Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for inspecting data through file format conversion

A file format and data inspection technology, applied in the direction of electronic digital data processing, special data processing applications, instruments, etc., can solve problems such as incomplete interception, security data leakage, and user terminal security cannot be guaranteed

Inactive Publication Date: 2016-08-10
SOFTCAMP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this regard, even if the user pays more attention to the inspection of malicious codes by using security solutions such as vaccines, the transmission of malicious codes through the removable storage medium cannot be completely intercepted, so there is no guarantee that the user's terminal cannot be protected from the infection of the malicious codes. security flaws
[0010] As mentioned above, the terminal may receive malicious code through various data inflow paths, and it often happens that the terminal is infected by the received malicious code and causes failure, or accidents that various security data in the terminal are leaked to the outside without authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for inspecting data through file format conversion
  • System and method for inspecting data through file format conversion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The above features and effects of the present invention will become clear through the accompanying drawings and the following detailed description, so those skilled in the technical field of the present invention can easily implement the technical idea of ​​the present invention. Since the present invention can be modified variously and can have various forms, specific embodiments are illustrated in the drawings and described in detail herein. However, this does not mean that the present invention is limited to a specific disclosed form, but it should be understood that all changes, equivalents, and substitutions included in the idea and technical scope of the present invention are included. The terms used in this application are used to describe specific embodiments, and are not used to limit the present invention.

[0025] Hereinafter, the specific content of implementing the present invention will be described in detail in conjunction with the accompanying drawings. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a system and a method for inspecting data through a file format conversion which can inspect data flowing from and stored in a terminal to filter various malicious codes attached to the data and can stably execute the data through the filtering. The present invention comprises a stored file inspection step of converting a file format of a file stored in the terminal and then reconstructing the converted file format into an original file format.

Description

technical field [0001] The present invention relates to a data inspection and processing system and method for stably operating data through file format conversion by inspecting data flowing into and stored from the outside to a terminal one by one and filtering various malicious codes attached to the data. Background technique [0002] With the development of data processing systems such as computers and mobile terminals (hereinafter referred to as 'terminals') that operate and manage various data, and communication networks such as the Internet that connect these to communicate with each other, countless data not only through e-mails, terminals Not only communication between but also via removable storage media like USB memory, CD / DVD, etc. [0003] This kind of data not only contains information beneficial to users, but also contains malicious information. This kind of data can include malicious codes of viruses, spyware, adware, hacking tools, etc. . The malicious code...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/562G06F21/568G06F2221/034G06F16/116G06F16/162
Inventor 裵桓国白锺德
Owner SOFTCAMP