Gateway/bridge based spy software invading-proof method
A software and bridge technology, applied in the usage of multiple keys/algorithms, electrical components, user identity/authority verification, etc., can solve problems such as latent, inability to provide effective protection for users, incorrect use or shutdown, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The specific network structure of the present invention is as figure 1 As shown, several LAN terminal users 1 are connected to INTERNET or untrusted network 3 through the gateway / bridge 2 of the present invention, and under the action of the gateway / bridge 2 of the present invention, internal confidential information is prevented from being sent out by spyware.
[0025] The gateway / network bridge 2 of the present invention communicates with the specified security terminal software installed and running on the terminal user 1 itself to realize anti-spyware infringement. The specific process is as follows figure 2 shown, including the following specific steps:
[0026] 210) start;
[0027] 220) The data that the end user 1 accesses the external network 3 reaches the gateway / bridge 2;
[0028] 230) Determine whether the terminal user 1 is running the specified security terminal software and whether the specified security terminal software executes the trusted process li...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 