Computer information safe method

An information security and computer technology, applied in the field of information security, can solve problems such as user security risks and system efficiency overhead, and achieve the effects of good security, recognition efficiency and high accuracy

Inactive Publication Date: 2008-07-30
李贵林
View PDF0 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to avoid false negatives as much as possible, it must perform "intensive analysis" (repeated frequent "analysis"), which obviously inevitably brings about the overhead of system efficiency
[0010] Finally there is the issue of user secur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information safe method
  • Computer information safe method
  • Computer information safe method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] The main process of the embodiment of the present invention is as figure 1 As shown, it includes at least the following steps: step 101, log the system; step 102, detect whether there are any sensitive files that try to modify the system security; if not, continue to step 102; if so, perform step 103, start automatic backup of the original File; then perform step 104 to allow modification of sensitive files of the system security; perform step 105, analyze and identify malicious programs through the operation log record established in step 101; if yes, perform step 106 to delete illegal programs; then complete step 107, according to the The running trajectory of the illegal program restores the contents of the files and registry modified by the malicious program, so that the system is restored to the state before the malicious program (and related malicious programs) runs, thereby maintaining the normal operation of the system; 108 returns to step 102 again to re-check whet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method of the computer information security, and comprises the following steps that: firstly, journal log is carried out to a system; secondly, whether a program behavior relates to a protected file is judged, if yes, the running is prohibited or limited according to protection rules, if no, whether a sensitive file which tries to modify the system security exists is judged; thirdly, if the sensitive file which tries to modify the system security does not exist, the step two is continuously run; fourthly, if the sensitive file which tries to modify the system security exists, an automatic backup of the original document is started, and the fifth step is carried out, if the sensitive file which tries to modify the system security does not exist, the step two is repeated; fifthly, the sensitive file of the system security is allowed to be modified; sixthly, a vicious procedure is analyzed and recognized through a running journal log created in the first step; seventhly, if the vicious procedure is an illegal program, the illegal program is deleted, and the eighth step is carried out, if the vicious procedure is not the illegal program, the step two is repeated; eighthly, a restoration is carried out through the running track of the illegal program.

Description

technical field [0001] The invention relates to an information security technology, in particular to a computer information security method. Background technique [0002] There are many types of computer security products available, but they can be roughly divided into three categories in terms of design schemes: antivirus software, firewalls, and security vulnerability assessment and security services. The anti-virus software mainly prevents and removes viruses, Trojan horses, worm files and infected system settings on the hard disk of the client machine, and restores the original non-toxic state; the firewall mainly filters and blocks files that do not meet the preset settings on the network by setting network data packet filtering rules. A user-configurable filter switch is implemented on the network for packets of specified rules. Security vulnerability assessment and security services are to conduct security assessment on a security object (network or stand-alone machi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F11/14G06F21/71
Inventor 李贵林
Owner 李贵林
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products