Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for preventing ransomware or phishing attack

A phishing and software technology, applied in the field of preventing ransomware or phishing attacks, can solve problems such as troublesome registration of programs, only prevent data encryption, program inconvenience, etc., and achieve the effect of preventing and preventing phishing attacks

Pending Publication Date: 2022-02-22
ナムソフトカンパニーリミテッド
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has the inconvenience of pre-registering the authorized program, and it is not possible to troublesomely register the program every time when the program needs to be installed at any time, so there is also a limitation.
[0005] Moreover, there have been some recent cases where the ransomware itself does not only encrypt the data stored in the PC, but encrypts the entire PC, or encrypts all the hardware installed on the PC, demanding a ransom, but preventing data encryption is not enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing ransomware or phishing attack
  • Method and system for preventing ransomware or phishing attack
  • Method and system for preventing ransomware or phishing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] As the first technical purpose of the present invention, the server system for preventing ransomware attacks will be described below (see Figure 1 to Figure 3 ).

[0038] Below, in reference to Figure 1 to Figure 3 Before explaining the server system for preventing ransomware attack according to the embodiment of the present invention, in order to help understanding of the present invention, the difference between the embodiment of the present invention and other embodiments is as follows.

[0039] In the prior art, there is a "program-based read-only memory" implementation, which is a way to judge whether it is a program authorized by the file protection policy. If it is an authorized program, the file can be modified. If not, it can only be read-only. technology that operates in mode. In this program-based ROM implementation, commands and responses are basically executed in units of files, and therefore, files are provided in read-only mode in units of files. Howev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a system for a server for preventing ransomware attacks, comprising: a backup storage device which is an independent storage device physically independent of the server, is used for backing up storage data in the server, and comprises a communication interface which can be in communication connection with the server; and a service agent installed in the server for intermediating communication with the backup storage device. According to an embodiment of the present invention, in a state in which the backup storage device is stored and installed in the server, after data stored in the server is backed up in the backup storage device, when a lock command is applied to backup data that has been backed up in the backup storage device, the storage device for backup performs locking processing on the backup data according to the locking command, and processes the backup data subjected to the locking processing to be provided only in a read-only mode which cannot be modified.

Description

technical field [0001] The present invention relates to a method and system for preventing ransomware or phishing attacks. Background technique [0002] As hackers spread more and more varieties of phishing or ransomware, users' data is increasingly at risk. In general, phishing refers to an attack to obtain account information, electronic certificates, key data, etc. in a user terminal by leaking data stored in the user terminal. In addition, ransomware is an attack technique that encrypts the data stored in or connected to the network storage on the user terminal to prevent the user from accessing it and then demands money. Recently, methods and forms of PC terminals have become more and more diverse, ranging from data leaks that make users unable to use them to fake terminal hard disk partitions that make PC terminals unusable. [0003] Existing methods of countering such phishing use technology that encrypts the storage space in the PC and confirms whether the program ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F21/56G06F21/55
CPCH04L63/1483H04L63/145H04L63/10H04L63/08H04L63/20G06F21/566G06F21/554G06F2201/825G06F11/1446H04L63/1416H04L67/1095G06F21/56H04L63/14G06F2201/80
Inventor 禹钟贤
Owner ナムソフトカンパニーリミテッド