Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for blocking harmful information online, and computer readable medium therefor

a technology of harmful information and computer network, applied in the field of computer security systems, can solve the problems of increasing the concern about the highly possible illegal extraction of personal information or damage caused by a variety of computer viruses through computer networks, and the internet no longer, and the damage caused by harmful information such as computer viruses can be serious

Inactive Publication Date: 2011-03-01
CAP CO LTD
View PDF27 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This solution enables active, real-time blocking of harmful information without manual intervention, providing continuous protection and facilitating the collection of statistical data for improved antivirus program development, thus preventing damage and ensuring up-to-date security for user computers.

Problems solved by technology

Now, the Internet is no longer a new technology and service field in virtual space, but is getting into the realities of life.
On the other hand, as computer and Internet related technologies have grown, concerns about highly possible illegal extraction of personal information or damage caused by a variety of computer viruses through computer networks are also quickly increasing.
The damage caused by harmful information such as computer viruses can be serious.
For example, the Chernobyl (CIH) virus, which is a high-risk computer virus, corrupted all of the data on a hard disk, and caused tremendous damage in the world including Korea.
Recently, new harmful information such as the Back Orifice virus, or the School Bus virus which implants a “spy” file capable of remote controlling a computer, into computers along with other computer viruses, to thereby illegally extract personal information from the computers, has been introduced onto the Internet.
Another disadvantage found in the protection policy lies in that a variety of antivirus programs for protecting against harmful information need to be manually installed on individual personal computers, which is an inefficient process overloading computer users with the installation activity.
Furthermore, since various harmful information is created and distributed ever quickly through the Internet, it is not easy to consistently equip computers with the latest releases of antivirus programs.
Thus, if new harmful information, such as new species of computer virus, against which appropriate antivirus programs have not been developed yet, infiltrates a user computer, it is inevitable that the computer system is damaged by the new computer virus, or personal information is illegally drawn out of the computer system.
In addition, a user must visit harmful information related service providers, or online communications companies to get the latest version of the antivirus program whenever an unidentified computer virus is discovered.
Furthermore, downloading the latest version of the antivirus program is followed by manual installation, which is an unnecessary labor-intensive task.
The existing counterplan for protecting user computers from harmful information provides no communication channel for effectively reporting occurrences of harmful information or damage caused by the harmful information to the harmful information related service providers, so that statistical data on distribution of harmful information and damage caused by the harmful information, and the systematic data analysis thereof are not available to the harmful information related service providers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for blocking harmful information online, and computer readable medium therefor
  • System and method for blocking harmful information online, and computer readable medium therefor
  • System and method for blocking harmful information online, and computer readable medium therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]As shown in FIG. 1A, which illustrates a system applicable to implement a preferred embodiment of the invention, a harmful information management server 110, which is a web server, has a homepage, and is linked with a client computer 130 via a computer network, such as the Internet.

[0029]The harmful information management server 110 provides an online service for providing a harmful information blocking code module, which is capable of blocking in real time harmful information, to the client computer130. The term “harmful information” collectively refers to an undesirable object or action that adversely effects computer systems and / or computer networks, including computer viruses, undesirable lascivious web sites on the Internet, and the act of illegally extracting personal information.

[0030]The operation of the system shown in FIG. 1A is illustrated in FIG. 2A. A first embodiment of a method for blocking harmful information online according to the present invention will be de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method are provided for diagnosing, remedying and blocking harmful information including computer viruses online over a computer network via which a web server and a client are linked to each other. The method includes, on a computer network through which a web server and a client system are linked to each other, the web server receiving a connection request from the client system over the computer network. Then, the web server transmits a harmful information blocking code module to the client system. Once the transmission of the harmful information blocking code module is completed the harmful information blocking code module automatically runs on the client system to block in real time harmful information including computer viruses. The harmful information blocking code module is automatically transmitted to and installed in the client system only by online connecting to the harmful information management server, so that the harmful information detected on the client system can be actively blocked in real time without requiring a manual installation process.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation of PCT / KR00 / 01374, filed Nov. 28, 2000, which was published in the English language on Jul. 12, 2002 under Publication No. WO 01 / 50344, and the disclosure of which is incorporated herein by reference.BACKGROUND OF THE INVENTION[0002]The present invention relates to computer security systems, and more particularly, to a system and method for diagnosing, remedying and blocking harmful information including computer viruses online over a computer network via which a client is linked to a web server.[0003]With the development of computer network based technologies, and lo particularly, the World Wide Web (“the Web”) technology, the number of users on computer networks, and particularly, on the Internet, is rapidly expanding. Now, the Internet is no longer a new technology and service field in virtual space, but is getting into the realities of life. An ever-growing number of businesses, for example, shopping...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F15/16G06F21/22G06F11/00G06F13/00G06F15/177G06F17/30G06F21/00
CPCG06F21/566G06F21/56G06F15/16
Inventor JUNG, YEON-SUB
Owner CAP CO LTD