Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A computer security protection system and method for defending against ransomware

A computer security and computer technology, applied in computer security devices, computing, digital data protection, etc., can solve problems such as irreparable losses, limited defense effect, difficulty in dealing with ransomware variants, etc., to achieve good defense effect and defense against ransomware Effect

Active Publication Date: 2020-09-01
广州市漫灵软件有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the current signature detection and killing scheme can only target known ransomware, but for new or variant unknown ransomware, it is impossible to detect ransomware by matching signatures in the virus database
That is to say, if the user system has been infected with an unknown ransomware virus, that is, the user files have been encrypted, and the operating system can only wait for the antivirus software to update the virus database, and then scan and kill the virus signature. It is impossible to recover the loss caused by the user's files being encrypted
[0006] Therefore, the existing defense methods of identifying and sniping the ransomware itself have limited effects, and it is difficult to deal with the endless variants of ransomware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer security protection system and method for defending against ransomware
  • A computer security protection system and method for defending against ransomware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] see figure 1 , a computer security protection system for defending against ransomware viruses, including a network server, a front-end controller, a file backup computer and a mobile storage terminal.

[0026] The network server is communicatively connected with the front controller, the file backup computer and the mobile storage terminal. The network server is mainly used to realize the communication connection between various parts.

[0027] The fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer security protection system for preventing ransovirus. The system comprises a network server, a front-end controller, a file backup computer and a mobile storage terminal, The network server is in communication connection with the front-end controller, the file backup computer and the mobile storage terminal; The front-end controller is connected with the protected computer and is used for processing the target file in the protected computer and generating a target file directory; The file backup computer is in communication connection with the network serverand used for obtaining and storing the processed target file from the front-end controller, and the file backup computer and the protected computer run different operation systems; And the mobile storage terminal is used for acquiring and storing the target file directory from the front-end controller. According to the method, the target file is disguised to avoid ransovirus scanning, so that thetarget file is protected, and the safety of the target file is further improved by adopting a backup mode.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a computer security protection system and method for defending against ransomware viruses. Background technique [0002] Ransomware virus is a kind of malicious computer virus that has emerged in recent years. When the user's computer is invaded by the ransomware virus, the ransomware virus will encrypt important files on the user's system and blackmail the user by decrypting these important files. , and the encryption method used by the ransomware virus cannot be cracked, victims often can only choose to give up the file or pay a high ransom. [0003] Specifically, the general principle of ransomware is that after the victim triggers the ransomware, the ransomware scans the files in the user's computer, then first copies the files to be encrypted, then encrypts the copies, and finally deletes the original files. Usually, the ransomware identifies the files to be encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/62
CPCG06F21/562G06F21/6209
Inventor 孟雷姚丹丹郭晓军郭晨宇张志立
Owner 广州市漫灵软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products