Method, device and equipment for changing original installation information and detecting installation information

An original technology of installing information, applied in the computer field, can solve problems such as user loss and system attack, and achieve the effects of improving detection rate, simple implementation, and wide application

Active Publication Date: 2014-05-07
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the installation information downloaded by the user is added with a virus, when the computer or mobile phone used by the user runs the installation information, the system will be attacked, which will bring incalculable losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for changing original installation information and detecting installation information
  • Method, device and equipment for changing original installation information and detecting installation information
  • Method, device and equipment for changing original installation information and detecting installation information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0028] figure 1 A flowchart showing a method for detecting tampered installation information according to one aspect of the present invention. Among them, the method of adding verification information in the original installation information of the present invention is mainly realized by modifying the device; the method of detecting tampered installation information of the present invention is mainly realized by the detection device. This detection device includes but not limited to: 1) devices such as application modules, operating systems, processing controllers, etc. that have been installed in the first computer equipment and can implement the solutions of the present invention before performing the steps of the present invention; The installation information carried in and installed to the device in the first computer device. In the present invention, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, a device and equipment for detecting falsified installation information. The method comprises the following steps of: firstly, acquiring first validation information, and performing predetermined encryption on character information included in all or part of pre-acquired installation information to obtain second validation information; and secondly, judging whether the first validation information is matched with the second validation information, and if the first validation information is not matched with the second validation information, executing corresponding processing relevant to all or part of installation information. The invention has the advantage that: the attack of virus and the like on computer equipment caused by falsification of the installation information can be avoided.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method, device and equipment for detecting tampered installation information. Background technique [0002] With the popularization of computers and mobile phones, more and more computer or mobile phone users often download various installation information from various websites, such as QQ installation packages, Ziguang input method, etc., to expand the computer or mobile phone they use. application functions. However, once a virus is added to the installation information downloaded by the user, when the computer or mobile phone used by the user runs the installation information, the system will be attacked, thereby causing immeasurable losses to the user. [0003] Therefore, it is necessary to detect the installation information to determine whether it has been tampered with, so as to ensure the security of the equipment running the installation information. Contents of the inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51G06F21/56
Inventor 田彪
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products