Computer virus defense method
A computer virus and virus database technology, applied in the computer field to reduce user losses and improve the chance of self-solving problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0013] Embodiment one: a kind of computer virus defense method, comprises the following steps: S 1, preset security status monitoring database, set monitoring module to the data input port that enters computer system, this monitoring module records input data and transmits information Provide the security status monitoring database; S2. Set up the policy production module to check the security status monitoring database according to the existing virus database and generate corresponding defense strategies; S3. The user checks and adjusts the defense strategy according to the production, and the adjusted defense strategy Policy records and load in the newly established self-defined policy library; S4, set record learning module, associate the security state monitoring database with the self-defined policy library, record the self-defined strategy in the self-defined policy library, the security state monitoring database and the self-defined Define policy-related data; S5. When t...
Embodiment 2
[0016] Embodiment two: on the basis of embodiment one, in step S5, the number of times of warning users, the data type corresponding to the self-defining strategy, and the data content corresponding to the self-defining strategy are recorded. After the custom strategy is completed, upload and Existing virus database-related servers.
[0017] A large number of windows computer poisoning mainly comes from two directions, namely IE browser and USB flash drive and other mobile storage media. Due to its own problems, IE has many loopholes. Even if Microsoft patches are applied in time, the invasion of some malicious Internet horses cannot be avoided.
[0018] Anti-virus strategies can be divided into loose rules and strict rules, that is, restricting dangerous behaviors, allowing ordinary behaviors, and establishing a blacklist system. Restricting malicious programs; The program establishes a white list, only allows known programs to run, and imposes strict restrictions on unknown ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com