Computer security protecting method, computer security protecting device and computer

A technology of computer security and protective devices, which is applied in the field of data security, can solve problems such as inability to protect computer security, and achieve good security protection effects

Active Publication Date: 2013-02-06
KINGSOFT
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a security protection method and device and computer to solve the problem that the computer security protectio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security protecting method, computer security protecting device and computer
  • Computer security protecting method, computer security protecting device and computer
  • Computer security protecting method, computer security protecting device and computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0031] The embodiment of the present invention provides a computer safety protection device. The computer safety protection device can be installed in a computer, and is used for safety protection of the computer.

[0032] Before specifically introducing the computer security protection device provided by the embodiment of the present invention, an application scenario of the computer security protection device is firstly introduced.

[0033] figure 2 It is a schematic diagram of the security protection of the computer by the security protection device according to the embodiment of the present invention.

[0034] Such as figure 2 As shown, in this figure, the mobile terminal 20 can estab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a computer security protecting method, a computer security protecting device and a computer. The computer security protecting method comprises the following steps: verifying an agent program of a mobile terminal application program and judging whether the agent program is legal, wherein the mobile terminal application program is connected with the mobile terminal through the agent program, and the mobile terminal application program and the agent program are both arranged in the computer; and when the agent program is judged to be illegal, rejecting the data interaction between the mobile terminal and the mobile terminal application program. With the adoption of the method, the problems in the prior art that a computer security protection method cannot provide security protection to the computer when the agent program of a mobile terminal driving program is illegally replaced or modified are solved, so that better security protection is provided for the computer.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a method and device for computer security protection and a computer. Background technique [0002] With the widespread use of mobile terminals and the increasing intelligence of mobile terminals, in daily life, it is often necessary to connect the mobile terminal to a computer so that the mobile terminal can obtain data on the computer or the computer can obtain mobile The data on the terminal also produces a series of problems caused by the data interaction between the mobile terminal and the computer. [0003] When the mobile terminal interacts with the computer, the computer will often be attacked by mobile phone viruses from the mobile terminal, causing the computer to be in an unsafe situation due to the connection of the mobile terminal. In the prior art, protection against this situation When, it is often to carry out security monitoring on the driver program of the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
Inventor 程君徐鸣
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products