Method and device for preventing login information from being stealed

A technology of login information and target process, applied in the field of preventing login information from being stolen, can solve problems such as inability to detect and kill malware, and achieve the effect of preventing theft and ensuring security

Active Publication Date: 2012-08-08
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] This application provides a method and device for preventing login information from being stolen, so as to solve the problem in the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing login information from being stealed
  • Method and device for preventing login information from being stealed
  • Method and device for preventing login information from being stealed

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0061] Many businesses on the computer need to log in by entering login information, and then connect to the Internet to perform related operations, such as clients (such as instant messaging software, ), and certain web pages (such as social networking sites, shopping sites, etc.). Illegal people steal login information by implanting malicious software in computers, such as Trojan horses that steal login information. Among them, malicious software usually adopt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for preventing login information from being stealed to solve the problem that the prior art cannot search and kill malicious softwares after variation timely when characteristics of the malicious softwares change. The method includes triggering and establishing monitoring threads by starting a target process, wherein the target process is used to input login information to complete login; monitoring the state of the thread detection target process before completing login; and performing operations of cleaning malicious softwares if the state of the target process is detected abnormal. The method and the device for preventing login information from being stealed are based on the method of malicious softwares stealing user login information, and aiming at the characteristics that malicious softwares use identical obtaining method with different characteristics to obtain user login information illegally, The method and the device play a defensive roll fundamentally, and prevent login information from being stealed. In addition, detection is conducted each time the target process is started, so that the safety of the user login information is guaranteed perfectly.

Description

technical field [0001] The present application relates to network security technology, in particular to a method and device for preventing login information from being stolen. Background technique [0002] Many businesses on the computer need to log in by entering login information, and then connect to the Internet to perform related operations. However, if the user's login information is known by illegal personnel such as hackers, it is possible to publish or carry out some illegal activities in the name of the user. Therefore, how to prevent login information from being stolen has attracted more and more attention. [0003] Illegal people steal login information by implanting malicious software in computers, such as Trojan horses that steal login information. Among them, malicious software usually obtains login information by means of deception, and the client and webpage that require login information for login can be regarded as target processes. For example, malicious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/56
Inventor 路健华郑文彬
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products