Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting the computer data

一种计算机、计算机系统的技术,应用在计算机安全装置、计算、电数字数据处理等方向,能够解决没兴趣、效能无法实质的提升、影响计算机正常运作等问题

Inactive Publication Date: 2009-05-20
方可成
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is conceivable that when the database becomes larger and larger in the future, it will take longer and longer to scan and detect each time, which will seriously affect the normal operation of the computer.
Under this vicious cycle, even if the computer hardware and software functions become more and more powerful, its performance will not be substantially improved due to computer viruses, and even users will be discouraged from overly complex systems.
[0008] In addition, users also need to update the virus pattern database at any time, otherwise they still cannot protect the security of their computers through these antivirus programs
Although some computer users have a strong interest in computer security and are willing to pay attention to relevant information and update the latest virus pattern database at any time, there are more computer users who are not interested in this at all, and have no time to spend on these things. Update actions for antivirus programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting the computer data
  • Method for protecting the computer data
  • Method for protecting the computer data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Please refer to figure 1 , this figure shows a basic network structure diagram. After a user 10 is connected to the network 104 , the data stored on the computer by the user 10 may be destroyed or stolen due to the intrusion of the hacker 12 through the network 104 . For example, if the hacker 12 can decode the password set by the user 10 , he can browse the data stored in the computer by the user 10 through the network 104 . In addition, the hacker 12 may also make a virus and spread it through the network 104 , and the user 10 will load back the file with the virus when using the network 104 . When these virus-bearing files are loaded back to the computer of the user 10, under specific conditions, such as when the infected file is executed or the macro program is executed, it will further sneak into the program module of the operating system, wait for an opportunity to occur, and execute damage. action. Therefore, the present invention provides a system and method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.

Description

technical field [0001] The invention relates to a protection method, in particular to a computer data protection method. Background technique [0002] With the popularity of computers and the advancement of network technology, computers are closely related to people's lives today. For example, people can use computers to record various digital data, and even people can use computers to pay to machines to copy the same digital data on digital recording media. [0003] Almost all computers, servers, and even personal communication devices such as cell phones today are connected to the Internet. In addition to the Internet, there are corporate networks (Intranet), communication networks (telecommunication network) and so on. In short, the network is already an important tool that cannot be avoided in life. However, at the same time, the network often provides opportunities for some illegal intruders to destroy or steal confidential data. For these illegal intruders, people ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/30
CPCG06F2221/2127G06F11/3466G06F21/554G06F21/56
Inventor 方可成
Owner 方可成
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products