Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application control-based anti-virus attack realization method and system

A technology of application programs and implementation methods, applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve the problems of computer system security damage, application programs are vulnerable to attacks, tampered or terminated, etc., to ensure safe operation. Effect

Inactive Publication Date: 2018-03-06
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an anti-virus attack implementation method based on application program control, aiming to solve the problem in the prior art that the application program of the computer system is easily attacked and tampered with or terminated, causing damage to the security of the computer system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application control-based anti-virus attack realization method and system
  • Application control-based anti-virus attack realization method and system
  • Application control-based anti-virus attack realization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] figure 1 It shows the implementation flow chart of the anti-virus attack implementation method based on application program management and control provided by the present invention, which specifically includes the following steps:

[0051] In step S101, when it is detected that the application is started, it is judged whether the client user is a trusted user, if it is a trusted user, then step S102 is executed, otherwise, step S103 is executed.

[0052] In step S102, when the client user is a trusted user, the control allows the application program to start.

[0053] In step S103, when...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of virus protection and provides an application control-based anti-virus attack realization method and system. The method comprises the steps of judging whether a client user is a trusted user or not when an application is detected to be started; when the client user is the trusted user, controlling the application to be allowed to be started; when theclient user is a non trusted user, judging the trust level of the application; when the trust level of the application is a blacklist, controlling the application to be prohibited from being started;and when the trust level of the application is a gray list and a white list, controlling the application to be allowed to be started. The control on computer system applications is realized; and the virus attack is subjected to security defense, so that the security operation of a computer system is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of virus protection, and in particular relates to a method and system for implementing an anti-virus attack based on application program management and control. Background technique [0002] The running of a computer is actually the running of many application processes. Application programs refer to computer programs that are developed to run on the operating system in order to complete one or several specific tasks. [0003] During the operation of the computer, once some important applications are attacked and tampered with or terminated, it will cause serious losses to the computer system. At the same time, due to the convenience of network transmission, the computer system often receives new applications. , to enrich the functions of the computer, but these applications may bring hidden dangers to the security of the computer system. Contents of the invention [0004] The purpose of the present inven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/562G06F21/577G06F2221/033
Inventor 潘燕燕
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products