Method, device and system for protecting safety of computer

A technology of computer security and protection device, applied in transmission systems, platform integrity maintenance, electrical components, etc., can solve problems such as inability to computer security protection, and achieve good security protection effects

Active Publication Date: 2013-02-06
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a computer security protection method, device and system to solve the problem that the computer security protection method in the prior art cannot provide security protection for the computer when the virus uses a white file to start

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for protecting safety of computer
  • Method, device and system for protecting safety of computer
  • Method, device and system for protecting safety of computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0038] The embodiment of the present invention provides a computer security protection system, figure 1 is a schematic diagram of a computer security protection system according to an embodiment of the present invention, such as figure 1 As shown, the safety protection system of the embodiment of the present invention includes a first safety protection device 10 and a first safety protection device 20 . Wherein, the first protection device 10 is a protection device on the backend server side of the computer, and the second protection device 20 is a protection device on the computer client side.

[0039] The embodiment of the present invention also provides a computer security protection devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for protecting the safety of a computer. The method for protecting the safety of the computer comprises that: a first server receives the message digest 5 (MD5) value of the original information from a client side, wherein the original information is the start point information which is obtained through scanning a start point of the computer by the client side; the first server searches the start point state which corresponds to the MD5 value from a first database to obtain a first matching result, wherein the corresponding start point states of different MD5 values can be stored in the first database; and the first server sends the first matching result to the client side, so that the client side process the start point according to the operation command corresponding to the first matching result. The method is utilized to solve the problem that the method for protecting the safety of the computer in the prior art cannot protect the safety of the computer when the computer is started by virus by utilizing null files, and furthermore, an effect of protecting the safety of the computer is well realized.

Description

technical field [0001] The present invention relates to the technical field of computer network security, in particular to a computer security protection method, device and system. Background technique [0002] With the wide application of computer technology in various fields, threat programs have also caught up with the tide of the Internet era. These threat programs have evolved from purely malicious programs at the beginning to tampering with the default settings of the operating system and using safe computer programs as a trigger, so as to evade the detection and killing of security software and achieve the purpose of launching itself to execute malicious programs. The current security detection methods are all based on the detection of the file content dimension. The so-called detection method not based on the file content dimension refers to the security identification method that does not rely solely on the file content level. Provides various ways to load the prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56H04L29/06
Inventor 黄舰周奕梁宇杰陶智飞赵昱
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products