Security protection method and system of computer
A security protection and computer technology, applied in computer security devices, electronic digital data processing, platform integrity maintenance, etc., can solve problems such as inability to completely prohibit computer system damage, inability to identify programs or modules, and achieve complete shielding of viruses and Trojan horses , the effect of avoiding attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] Below, according to the accompanying drawings, preferred embodiments of the present invention are given and described in detail, so that the functions and features of the present invention can be better understood.
[0034] The computer security protection system of the present invention includes a central server and a computer security protection client.
[0035] The central server generates signatures corresponding to safe executable modules, collects these signatures, and adds them to the central module signature library as a part of the executable module identification.
[0036] The format of the executable module file includes com, MZ, NE, LE, PE, most of the executable modules are in the PE format. The corresponding feature code construction method is as follows:
[0037] 1. Calculate the checksum:
[0038] For executable modules in com and MZ formats, the checksum is generally calculated for the entire file;
[0039] For executable modules in NE and LE formats...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 