Unlock instant, AI-driven research and patent intelligence for your innovation.

Security protection method and system of computer

A security protection and computer technology, applied in computer security devices, electronic digital data processing, platform integrity maintenance, etc., can solve problems such as inability to completely prohibit computer system damage, inability to identify programs or modules, and achieve complete shielding of viruses and Trojan horses , the effect of avoiding attacks

Active Publication Date: 2012-01-25
上海新网程信息技术股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even so, it cannot completely prohibit the destruction of the computer system by unknown viruses and Trojan horses.
Due to the diversity, complexity and ever-changing characteristics of computer programs, it is determined that active defense technology can only identify some programs and cannot identify all programs or modules, so it still depends on virus databases and software behaviors for identification, so that Provides an opportunity for unknown virus activities to invade

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and system of computer
  • Security protection method and system of computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Below, according to the accompanying drawings, preferred embodiments of the present invention are given and described in detail, so that the functions and features of the present invention can be better understood.

[0034] The computer security protection system of the present invention includes a central server and a computer security protection client.

[0035] The central server generates signatures corresponding to safe executable modules, collects these signatures, and adds them to the central module signature library as a part of the executable module identification.

[0036] The format of the executable module file includes com, MZ, NE, LE, PE, most of the executable modules are in the PE format. The corresponding feature code construction method is as follows:

[0037] 1. Calculate the checksum:

[0038] For executable modules in com and MZ formats, the checksum is generally calculated for the entire file;

[0039] For executable modules in NE and LE formats...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection method and system of the computer. The method comprises the following steps: generating the character codes and classifying identification codes corresponding to safe executable modules, dividing a client into a social region, a system region and a work region, during the running of a process or thread on the client, calculating the character code of the process or thread, and labeling the process or thread to be a work attribute or social attribute according to whether the character code of the process or thread is known and whether a website except the safe websites and the category thereof are accessed, so as to obtain different rights of the resources of the client. By using the method of the invention, the client can run unknown executable modules without depending on the virus database and the behavior recognition of software and the operating system and the data of the application program can not be damaged.

Description

technical field [0001] The invention relates to a computer security protection method and system. Background technique [0002] In response to the endless emergence of viruses and Trojan horses, the virus database is getting bigger and bigger no matter whether passive defense or active defense technology is adopted. Even in this way, the destruction of the computer system by unknown viruses and Trojans cannot be completely prohibited. Due to the diversity, complexity and ever-changing characteristics of computer programs, it is determined that active defense technology can only identify some programs and cannot identify all programs or modules, so it still depends on virus databases and software behaviors for identification, so that The activities of unknown viruses provide opportunities for invasion. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a computer security protection method and system, so that unkno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/53
CPCG06F21/53
Inventor 胡志水
Owner 上海新网程信息技术股份有限公司