Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for preventing malevolence program from accessing network

A technology for accessing the network, malicious programs, applied in the field of preventing malicious programs from creating access to the network through trusted network application objects

Active Publication Date: 2013-06-12
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the surface, the initiator of such an access action is a trusted network access program, so the existing security software usually allows the network access action, even if a prompt is given, the user sees that the initiator is trusted program, it does not block it, and as a result, the malware successfully breaks through the protection of security software to achieve its own illegal purpose

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing malevolence program from accessing network
  • Method and apparatus for preventing malevolence program from accessing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.

[0010] First refer to figure 1 , illustrating a flowchart of a method for preventing malicious programs from accessing a network according to the present invention, wherein:

[0011] In step S10, the monitoring dynamic library is injected into the processes in the system, so as to monitor the actions of each process in real time. It should be noted that it can be injected into all processes in the system, and can also be selected to be injected into some processes in the system according to specific requirements, which are all within the protection scope of the present invention.

[0012] In step S20, when a certain process is found to create an object of an application program capable of accessing the network, the object creation action is intercepted. What needs special attention here is that the method of the present invention does not intercept the action ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method used for stopping vicious programs from accessing the network, comprising a monitoring step in which a monitoring dynamic database is injected into one or more processes of the system so as to carry out monitoring, an intercepting step in which the action to establish the objects of the network application program is incepted, a judging step in which whether the process is allowed to access the network or not is judged according to the defined rule, and a processing step in which the corresponding disposal is carried out according to the judgment results.

Description

technical field [0001] The present invention relates to a method and a device for preventing a malicious program from accessing a network, more particularly, to a method and a device for preventing a malicious program from creating a trusted network application program object to access a network. Background technique [0002] With the rapid development of computer technology and the rapid popularization of networks, malicious programs such as Trojan horse viruses also emerge in an endless stream, seriously endangering the information security of computer users. [0003] Usually, after a user's computer is infected with a malicious program, the malicious program will access the network through itself without the user's knowledge, thereby performing operations such as transmitting stolen user information. In this regard, existing security software such as firewalls will intercept such network access actions, determine the initiator of the action, and take corresponding release...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26G06F17/30
Inventor 罗学军
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products