Font Size: a A A

Design And Relization Of Software Real Name Mechanism In Windows System

Posted on:2009-05-31Degree:MasterType:Thesis
Country:ChinaCandidate:J C HaoFull Text:PDF
GTID:2178360278480761Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
Currently, malicious-code such as virus, Trojan Horse, Spyware and Adware is updating continually, which brings huge inconvenience and security problem to a great many corporations and individual users, and its harm is obvious to all. At the same time malicious-code is relative close to software abusing, software abusing produce more chances to malicious-code, which accelerates the spread of malicious-code.There are many different measures to keep away the harm of malicious-code at present, such as code signing, sandbox, and anti-virus software. Though these technologies have some effect, it's not enough yet. This paper brings forward a mechanism of software real name based on PKI technology aiming at their deficiency.More and more the concept of real name comes forth in our life, for example, mobile telephone real name, network real name, hospitalize real name and so on, real name combines certain thing with person's information. Real name resembles these concepts, software real name binds softwares with their organizers through digital signature of public key cipher, and then obtains the function of avoiding juggle and denial. Before running or installing , the authentication is activated, it depends on the result of authentication whether or not software can be implemented. This paper designs a system's security mechanism based on software real name, this mechanism actualizes in PE file of Windows system, and censors all softwares needs running in system through software register center, only the softwares which can run in the OS hold legit software identification and pass checkup. This paper expounds the security strategy of the software real name mechanism, and presents the implementation scheme about software identification module and software authentication module in Windows system, and brings forward the authentication strategy of softwares are graded to heighten the efficiency of authentication. The result of experiment indicates software real name mechanism can check whether the software is what it claims to be and its integrity, this mechanism also can prevent malicious-code running, and ensure the security of computer system in effect.
Keywords/Search Tags:Software Real Name, PE File, Software Identification Module, Software Authentication Module, Digital Signature
PDF Full Text Request
Related items