Network security defense method and device

A network security and network technology, applied in computer security devices, instruments, platform integrity maintenance, etc., can solve problems such as system memory loss, system occupation, unwillingness to install, etc., and achieve the effect of preventing hard disk and memory failures and ensuring safety

Inactive Publication Date: 2017-11-07
深圳互联先锋科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Pop-up windows and some viruses and Trojan horses will be downloaded secretly and will continue to cause system memory loss, and eventually the system will crash and freeze
[0003] The most common network security defense scheme in the existing technology can only passively defend and will not actively restore the co...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security defense method and device
  • Network security defense method and device
  • Network security defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] In the network security defense method and device embodiment of the present invention, the flow chart of the network security defense method is as follows figure 1 shown. figure 1 Among them, the methods of network security defense include:

[0034] Step S01 Installing the network defense system software on the computer: In this step, installing the network defense system software on the computer.

[0035] Step S02 uses the computer to send an Interne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security defense method and device. The method comprises the following steps: network defense system software is installed on a computer; the computer is used to send a networking request to optical modem dial-up networking equipment, and the optical modem dial-up networking equipment activates a dial-up networking function; a browser accesses networking request data and returns a website request carrying a bullet screen and/or a Trojan virus; the network defense system software is started and automatically detects that CPU and memory occupation rates of the computer constantly increase; the network defense system software disables a network, calls a task manager to examine memory abnormality processes and close all process of the browser, and calls antivirus software for searching and killing; and the network is automatically restored after the antivirus software completes the searching and killing. The network security defense method and device provided by the invention has the following beneficial effects: a computer memory can be actively restored, computer performances cannot be affected, and the computer security is ensured.

Description

technical field [0001] The invention relates to the field of network security defense, in particular to a method and device for network security defense. Background technique [0002] In the 21st century, with the advent of the Internet information age, the price of personal computers in China is getting lower and lower, and the cost of accessing the Internet is also getting lower and lower. When computer users visit websites through browsing, they often have network problems. Chinese computer users generally have low computer skills, especially when opening a webpage and clicking on some online reading websites or video websites, the repeated advertisement pop-up windows and newly opened browser pop-up windows make computer users miserable . Pop-up windows and some virus and Trojan horses will be downloaded secretly and will continue to cause system memory loss, and eventually the system will crash and freeze. [0003] The most common network security defense scheme in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/56
CPCG06F21/568H04L63/1416H04L63/145
Inventor 艾军
Owner 深圳互联先锋科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products