Font Size: a A A

Research And Implemetaion On The Protection System Of Software Running

Posted on:2017-09-01Degree:MasterType:Thesis
Country:ChinaCandidate:J H LiFull Text:PDF
GTID:2348330503492930Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the information society, the computer plays an even more important role in the enterprise office. But computers are also faced with threats from various aspects, such as network penetration, file disclosure. In order to solve the problem of computer security, the enterprise put forward a variety of security monitoring programs, such as the creation of network security detection and monitoring software, file transparent encryption and decryption system. This type of security monitoring software has a common characteristic: the need to run time to ensure the safety of computer. At present, most of the enterprises in China use Windows system as the office platform. It is very important to guarantee the kind of security monitoring software continuing running safety.Registry, program files and processes are the main factors affecting the running of the program. Based on the windows filter driver, the callback function, from three aspects of the process of protection, file protection, registry protection to proceed, in order to protect windows application software normally, reliably and safely transported behavior design goal, we design and implement a relatively perfect system for protecting program running.Software protection system separates the software running and software protection, which is universal for the protection of software. The system is composed of the kernel driver module, application layer module and communication module. The driver module includes file protection, process protection and registry protection. Its' main function is monitor the operation of file, process and registry using callback function in filter driver. The communication module is a channel for sending messages between the driver module and the application layer module. Terminal management and the configuration file consists of the application layer module. The configuration file stores the information of the file path?the process name and the registry item path which need to protect. The terminal management is responsible for the installation, updating and unloading of the software protection system.Finally, we deployed the system in the virtual machine and performed a series of tests. The results show the system can well protect the running of software.
Keywords/Search Tags:Process Protection, File Protection, Registry Protection, Filter Driver
PDF Full Text Request
Related items