Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information safety processing method and system, communication equipment

A security processing and information security technology, applied in the field of information security processing methods, information security processing systems, and communication equipment, can solve the problems of non-automatic startup, high cost, inconvenience, etc., to reduce management costs, prevent Trojan horse attacks, and ensure security. sexual effect

Active Publication Date: 2008-11-05
BEIJING ZHIGU TECH SERVICE
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since each intranet host needs to install anti-virus software, and the network administrator needs to manage the anti-virus software installed on each intranet host, it is extremely inconvenient, and requires a lot of manpower and material resources, and the cost is high
In addition, when using the anti-virus software on the intranet host for Trojan protection, due to the user's usage habits, the anti-virus software on the intranet host may be turned off or the anti-virus software is set not to start automatically, so that the Trojan horse cannot be protected in real time. Effectively guarantee the security of intranet hosts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety processing method and system, communication equipment
  • Information safety processing method and system, communication equipment
  • Information safety processing method and system, communication equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]The present invention installs a server security processing module on the router, also known as: supplicant server (supplicant server, hereinafter referred to as: SUS), and installs a client security processing module on each intranet host, also known as: supplicant client Supplicant client (hereinafter referred to as: SUC), through the combination of SUC and SUS, performs Trojan horse protection on intranet hosts.

[0034] An information security processing method provided by an embodiment of the present invention includes:

[0035] The SUS judges whether the SUC used for security management of the intranet host is online; if the SUC is offline, the SUS prohibits the intranet host from communicating with the external network; The list library (backdoor library, hereinafter referred to as: BL), prohibits the insecure software that does not exist in the latest BL from establishing a communication connection with the external network, and the BL includes a list of files th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information safe processing method and an information date processing system, a communication device, wherein the information safe processing method includes: judging the whether the client-side safe processing module for performing the safe management to the inner net host computer is in the oneline state by the service end safe processing module, if in the offline state, the service end safe processing module prohibits the inner net host computer communicating with the outer net, if in the online state, the lient-side safe processing module prohibits the unsafe software not in the newest cockhorse white list bank building the communication connection with the outer net, according to the obtained newest cockhorse white list bank by the client-side safe processing module, wherein the cockhorse white list bank includes the file lists not infected by the cockhorse. The embodiment of the invention needs no net device access cost, does not reduce the message transmitting performance and the net performance with low management cost, which performs the real time safe protection to the cockhorse, effectively ensures the safety of the inner net host computer.

Description

technical field [0001] The invention relates to network security technology, in particular to an information security processing method, an information security processing system, and a communication device. Background technique [0002] Trojan horse, also known as Trojan horse, has a powerful ability to control and destroy computer systems. For example, attackers can use Trojans to steal passwords in computer systems, control computer system operations, and operate files in computer systems. [0003] Generally, a Trojan horse includes two execution programs of a client and a server. Among them, the client execution program is used for the attacker to remotely control the machine that implants the Trojan horse into the computer system. The server-side executable program is a Trojan horse program. When an attacker attacks a computer system through a Trojan horse, he first needs to use a certain method to implant the server-side execution program of the Trojan horse into th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26G06F17/30
Inventor 沈翀
Owner BEIJING ZHIGU TECH SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products