An automatic verification method and apparatus for remote Windows operating system security rules

An operating system and automatic verification technology, applied in the field of information security, can solve the problems of issuing and taking effect of security rules, inability to judge security protection software, and no automatic verification of security rules, etc., to ensure the effect of system information security

Active Publication Date: 2019-01-29
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patented technology described by Remote Window Operating System Security (RCOS) includes providing automated testing capabilities on windows running within an organization's network without physically connecting each window separately or manually entering data into them during commissioning. This helps improve efficiency while maintaining secure communication between different systems inside organizations.

Problems solved by technology

The technical problem addressed in this patented text relates to ensuring that Remote Access Client (RAC) device's secure communication over networks by automatically validating their own safety standards when they are being operated from different locations worldwide without compromiseing any other applications running locally within these environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An automatic verification method and apparatus for remote Windows operating system security rules
  • An automatic verification method and apparatus for remote Windows operating system security rules
  • An automatic verification method and apparatus for remote Windows operating system security rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0045] In order to facilitate the understanding of the technical solution provided by the present application, a brief description of the research background of the technical solution of the present application is given below.

[0046]As we all know, as described in the background technology, with the wide application of the Windows operating system and the rapid popularization of the network, the problem of information security in the Windows operating system has become increasingly pr

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an automatic verification method and apparatus for remote Windows operating system security rules. The method comprises: first, by remotely logging on to the Windowsoperating system, acquiring the type of operating system, system path, Windows path and defense level. Then, depending on the operating system type and defense level, get security rules, Next, according to the system path, Windows path and security rules, to obtain the path of security rules, and then, under the path, to build a test file, and to obtain its permission value, and finally, using thepermission value and the actual protection results of the path of security rules for comparison, to verify whether the permission value conforms to the security rules, to obtain the verification results. As will be seen, after that remote Windows operate system security rules and their paths have been determined, By comparing the privilege value of the test file constructed under the security rule path with the actual protection result of the security rule path, the automatic verification of the remote Windows operating system security rules is realized, and the system information security isensured.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products