the intelligent identification layer bulletin withdraws from information and withdraws from.
It should be noted last that: above embodiment is the unrestricted technical scheme of the present invention in order to explanation only, although the present invention is had been described in detail with reference to the foregoing description, those of ordinary skill in the art is to be understood that: still can make amendment or be equal to replacement the present invention, and not breaking away from any modification or partial replacement of the spirit and scope of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (7)

1, a kind of Intelligent Recognition of software and hardware and automatic protecting method, be included in to load in the driver layer of computing machine and be used for the filter driving layer of controlling application program, in application layer, load the intelligent identification layer of the control of the collection that is used for system hardware information and corresponding access rights the visit of bottom hardware; It is characterized in that:
After described intelligent identification layer starts, load compatible hardware and software information; The hardware information that collection system is current, and compare and make corresponding prompting with information in the compatibility tabulation;
Then, intelligent identification layer bulletin log-on message, and the registration of reception application program;
Intelligent identification layer is returned registering result and is given application program;
Filter driving layer receives the request of application access access hardware, and forwards the request to intelligent identification layer;
After the request of intelligent identification layer application programs is discerned, recognition result is replied to filter driving layer;
The result that filter driving layer is returned according to intelligent identification layer carries out corresponding access control.
2, the Intelligent Recognition of software and hardware according to claim 1 and automatic protecting method; it is characterized in that; if there is incompatible hardware, there is incompatible hardware in intelligent identification layer just prompting, and the user can should join in the compatible tabulation by incompatible hardware by request.
3, the Intelligent Recognition of software and hardware according to claim 1 and automatic protecting method; it is characterized in that; in the described application program registration process; application program sends to intelligent identification layer with the manufacturer that comprises hardware that oneself moves, the detailed environmental information of chip type; intelligent identification layer is compared the compatible hardware tabulation of current system; if there is no compatible hardware then returns prompting application program forbidding correlation function.
According to the Intelligent Recognition and the automatic protecting method of the arbitrary described software and hardware of claim 1-3, it is characterized in that 4, the request of described intelligent identification layer application programs is discerned, and comprising:
Whether was determining program registered? if judge that then its institute's access hardware is a compatible hardware? if not the program of having registered, judge whether visit into compatible software.
5, the Intelligent Recognition of software and hardware according to claim 4 and automatic protecting method is characterized in that, if compatible hardware just allows visit, not log; If not, with regard to denied access.
6, the Intelligent Recognition of software and hardware according to claim 4 and automatic protecting method, it is characterized in that, if not the program of having registered, judge whether it is the visit of compatible software? if the visit of compatible software, just allow visit, and note daily record; If not the visit of compatible software, with regard to denied access.
According to the Intelligent Recognition and the automatic protecting method of claim 1,4,5 or 6 described software and hardwares, it is characterized in that 7, intelligent identification layer sends to filter driving layer with above-mentioned judged result, the intelligent identification layer bulletin withdraws from information and withdraws from.
CNB031538568A 2003-08-25 2003-08-25 A kind of software and hardware Intelligent Recognition and guard method Expired - Fee Related CN100547546C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031538568A CN100547546C (en) 2003-08-25 2003-08-25 A kind of software and hardware Intelligent Recognition and guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031538568A CN100547546C (en) 2003-08-25 2003-08-25 A kind of software and hardware Intelligent Recognition and guard method

Publications (2)

Publication Number Publication Date
CN1591329A true CN1591329A (en) 2005-03-09
CN100547546C CN100547546C (en) 2009-10-07

Family

ID=34597891

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031538568A Expired - Fee Related CN100547546C (en) 2003-08-25 2003-08-25 A kind of software and hardware Intelligent Recognition and guard method

Country Status (1)

Country Link
CN (1) CN100547546C (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100458808C (en) * 2006-04-26 2009-02-04 南京大学 Read-write access control method for plug-in memory device
WO2013013562A1 (en) * 2011-07-28 2013-01-31 腾讯科技(深圳)有限公司 Driver protection method and system
CN103281185A (en) * 2013-05-08 2013-09-04 深圳创维数字技术股份有限公司 Method and system for controlling resource access of terminal
CN103309687A (en) * 2012-03-09 2013-09-18 联想(北京)有限公司 Electronic equipment and application program starting method thereof
CN103902444A (en) * 2012-12-27 2014-07-02 腾讯科技(深圳)有限公司 3D engine compatibility test method and device
CN103971058A (en) * 2014-05-14 2014-08-06 深圳科士达科技股份有限公司 Method and system for protection of multi-chip interconnection and interlocking
CN104008044A (en) * 2013-02-25 2014-08-27 力博特公司 Software compatibility determining method and apparatus based on modular UPS (Uninterruptible Power Supply)
CN104516622A (en) * 2013-09-27 2015-04-15 联想(北京)有限公司 Information processing method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262716B (en) * 2010-05-25 2014-03-05 腾讯科技(深圳)有限公司 Real-time protection method and device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100458808C (en) * 2006-04-26 2009-02-04 南京大学 Read-write access control method for plug-in memory device
WO2013013562A1 (en) * 2011-07-28 2013-01-31 腾讯科技(深圳)有限公司 Driver protection method and system
US9317707B2 (en) 2011-07-28 2016-04-19 Tencent Technology (Shenzhen) Company Limited Method and system for protecting a driver
CN103309687A (en) * 2012-03-09 2013-09-18 联想(北京)有限公司 Electronic equipment and application program starting method thereof
CN103902444A (en) * 2012-12-27 2014-07-02 腾讯科技(深圳)有限公司 3D engine compatibility test method and device
CN103902444B (en) * 2012-12-27 2016-03-02 腾讯科技(深圳)有限公司 3D engine compatibility test method and device
CN104008044A (en) * 2013-02-25 2014-08-27 力博特公司 Software compatibility determining method and apparatus based on modular UPS (Uninterruptible Power Supply)
CN104008044B (en) * 2013-02-25 2017-07-11 力博特公司 A kind of software compatibility method of discrimination and device based on Modular UPS
CN103281185A (en) * 2013-05-08 2013-09-04 深圳创维数字技术股份有限公司 Method and system for controlling resource access of terminal
CN104516622A (en) * 2013-09-27 2015-04-15 联想(北京)有限公司 Information processing method and device
CN103971058A (en) * 2014-05-14 2014-08-06 深圳科士达科技股份有限公司 Method and system for protection of multi-chip interconnection and interlocking
CN103971058B (en) * 2014-05-14 2017-03-15 深圳科士达科技股份有限公司 A kind of guard method of multi-chip interconnection interlocking and system

Also Published As

Publication number Publication date
CN100547546C (en) 2009-10-07

Similar Documents

Publication Publication Date Title
CN1285987C (en) Systems and methods for efficient computer virus detection
JP4302723B2 (en) File system primitive that gives the file system native support for remote storage
CN100583116C (en) Information processing apparatus and method for controlling resource access by application program
CN100481101C (en) Method for computer safety start
WO2001025922A1 (en) Method and system for providing data security using file spoofing
CN1943160A (en) System for invoking a privileged function in a device
CN1766883A (en) Switch the method and the computer system of the file that will visit based on confidential mode
CN101351772A (en) Method and system for sharing files among different virtual machine images
CN1445667A (en) Method for recovering and backing up information in hard disc of computer
WO2002095588B1 (en) Decentralized virus scanning for stored data
CN100419620C (en) Method for command interaction and two-way data transmission on USB mass storage equipment by program and USB mass storage equipment
CN1531303A (en) Caching system and method at user terminal without protocol concerned
CN1591329A (en) Intelligent identifying and protecting method for software and hardware
CN104360846A (en) OSGi-based adaptive design method for authority management of Web application development platform based on OSGi
CN1842073A (en) Method for realizing external device mapping of network computer
CN1635439A (en) A user right management method
CN1677302A (en) Method and system for acquiring resource usage log and computer product
CN112966094A (en) Transaction data processing method, device and system
CN102693232B (en) Method and device for cancelling files
CN1877549A (en) Method for automatic protection of U disc by using filtering driver and intelligent key device
CN1556609A (en) Mobile robot network control platform device
CN1157660C (en) Multiple-user safety operation document system and method
CN1889189A (en) Partition-supporting flash storing memory device
CN114726664B (en) Binding method and binding equipment for household equipment
US6986058B1 (en) Method and system for providing data security using file spoofing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091007

Termination date: 20200825