System file protection method and device based on network security and electronic equipment
A system file and network security technology, applied in the field of network security, can solve problems such as economic loss and data damage, and achieve the effect of reducing the probability of being damaged
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0028] Example one
[0029]Network attack refers to attacks on the local system's hardware, software, and data of the local system using the vulnerabilities and security defects existing in the local system. The means of attacks include password intrusion, email attacks, attacking other nodes, network monitors, using hacker software attacks, security vulnerabilities attacks and port scan attacks. When the system is attacked by an external network and succeeds, it will not only cause the system to be controlled, and the data files in the system are stolen, causing economic losses.
[0030] At present, there is an improvement of security awareness. Use anti-virus anti-black and other firewall software, set a proxy server, hide their IP address, and treat anti-virus anti-black as a daily case, regularly update the anti-virus component, keep the anti-virus software in Resident status, etc. Since hackers often initiate attacks for a specific date, computer users should specifically imp...
Example Embodiment
[0069] Example 2
[0070] See Figure 4 The embodiment of the present invention provides a network security system file protection device, including: a first virtual space establishment module 201 for establishing a first virtual space on a local system; an external data receiving module 202 for the first data receiving module 202 for A virtual space receives an external data transmitted to the local system; security verification module 203, confirmed to be securely verified for the first virtual space for the received external data, determining whether the external data threatens the data inside the local system; Module 204, for determining that the external data threatens the data inside the local system, then transmits alarm information to the local system; the first virtual space delete module 205 is used for the local system based on The alarm information deletes the data in the first virtual space and the first virtual space.
[0071] The embodiment of the present invention p...
Example Embodiment
[0082] Example three
[0083] See Figure 5The embodiment of the present invention provides an electronic device comprising: housing 301, processor 302, memory 303, circuit board 304, and power supply circuit 305, wherein the circuit board 304 is disposed in the housing 301. Internal, processor 302 and memory 303 are disposed on circuit board 304; power supply circuit 305, for supplying respective circuits or device of the electronic device; memory 303 is used to store executable program code; processor 302 is passed by reading memory 303 The executable program code stored in the in-executable program code is to perform a network-based security-based system file protection method according to any one of the foregoing embodiments.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap