System file protection method and device based on network security and electronic equipment

A system file and network security technology, applied in the field of network security, can solve problems such as economic loss and data damage, and achieve the effect of reducing the probability of being damaged

Pending Publication Date: 2022-04-12
BEIJING ANTIY NETWORK SAFETY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because network attacks occur in computer systems, in the process of system defense against network a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System file protection method and device based on network security and electronic equipment
  • System file protection method and device based on network security and electronic equipment
  • System file protection method and device based on network security and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] Example one

[0029]Network attack refers to attacks on the local system's hardware, software, and data of the local system using the vulnerabilities and security defects existing in the local system. The means of attacks include password intrusion, email attacks, attacking other nodes, network monitors, using hacker software attacks, security vulnerabilities attacks and port scan attacks. When the system is attacked by an external network and succeeds, it will not only cause the system to be controlled, and the data files in the system are stolen, causing economic losses.

[0030] At present, there is an improvement of security awareness. Use anti-virus anti-black and other firewall software, set a proxy server, hide their IP address, and treat anti-virus anti-black as a daily case, regularly update the anti-virus component, keep the anti-virus software in Resident status, etc. Since hackers often initiate attacks for a specific date, computer users should specifically imp...

Example Embodiment

[0069] Example 2

[0070] See Figure 4 The embodiment of the present invention provides a network security system file protection device, including: a first virtual space establishment module 201 for establishing a first virtual space on a local system; an external data receiving module 202 for the first data receiving module 202 for A virtual space receives an external data transmitted to the local system; security verification module 203, confirmed to be securely verified for the first virtual space for the received external data, determining whether the external data threatens the data inside the local system; Module 204, for determining that the external data threatens the data inside the local system, then transmits alarm information to the local system; the first virtual space delete module 205 is used for the local system based on The alarm information deletes the data in the first virtual space and the first virtual space.

[0071] The embodiment of the present invention p...

Example Embodiment

[0082] Example three

[0083] See Figure 5The embodiment of the present invention provides an electronic device comprising: housing 301, processor 302, memory 303, circuit board 304, and power supply circuit 305, wherein the circuit board 304 is disposed in the housing 301. Internal, processor 302 and memory 303 are disposed on circuit board 304; power supply circuit 305, for supplying respective circuits or device of the electronic device; memory 303 is used to store executable program code; processor 302 is passed by reading memory 303 The executable program code stored in the in-executable program code is to perform a network-based security-based system file protection method according to any one of the foregoing embodiments.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a system file protection method and device based on network security and electronic equipment, and relates to the technical field of network security. The problem that the probability that system files are damaged is high is solved. The system file protection method based on network security comprises the following steps: establishing a first virtual space on a local system; the first virtual space receives external data transmitted to a local system; the first virtual space performs security verification on the received external data, and determines whether the external data threatens data in a local system; if the first virtual space determines that the external data threatens the internal data of the local system, alarm information is sent to the local system; and the local system deletes the first virtual space and the data in the first virtual space based on the alarm information. The method is suitable for application scenes for preventing system files from being damaged.

Description

technical field [0001] The invention relates to the technical field of network security. In particular, it relates to a system file protection method, device and electronic equipment based on network security. Background technique [0002] A network attack refers to an attack on the hardware, software and data in the system by using the loopholes and security flaws in the system. Computers may encounter cyber attacks during daily use. Because the network attack occurs in the computer system, in the process of system defense against the network attack, the data of the part subjected to the network attack may be damaged, thereby causing economic losses. Contents of the invention [0003] In view of this, embodiments of the present invention provide a system file protection method, device, and electronic device based on network security, which can reduce the probability of system file damage to a certain extent. [0004] In order to achieve the above object, embodiments of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L67/06G06F21/56G06F21/62
Inventor 韩明均杨飞
Owner BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products