Unlock instant, AI-driven research and patent intelligence for your innovation.

File protection method and device

A file and file type technology, applied in the computer field, can solve problems such as loss of users and inability to use electronic files normally, and achieve the effect of improving security

Active Publication Date: 2021-01-29
北京鸿享技术服务有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, hackers can use malicious programs to encrypt electronic files and other illegal operations without the user's permission, so that users cannot normally use the illegally operated electronic files, thereby causing huge losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and device
  • File protection method and device
  • File protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] figure 1 A flow chart of a file protection method provided according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes the following steps:

[0025] In step S110, when an operation instruction for the file is detected, the program that initiates the operation instruction is determined.

[0026] Specifically, in this embodiment, it can be defaulted to monitor all types of fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file protection method and device, wherein the method includes: when monitoring an operation instruction initiated for a file, determining the program that initiates the operation instruction; according to the file type of the file, determining the Corresponding classification program white list; judging whether the program initiating the operation instruction belongs to the classification program white list, and determining whether to protect the file according to the judgment result. Since each type of file is usually handled by an application that matches the file type of the file, monitoring whether the program that operates the file matches the file type of the file to be operated can quickly and accurately determine whether It is necessary to strengthen the protection of the file, thereby improving the security of the file.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a file protection method and device. Background technique [0002] With the development of computer technology, informatization has developed rapidly in all walks of life. For enterprises and institutions, network paperless office is becoming more and more popular, therefore, the importance of electronic documents is becoming increasingly prominent. [0003] In order to seek illegal benefits, computer hackers often launch various types of attacks on electronic files. For example, hackers can use malicious programs to encrypt electronic files and other illegal operations without the user's permission, so that the user cannot normally use the illegally operated electronic file, thereby causing huge losses to the user. Therefore, how to quickly and effectively identify malicious programs and prevent malicious programs from performing illegal operations on electronic files has be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/6218H04L63/101H04L63/105
Inventor 王亮何博
Owner 北京鸿享技术服务有限公司