Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer safety monitoring system and method, and comprehensive deciding device

A computer security and monitoring system technology, applied in computer security devices, calculations, instruments, etc.

Active Publication Date: 2012-12-19
LENOVO (BEIJING) LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007]Multiple security software real-time monitoring programs conduct monitoring and decision-making separately, and may obtain different decision-making results for certain types of unsafe factors, corresponding to different decision-making As a result, it will be processed differently by multiple security software real-time monitoring programs, resulting in real-time monitoring decision-making and processing conflicts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer safety monitoring system and method, and comprehensive deciding device
  • Computer safety monitoring system and method, and comprehensive deciding device
  • Computer safety monitoring system and method, and comprehensive deciding device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0089] In the first embodiment of the present invention, the different decision-making modules in the computer security monitoring system obtain the data required for decision-making through their corresponding behavior collection modules.

[0090] Such as figure 1 As shown, the computer security monitoring system of the first embodiment of the present invention includes:

[0091] At least two independent decision-making subsystems corresponding to different malicious behavior knowledge bases, the malicious behavior knowledge base is used to store the second characteristic information of known malicious behaviors;

[0092] The first monitoring modules respectively corresponding to the different malicious behavior knowledge bases are used to obtain the first characteristic information of the first operation behavior whose operation object is the monitoring object, and send it to the corresponding independent decision-making subsystem, the first The structure of the feature in...

no. 2 example

[0165] In the first embodiment of the present invention, different decision-making modules in the computer security monitoring system obtain the data required for decision-making through their corresponding behavior collection modules, and at the same time, each different decision-making module obtains data through their respective monitoring units The operation object is the first characteristic information of the first operation behavior of the monitoring object, and makes decisions independently.

[0166] In the first embodiment of the present invention, different decision-making modules in the computer security monitoring system use a unified monitoring module, and the monitored characteristic information is converted into characteristic information matching the malicious behavior knowledge base of each decision-making module through the conversion module , which are described in detail below.

[0167] Such as Figure 4 As shown, the computer security monitoring system of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer safety monitoring system, a comprehensive deciding device and a method thereof. The system is used for monitoring the safety of an object to be monitored by utilizing at least two different malicious behavior knowledge bases, and comprises a monitoring module, at least two individual deciding sub-systems and a comprehensive deciding module. The monitoring module is used for obtaining characteristic information of a first operation behavior of an operated object as the object to be monitored; the at least two individual deciding sub-systems respectively correspond to at least two different malicious behavior knowledge bases, each of the at least two individual deciding sub-systems is respectively used for individually deciding to obtain at least two individual deciding results, according to the characteristic information and the malicious behavior knowledge bases corresponding to the at least two different malicious behavior knowledge bases; and the comprehensive deciding module is used for utilizing the at least two individual deciding results to obtain the first deciding result of the first operative behavior according to a preset comprehensive deciding principle. The invention eliminates the decisional conflict caused by different deciding results of each individual deciding module.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a computer security monitoring system and method and a comprehensive decision-making device. [0002] Background technique [0003] With the continuous advancement of computer technology, there are more and more unsafe factors such as computer viruses and Trojan horses. [0004] As far as the current technical level is concerned, there is not yet any product that can deal with all computer viruses and Trojan horses and other insecure factors, and various security software (such as antivirus software, online monitoring software, software to prevent IE home page modification, prevent Registry modifying software, etc.) all have their own different malicious behavior knowledge bases. Although these malicious behavior knowledge bases have a large intersection, it is inevitable that these malicious behavior knowledge bases also have great differences. [0005] According to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/50
Inventor 张睿
Owner LENOVO (BEIJING) LTD