Unlock instant, AI-driven research and patent intelligence for your innovation.

Gateway/bridge based spy software invading-proof method

A software and bridge technology, applied in the usage of multiple keys/algorithms, electrical components, user identity/authority verification, etc., can solve problems such as latent, inability to provide effective protection for users, incorrect use or shutdown, etc.

Active Publication Date: 2011-04-20
SANGFOR TECH INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development and application of the Internet and information technology, the Internet has become an indispensable part of daily work and life, but it has brought the following problems: spyware on the Internet emerges in an endless stream. If the user's Internet terminal accidentally or passively installs spyware, Then the software will lurk on the computer of the user to access the Internet and record or steal some confidential or private information of the user through the network, such as: the password of the online bank, the research and development results of the research and development unit, etc.
[0006] These methods are generally based on the detection of spyware signatures. The accuracy of detection depends on the signatures, which need to be continuously updated and improved. Today, with the emergence of spyware, the update speed of signatures must lag behind The emergence speed of spyware, in the lagging period of the signature, cannot provide effective protection to users
On the other hand, the personal firewall installed on the terminal computer may also be incorrectly used or closed, bringing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gateway/bridge based spy software invading-proof method
  • Gateway/bridge based spy software invading-proof method
  • Gateway/bridge based spy software invading-proof method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The specific network structure of the present invention is as figure 1 As shown, several LAN terminal users 1 are connected to INTERNET or untrusted network 3 through the gateway / bridge 2 of the present invention, and under the action of the gateway / bridge 2 of the present invention, internal confidential information is prevented from being sent out by spyware.

[0025] The gateway / network bridge 2 of the present invention communicates with the specified security terminal software installed and running on the terminal user 1 itself to realize anti-spyware infringement. The specific process is as follows figure 2 shown, including the following specific steps:

[0026] 210) start;

[0027] 220) The data that the end user 1 accesses the external network 3 reaches the gateway / bridge 2;

[0028] 230) Determine whether the terminal user 1 is running the specified security terminal software and whether the specified security terminal software executes the trusted process li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-spy software invade method based on gateway / bridge, wherein the terminal user (1) via gateway / bridge (2) is connected to internet or non-trust network (3); and the method comprises: the gateway / bridge (2) recognizes the terminal user (1) connected and sending data; allowing connection and sending according to the condition that the terminal user (1) operates special safety terminal software to download trust process list from gateway / bridge (2); or else forbidding; said safe terminal software executes trust process list to stop the process not in the trust process list to connect application network. The inventive method can confirm each network terminal user to work in safety of safe terminal software, via the communication between safe terminal software and gateway / bridge.

Description

technical field [0001] The invention relates to network and information security, in particular to a method for preventing spyware from infringing. Background technique [0002] With the development and application of the Internet and information technology, the Internet has become an indispensable part of daily work and life, but it has brought the following problems: spyware on the Internet emerges in an endless stream. If the user's Internet terminal accidentally or passively installs spyware, Then the software will lurk on the computer of the user to access the Internet and record or steal some confidential or private information of the user through the network, such as: the password of the online bank, the research and development results of the research and development unit, etc. [0003] In order to ensure that users are not subject to infringements from spyware, the commonly used methods are: [0004] ①Install personal firewall, anti-spyware and anti-virus software ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/16H04L29/06
Inventor 郭栋梓
Owner SANGFOR TECH INC