Data protection method and device, storage medium and computer equipment

A technology for data protection and storage media, applied in digital data protection, computer security devices, computing, etc., can solve problems such as operating data monitoring, and achieve privacy protection and convenient use

Pending Publication Date: 2021-11-23
成都鲁易科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, this application provides a data protection method and device, storage medium, and computer equipment, which help to solve the problem that user operation data will be monitored by monitoring software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and device, storage medium and computer equipment
  • Data protection method and device, storage medium and computer equipment
  • Data protection method and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0051] A data protection method is provided in this embodiment, such as figure 1 As shown, the method includes:

[0052] Step 101, receiving target operation data to be protected;

[0053] Step 102, obtaining a preset system callback address, and deleting the target callback data corresponding to the target operation data under the preset system callback address;

[0054] Step 103, sending the target operation data to a corresponding target execution program, so as to execute the operation to be protected corresponding to the target operation data through the target execution program.

[0055]The embodiment of the present application can be applied to the client, and the client can specifical...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data protection method and device, a storage medium and computer equipment. The method comprises the steps of receiving to-be-protected target operation data; obtaining a preset system callback address, and deleting target callback data corresponding to the target operation data under the preset system callback address; and sending the target operation data to a corresponding target execution program so as to execute a to-be-protected operation corresponding to the target operation data through the target execution program. The problem that the user operation data can be monitored by the monitoring software is solved, an environment in which the operation data cannot be monitored is created for the user, the privacy of the user is protected, the monitoring software in the equipment does not need to be unloaded and closed, the user can use the equipment conveniently, the function of the monitoring software can be recovered at any time after the privacy operation is finished, and the method is simple and convenient.

Description

technical field [0001] The present application relates to the technical field of computer security, in particular to a data protection method and device, a storage medium, and computer equipment. Background technique [0002] Now there are many programs that monitor computers, malicious or non-malicious, anti-virus software, virus software, etc. When users perform private operations such as password input and bank card number input, it is extremely difficult to have a private environment that is not monitored. Many anti-virus software, even if the user checks the option not to monitor, will actually secretly monitor the user's operations in the background, and for malware, the user does not even notice that the malware is running on the computer, and there is no way to control the malware's impact on the computer. The monitoring behavior of operational data. Contents of the invention [0003] In view of this, the present application provides a data protection method and d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 易钟鸣潘明
Owner 成都鲁易科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products