Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security protection method and network security protection device

A network security and protection device technology, applied in the field of network security, can solve problems such as stealing information and weak security, and achieve the effect of improving network security and avoiding the leakage of private information

Active Publication Date: 2018-11-09
山东智慧云链网络科技有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, users usually implement information security protection by setting login passwords. However, this type of security protection method is relatively weak. For example, it is easy to steal relevant information by implanting viruses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and network security protection device
  • Network security protection method and network security protection device
  • Network security protection method and network security protection device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0055] Please refer to figure 1 , is a schematic diagram of the interaction between the blockchain system 10 and the electronic device 20 provided by the embodiment of the present invention. The blockchain system 10 provided by the present invention and the electronic device 20 can establish a communication connection through a network for data interaction. The network can be, but is not limited to, a wired network or a wireless network. In this embodiment, the block chain system 10 can be used to identify and judge whether the file (including the installation file of the application program) to be downloaded by the electronic device 20 is safe, and only push the file to be downloaded to the electronic device 20 when the file is safe. To prevent the Trojan virus from being implanted into the files to be downloaded, thereby improving the network security of the electronic device 20 .

[0056] Please refer to figure 2 , is a schematic block diagram of the blockchain system 1...

no. 2 example

[0089] Please refer to Figure 4 , is the second schematic flowchart of the network security protection method provided by the embodiment of the present invention. The network security protection method provided in the second embodiment can be applied to the above-mentioned electronic device 20 , and the electronic device 20 executes each step of the network security protection method, so as to improve the network security of the electronic device 20 .

[0090] In the second embodiment, the network security protection method may include the following steps:

[0091] Step S310, sending a download request to the block chain system 10;

[0092] Step S320, receiving the file to be downloaded corresponding to the download request sent by the blockchain system 10, wherein the file to be downloaded is certified by the blockchain system 10 and encrypted according to preset encryption rules The file, wherein, the file to be downloaded includes an application program;

[0093] Step S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security protection method and a network security protection device, which relate to the technical field of network security. According to the network security protection method, a download request sent by an electronic device is received; prestored first key information which corresponds to the electronic device is compared with second key information carried by the download request; when the first key information is the same as the second key information, a to-be-downloaded file which corresponds to the download request is determined; whether a list which corresponds to the to-be-downloaded file is in a prestored white list or not is judged; if the list of the to-be-downloaded file is in the prestored white list, whether a first Hash value of the to-be-downloaded file is the same as a prestored second Hash value or not is judged; and if the first Hash value is the same as the second Hash value, the to-be-downloaded file is downloaded into the electronic device. On one hand, the invention can help prevent Trojan from getting into the electronic device by the way of implantation, and on the other hand, the invention can help improve the network security of the electronic device, and prevent the leakage of private information.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a network security protection method and device. Background technique [0002] With the development of communication technology, the network has been integrated into people's daily life. For example, people often use mobile devices such as smartphones and tablets to access the Internet through wireless networks. People also use mobile devices for shopping, payment, social interaction, etc., and their property and private information are stored in the mobile devices. In addition, with the gradual popularization of the Internet of Things, many smart home devices can be connected to mobile devices through wireless routers, and people can check the device status of smart home devices and control these devices by opening the mobile application. In the prior art, users usually implement information security protection by setting a login password. However, this type o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F17/30H04L29/08
CPCH04L63/101H04L67/06
Inventor 张林鹿慧选王兴才赵志豪
Owner 山东智慧云链网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products