Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer program management method and system

A computer program and management method technology, applied in the management field of computer technology, can solve problems such as virus infection and security data leakage

Pending Publication Date: 2018-07-31
SHINSOFT
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the security system based on the computer system may still face information security loopholes, such as security data leakage caused by improper human operation, or virus infection, which makes the information security protection measures of the security system more important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer program management method and system
  • Computer program management method and system
  • Computer program management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The design of the security system usually has a control center, which mainly manages the security equipment of each client. When an abnormal report is received, it can implement different security measures according to the security level of the event, including instructing the operation of the client device and sending personnel to the On-site processing. The client generally includes various security devices, such as the security host and associated various sensors, digital video recorders (Digital Video Recorder, DVR) and cameras, or the security device is connected to other terminal devices of the client to perform control, such as access control Devices, computer equipment, point of sale / service (POS) in stores, kiosks, and even teller machines (ATMs) provided by banks. In the computer program management system proposed by the present invention, the main monitoring program executed on the security device and the slave monitoring program executed on the terminal devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer program management method and system. The method is mainly executed in a terminal apparatus subjected to security protection control; a monitoring program executed inthe terminal apparatus monitors computer programs running in the terminal apparatus according to program security data; when it is judged that the running of at least one computer program does not meet the requirements of the program security data, abnormal information is generated; the abnormal information is transmitted to a security protection apparatus; the security protection apparatus notifies a control center; and the terminal apparatus can block the abnormal computer program according to the abnormal information.

Description

technical field [0001] The present invention relates to a computer science and technology management technology, in particular to a computer program management method and system that detects an abnormal computer program and executes notification. Background technique [0002] In the security system that emphasizes safety, any hazard may cause serious consequences. In addition to the traditional personal safety, home safety and the safety of various facilities rely on the security system, the security system also needs to prevent any threats related to information security. . [0003] However, the security system based on the computer system may still face information security loopholes, such as security data leakage caused by improper human operation, or virus infection, which makes the information security protection measures of the security system even more important. Contents of the invention [0004] In order to prevent the system from being abnormal due to informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/30G06F21/56
CPCG06F11/302G06F21/566
Inventor 李鸿生李境岂
Owner SHINSOFT