Information safety protecting method, information safety protecting device and server device

A technology of information security and protective devices, applied in the field of information security, can solve problems such as antivirus software upgrades, and achieve the effect of protecting information security

Inactive Publication Date: 2009-12-02
QIZHI SOFTWARE (BEIJING) CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For new viruses, because it is not in the blacklist, or because the user cannot upgrade the anti-virus software (or anti-rogue softw

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety protecting method, information safety protecting device and server device
  • Information safety protecting method, information safety protecting device and server device
  • Information safety protecting method, information safety protecting device and server device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] The present invention uses a software list different from the "black list" of the prior art to assign a higher first authority to software in the software list, and assign a lower second authority to software not in the software list. So that the software not in the software list will not cause harm to the system. Since it is impossible for newly-emerged virus software or rogue software to be in the saved software list, it is impossible for the newly-appeared virus software or rogue software to be assigned higher authority, so it will not cause harm to the system and effectively protects the system. System information security.

[0026] Exemplary embodiments of the present invention will be described below with reference to the accompanying drawings.

[0027] figure 1 It is a flowchart showing the general processing of the information security protection method of the present invention.

[0028] The information security protection method of the present invention is i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information safety protecting method, an information safety protecting device and a server device. The information safety protecting method comprises the steps: judging whether project software is in a preserved list or not; if so, distributing a first authority to the project software; and otherwise, distributing a second authority which is lower than the first authority to the project software. The invention can effectively prevent damaging a system by new malicious software.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an information security protection method, device and server device. Background technique [0002] With the rapid development of information technology, information security issues have attracted more and more attention. A common means of information security protection is to install various firewalls, anti-virus and anti-rogue software software on computer terminals. All of them are blacklist-filtered for the signature library of known viruses, so that the virus software (or rogue software) in the blacklist cannot be installed or run. However, various viruses continue to emerge every day. According to statistics, there are nearly 300,000 types of new malware detected and killed by a security company in 2007. In this way, there are nearly 100 types of malware waiting to be discovered by the security company and generate solutions anytime and anywhere. . For newly-oc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/56
Inventor 李子拓邹贵强潘剑锋
Owner QIZHI SOFTWARE (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products