Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System file protection method and device based on network security and electronic equipment

A system file and network security technology, applied in the field of network security, can solve problems such as economic loss and data damage, and achieve the effect of reducing the probability of being damaged

Pending Publication Date: 2022-04-12
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because network attacks occur in computer systems, in the process of system defense against network attacks, the data of the part subjected to network attacks may be damaged, resulting in economic losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System file protection method and device based on network security and electronic equipment
  • System file protection method and device based on network security and electronic equipment
  • System file protection method and device based on network security and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029]A network attack refers to an attack on the hardware, software and data in the local system by using the loopholes and security flaws in the local system. The means of attack include password intrusion, email attack, attacking other nodes through one node, network monitoring, using hacker software attack, security hole attack and port scanning attack, etc. When the system is successfully attacked by an external network, not only will the system be controlled, but also the data files in the system will be stolen, resulting in economic losses.

[0030] At present, the ways to defend against attacks include improving security awareness, using anti-virus and anti-hacking and other firewall software, setting up proxy servers, hiding your own IP address, taking anti-virus and anti-hacking as routine work, regularly updating anti-virus components, and keeping anti-virus software at permanent status, etc. Since hackers often launch attacks on specific dates, computer users shou...

Embodiment 2

[0070] see Figure 4 , the embodiment of the present invention provides a system file protection device based on network security, including: a first virtual space establishment module 201, configured to establish a first virtual space on a local system; an external data receiving module 202, configured for the first virtual space A virtual space receives external data transmitted to the local system; the security verification module 203 is used for the first virtual space to perform security verification on the received external data, and determines whether the external data will threaten the internal data of the local system; alarm Module 204, configured to send an alarm message to the local system if the first virtual space determines that the external data will threaten the data inside the local system; the first virtual space deletion module 205 is used for the local system to The alarm information deletes the first virtual space and the data in the first virtual space. ...

Embodiment 3

[0083] see Figure 5, the embodiment of the present invention provides an electronic device, the electronic device includes: a housing 301, a processor 302, a memory 303, a circuit board 304 and a power supply circuit 305, wherein the circuit board 304 is placed in the space enclosed by the housing 301 Internally, the processor 302 and the memory 303 are arranged on the circuit board 304; the power supply circuit 305 is used to supply power to each circuit or device of the above-mentioned electronic equipment; the memory 303 is used to store executable program code; the processor 302 reads the memory 303 The executable program code stored in the computer is used to run a program corresponding to the executable program code, which is used to execute the network security-based system file protection method described in any one of the preceding embodiments.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a system file protection method and device based on network security and electronic equipment, and relates to the technical field of network security. The problem that the probability that system files are damaged is high is solved. The system file protection method based on network security comprises the following steps: establishing a first virtual space on a local system; the first virtual space receives external data transmitted to a local system; the first virtual space performs security verification on the received external data, and determines whether the external data threatens data in a local system; if the first virtual space determines that the external data threatens the internal data of the local system, alarm information is sent to the local system; and the local system deletes the first virtual space and the data in the first virtual space based on the alarm information. The method is suitable for application scenes for preventing system files from being damaged.

Description

technical field [0001] The invention relates to the technical field of network security. In particular, it relates to a system file protection method, device and electronic equipment based on network security. Background technique [0002] A network attack refers to an attack on the hardware, software and data in the system by using the loopholes and security flaws in the system. Computers may encounter cyber attacks during daily use. Because the network attack occurs in the computer system, in the process of system defense against the network attack, the data of the part subjected to the network attack may be damaged, thereby causing economic losses. Contents of the invention [0003] In view of this, embodiments of the present invention provide a system file protection method, device, and electronic device based on network security, which can reduce the probability of system file damage to a certain extent. [0004] In order to achieve the above object, embodiments of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L67/06G06F21/56G06F21/62
Inventor 韩明均杨飞
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More