Safety protection method and apparatus

A security protection device and security strategy technology, applied in the field of security protection methods and devices, can solve problems such as user resource occupation and application effectiveness conflicts, improve operating efficiency and user experience, improve application effectiveness, and reduce user resource occupation Effect

Active Publication Date: 2016-06-15
三六零数字安全科技集团有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the defects in the prior art, the present invention provides a security protection method and device, which can solve the problem that existing security policies have contradictions between user resource occupation and application effectiveness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and apparatus
  • Safety protection method and apparatus
  • Safety protection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0060] figure 1 It is a schematic flowchart of steps of a security protection method in an embodiment of the present invention. see figure 1 , the security protection method includes:

[0061] Step 101: When the behavior of the process matches the preset local trigger policy, upload the description information of the behavior of the process to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a safety protection method and apparatus. The safety protection method comprises the steps of: when a behavior of a process is matched with a preset local trigger strategy, uploading description information of the behavior of the process to a server so as to issue a temporary safety strategy corresponding to a preset risk behavior when the server determines that the behavior of the process is matched with any one preset risk behavior, wherein the temporary safety strategy comprises revocation conditions of the temporary safety strategy, and processing operations for dealing with the preset risk behavior and trigger conditions thereof; receiving the temporary safety strategy from the server; and loading the temporary safety strategy so as to execute the corresponding processing operation when any one of the trigger conditions is satisfied and revoke the temporary safety strategy when any one of the revocation conditions is satisfied. The problem of contradiction existing between user resource occupation and application validity for an existing safety strategy can be solved, and operation efficiency of safety protection software and user experience can be largely improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a safety protection method and device. Background technique [0002] Malicious program is an umbrella term for any program of code deliberately created to perform unauthorized and often harmful behavior, such as computer viruses, backdoors, keyloggers, password stealers, macro viruses, boot sector viruses , script viruses, Trojan horses, crimeware, spyware, adware, and more. [0003] In order to cope with the huge and increasing number of malicious programs, existing security protection software can enhance the security protection capability against malicious programs by monitoring the behavior of application programs and monitoring and processing each behavior according to security policies. Among them, the security policy, as the core of the security protection capability, is usually updated, maintained and distributed by the server in the whole network. Of course, a unifie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F21/568
Inventor 王亮何博孙诚
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products