CN109063476A - A kind of computer system to ensure information security - Google Patents
A kind of computer system to ensure information security Download PDFInfo
- Publication number
- CN109063476A CN109063476A CN201810769303.8A CN201810769303A CN109063476A CN 109063476 A CN109063476 A CN 109063476A CN 201810769303 A CN201810769303 A CN 201810769303A CN 109063476 A CN109063476 A CN 109063476A
- Authority
- CN
- China
- Prior art keywords
- module
- virus
- unit
- resistance
- computer system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a kind of computer systems to ensure information security, including central processing unit, login authentication module, memory module, risk evaluation module, internet worm scan module and viral isolation module, central processing unit is separately connected login authentication module, memory module, risk evaluation module, internet worm scan module, viral isolation module, alarm module, database module, hard disk power-supply controller of electric and monitoring unit, central processing unit connects background monitoring server by wireless transmission unit, it is safe that the present invention can effectively ensure that computer uses, prevent leaking data and internet worm from invading, the information security of user is effectively guaranteed.
Description
Technical field
The present invention relates to field of computer technology, specially a kind of computer system to ensure information security.
Background technique
Information security mainly includes the content of following five aspect, i.e., need to guarantee the confidentiality of information, authenticity, integrality,
The safety of unauthorised copies and institute's parasitic system.The range that information security itself includes is very big, wherein includes how prevention quotient
Leakage etc. of the teenager to the browsing, personal information of flame is taken precautions against in the leakage of industry enterprise secret.Information peace under network environment
Entirety system is the key that ensure information security, including computer security operating system, various security protocols, security mechanism are (digital
Signature, message authentication, data encryption etc.), information security refers to information system (including hardware, software, data, people, physical environment
And its infrastructure) be protected, not by the reason of accidental or malice and by destroy, change, reveal, system continuously may be used
By normally running, information service do not interrupt, finally realize business continuance.
Current computer system is encrypted by simple encryption system, and cipher round results are poor, can not effectively really
Protect the safety of user information.
Summary of the invention
The purpose of the present invention is to provide a kind of computer systems to ensure information security, to solve in above-mentioned background technique
The problem of proposition.
To achieve the above object, the invention provides the following technical scheme: a kind of computer system to ensure information security, packet
Include central processing unit, login authentication module, memory module, risk evaluation module, internet worm scan module and viral isolation mode
Block, the central processing unit be separately connected login authentication module, memory module, risk evaluation module, internet worm scan module,
Viral isolation module, alarm module, database module, hard disk power-supply controller of electric and monitoring unit, the central processing unit pass through
Wireless transmission unit connects background monitoring server;The monitoring unit includes mobile memory medium monitoring module, file operation
Monitoring module, Network Data Control module and internal detection module.
Preferably, the login authentication module includes that face characteristic recognition unit, fingerprint identification unit and Password Input are tested
Demonstrate,prove unit.
It preferably, further include encryption unit, the encryption unit connects memory module, and the encrypting module includes encryption core
Piece, the end VPP of the encryption chip are separately connected the end VCC, the one end resistance A, the one end capacitor A, the end SDA point of the encryption chip
Not Lian Jie the resistance A other end, the one end resistance B, the resistance B other end is grounded by capacitor B, the end the GND ground connection of the encryption chip,
The end SCL is separately connected the one end resistance C, the one end resistance E, and the resistance E other end is grounded by capacitor C, and the resistance C other end connects resistance
The one end D, the resistance D other end connect power end.
Preferably, the wireless transmission unit uses the monolithic wireless transceiver chip of model nRF24L01.
Preferably, the viral isolation module detection partition method is as follows;
A, virus characteristic library, the corresponding one or more Virus Infos of each virus characteristic are created;
B, after parsing collected network data package-restructuring, using the disease in multi-pattern matching algorithm and virus characteristic library
Malicious feature is matched, and when being matched to a virus characteristic, in conjunction with the virus characteristic being matched to, judges whether to form
One or more complete Virus Info, if it is then otherwise Virus Info successful match waits be matched to next time new
Continue to judge after virus characteristic;
C, collected Virus Info is saved into off-limit file folder.
Preferably, application method the following steps are included:
A, user separately verifies face characteristic information, finger print information and the login of user by login authentication module first
Password, three kinds of verification modes then enter computer system after passing through simultaneously;
B, in computer system use process, internet worm scan module is in real time scanned computer network, simultaneously
Monitoring unit monitors computer in real time;
C, once collect internet worm signal, internet worm is identified first, if it is possible to identify, then carry out every
From simultaneously killing, if cannot identify, starts hard disk power-supply controller of electric and close hard disk, and unidentified internet worm is temporarily stored into disease
Malicious isolation module, is assessed by risk evaluation module, and issues alarm signal, by being confirmed from the background;
D, in user's use process, the use state information of computer passes through wireless transmission unit in real time and is sent to backstage prison
Control server.
Compared with prior art, the beneficial effects of the present invention are:
(1) it is safe can effectively to ensure that computer uses by the present invention, prevents leaking data and internet worm from invading, effectively
The information security that ensure that user.
(2) the encryption unit performance that the present invention uses is stablized, strong antijamming capability, and can prevent encryption chip from number occur
According to fault, it is ensured that the cryptographic security of hard disc data.
(3) the viral isolation module detection partition method that the present invention uses can handle a virus and contain a plurality of virus spy
The case where sign, is suitble to use in a high-speed network, and detection efficiency is high.
Detailed description of the invention
Fig. 1 is present system functional block diagram;
Fig. 2 is encryption unit schematic diagram of the present invention;
Fig. 3 is flow chart of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1-3 is please referred to, the present invention provides a kind of technical solution: a kind of computer system to ensure information security, including
Central processing unit 1, login authentication module 2, memory module 3, risk evaluation module 4, internet worm scan module 5 and virus isolation
Module 6, the central processing unit 1 are separately connected login authentication module 2, memory module 3, risk evaluation module 4, internet worm and sweep
Module 5, viral isolation module 6, alarm module 7, database module 8, hard disk power-supply controller of electric 9 and monitoring unit 10 are retouched, is logged in
Authentication module 2 includes face characteristic recognition unit 17, fingerprint identification unit 18 and Password Input authentication unit 19;The centre
It manages device 1 and background monitoring server 12 is connected by wireless transmission unit 11;The monitoring unit 10 is supervised including mobile memory medium
Control module 13, file operation monitoring module 14, Network Data Control module 15 and internal detection module 16;Wherein, it is wirelessly transferred
Unit 11 uses the monolithic wireless transceiver chip of model nRF24L01.
It further include encryption unit 20 in the present invention, the encryption unit 20 connects memory module 3, and encrypting module 720 includes
Encryption chip 21, the end VPP of encryption chip 21 are separately connected the end VCC, the one end resistance A1a, the one end capacitor A1b, the encryption core
The end SDA of piece 21 is separately connected the resistance A1a other end, the one end resistance B2a, and the resistance B2a other end is grounded by capacitor B2b, institute
The end the GND ground connection of encryption chip 21 is stated, the end SCL is separately connected the one end resistance C3a, the one end resistance E5a, and the resistance E5a other end is logical
Capacitor C3b ground connection is crossed, the resistance C3a other end connects the one end resistance D4a, and the resistance D4a other end connects power end;Encryption chip 21
Model uses ALPU-C-10B or ALPU-C-139.The encryption unit performance that the present invention uses is stablized, strong antijamming capability, and energy
Enough prevent encryption chip from error in data failure occur, it is ensured that the cryptographic security of hard disc data.
In the present invention, viral isolation module detection partition method is as follows;
A, virus characteristic library, the corresponding one or more Virus Infos of each virus characteristic are created;
B, after parsing collected network data package-restructuring, using the disease in multi-pattern matching algorithm and virus characteristic library
Malicious feature is matched, and when being matched to a virus characteristic, in conjunction with the virus characteristic being matched to, judges whether to form
One or more complete Virus Info, if it is then otherwise Virus Info successful match waits be matched to next time new
Continue to judge after virus characteristic;
C, collected Virus Info is saved into off-limit file folder.
The viral isolation module detection partition method that the present invention uses can handle a virus and contain a plurality of virus characteristic
The case where, it is suitble to use in a high-speed network, detection efficiency is high.
In the present invention, a kind of application method of the computer system to ensure information security the following steps are included:
A, user separately verifies face characteristic information, finger print information and the login of user by login authentication module first
Password, three kinds of verification modes then enter computer system after passing through simultaneously;
B, in computer system use process, internet worm scan module is in real time scanned computer network, simultaneously
Monitoring unit monitors computer in real time;
C, once collect internet worm signal, internet worm is identified first, if it is possible to identify, then carry out every
From simultaneously killing, if cannot identify, starts hard disk power-supply controller of electric and close hard disk, and unidentified internet worm is temporarily stored into disease
Malicious isolation module, is assessed by risk evaluation module, and issues alarm signal, by being confirmed from the background;
D, in user's use process, the use state information of computer passes through wireless transmission unit in real time and is sent to backstage prison
Control server.
In conclusion the present invention can effectively ensure that computer using safe, prevents leaking data and internet worm from invading
Enter, the information security of user is effectively guaranteed.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (6)
1. a kind of computer system to ensure information security, it is characterised in that: including central processing unit (1), login authentication module
(2), memory module (3), risk evaluation module (4), internet worm scan module (5) and viral isolation module (6), the center
Processor (1) is separately connected login authentication module (2), memory module (3), risk evaluation module (4), internet worm scan module
(5), viral isolation module (6), alarm module (7), database module (8), hard disk power-supply controller of electric (9) and monitoring unit
(10), the central processing unit (1) passes through wireless transmission unit (11) connection background monitoring server (12);The monitoring unit
(10) include mobile memory medium monitoring module (13), file operation monitoring module (14), Network Data Control module (15) and
Internal detection module (16).
2. a kind of computer system to ensure information security according to claim 1, it is characterised in that: the login authentication
Module (2) includes face characteristic recognition unit (17), fingerprint identification unit (18) and Password Input authentication unit (19).
3. a kind of computer system to ensure information security according to claim 1, it is characterised in that: further include that encryption is single
First (20), the encryption unit (20) connect memory module (3), and the encryption unit (20) includes encryption chip (21), described
The end VPP of encryption chip (21) is separately connected the end VCC, the one end resistance A (1a), the one end capacitor A (1b), the encryption chip (21)
The end SDA be separately connected resistance A (1a) other end, the one end resistance B (2a), resistance B (2a) other end is connect by capacitor B (2b)
Ground, the end the GND ground connection of the encryption chip (21), the end SCL is separately connected the one end resistance C (3a), the one end resistance E (5a), resistance E
(5a) other end is grounded by capacitor C (3b), and resistance C (3a) other end connects the one end resistance D (4a), resistance D (4a) other end
Connect power end.
4. a kind of computer system to ensure information security according to claim 1, it is characterised in that: the wireless transmission
Unit (11) uses the monolithic wireless transceiver chip of model nRF24L01.
5. a kind of computer system to ensure information security according to claim 1, it is characterised in that: the virus isolation
It is as follows that module detects partition method;
A, virus characteristic library, the corresponding one or more Virus Infos of each virus characteristic are created;
B, special using the virus in multi-pattern matching algorithm and virus characteristic library after parsing collected network data package-restructuring
Sign is matched, and when being matched to a virus characteristic, in conjunction with the virus characteristic being matched to, judges whether that one can be formed
Or a plurality of complete Virus Info, if it is then otherwise Virus Info successful match waits be matched to new virus next time
Continue to judge after feature;
C, collected Virus Info is saved into off-limit file folder.
6. realizing a kind of application method of the computer system to ensure information security described in claim 1, it is characterised in that: its
Application method the following steps are included:
A, user separately verifies the face characteristic information of user, finger print information by login authentication module and logs in close first
Code, three kinds of verification modes then enter computer system after passing through simultaneously;
B, in computer system use process, internet worm scan module is in real time scanned computer network, monitors simultaneously
Unit monitors computer in real time;
C, once collecting internet worm signal, internet worm is identified first, if it is possible to identify, be then isolated simultaneously
Killing, if cannot identify, start hard disk power-supply controller of electric close hard disk, and by unidentified internet worm be temporarily stored into virus every
It from module, is assessed by risk evaluation module, and issues alarm signal, by being confirmed from the background;
D, in user's use process, the use state information of computer passes through wireless transmission unit in real time and is sent to background monitoring clothes
Business device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810769303.8A CN109063476A (en) | 2018-07-13 | 2018-07-13 | A kind of computer system to ensure information security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810769303.8A CN109063476A (en) | 2018-07-13 | 2018-07-13 | A kind of computer system to ensure information security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109063476A true CN109063476A (en) | 2018-12-21 |
Family
ID=64816450
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810769303.8A Withdrawn CN109063476A (en) | 2018-07-13 | 2018-07-13 | A kind of computer system to ensure information security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109063476A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109922045A (en) * | 2019-01-30 | 2019-06-21 | 赵东升 | A kind of control method of information processing unit |
CN110489956A (en) * | 2019-08-26 | 2019-11-22 | 顺德职业技术学院 | A kind of security protection method and system of computer data |
CN111241542A (en) * | 2020-01-03 | 2020-06-05 | 广州集韵信息科技有限公司 | Novel computer cloud security service platform all-in-one |
CN111414593A (en) * | 2020-03-17 | 2020-07-14 | 林家豪 | Computer information protection method based on mobile internet |
CN112328998A (en) * | 2020-11-30 | 2021-02-05 | 扬州大自然网络信息有限公司 | Computer information security monitoring method |
CN112381557A (en) * | 2020-12-08 | 2021-02-19 | 集商网络科技(上海)有限公司 | Information management service system for background |
CN112487383A (en) * | 2020-11-17 | 2021-03-12 | 重庆第二师范学院 | Computer system for ensuring information safety and control method thereof |
CN112507269A (en) * | 2020-12-10 | 2021-03-16 | 中国农业科学院农业信息研究所 | Website background risk assessment system |
CN113821774A (en) * | 2021-09-07 | 2021-12-21 | 安徽继远软件有限公司 | Terminal security risk module matching and verifying system |
CN114283566A (en) * | 2021-12-31 | 2022-04-05 | 重庆特斯联智慧科技股份有限公司 | Be used for all-round intelligent safety early warning equipment of garden energizing platform |
CN116089961A (en) * | 2023-02-14 | 2023-05-09 | 哈尔滨晨亿科技有限公司 | Big data-based computer intelligent image management system and method |
CN116151755A (en) * | 2022-11-18 | 2023-05-23 | 深圳市东宝信息技术有限公司 | Personnel information intelligent evaluation analysis system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104243486A (en) * | 2014-09-28 | 2014-12-24 | 中国联合网络通信集团有限公司 | Virus detection method and system |
CN105787324A (en) * | 2016-02-03 | 2016-07-20 | 周口师范学院 | Computer information security system |
CN106951794A (en) * | 2017-04-28 | 2017-07-14 | 成都布林特信息技术有限公司 | A kind of network data encryption device |
CN107527280A (en) * | 2017-10-12 | 2017-12-29 | 北京军秀咨询有限公司 | A kind of financial data processing method based on cloud computing |
CN107766715A (en) * | 2017-11-24 | 2018-03-06 | 天津中德应用技术大学 | The shared security protection system of finance |
CN107944302A (en) * | 2017-11-29 | 2018-04-20 | 滁州市华晨软件科技有限公司 | A kind of security of computer software guard system |
-
2018
- 2018-07-13 CN CN201810769303.8A patent/CN109063476A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104243486A (en) * | 2014-09-28 | 2014-12-24 | 中国联合网络通信集团有限公司 | Virus detection method and system |
CN105787324A (en) * | 2016-02-03 | 2016-07-20 | 周口师范学院 | Computer information security system |
CN106951794A (en) * | 2017-04-28 | 2017-07-14 | 成都布林特信息技术有限公司 | A kind of network data encryption device |
CN107527280A (en) * | 2017-10-12 | 2017-12-29 | 北京军秀咨询有限公司 | A kind of financial data processing method based on cloud computing |
CN107766715A (en) * | 2017-11-24 | 2018-03-06 | 天津中德应用技术大学 | The shared security protection system of finance |
CN107944302A (en) * | 2017-11-29 | 2018-04-20 | 滁州市华晨软件科技有限公司 | A kind of security of computer software guard system |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109922045B (en) * | 2019-01-30 | 2021-07-02 | 赵东升 | Control method of information processing device |
CN109922045A (en) * | 2019-01-30 | 2019-06-21 | 赵东升 | A kind of control method of information processing unit |
CN110489956A (en) * | 2019-08-26 | 2019-11-22 | 顺德职业技术学院 | A kind of security protection method and system of computer data |
CN111241542A (en) * | 2020-01-03 | 2020-06-05 | 广州集韵信息科技有限公司 | Novel computer cloud security service platform all-in-one |
CN111414593A (en) * | 2020-03-17 | 2020-07-14 | 林家豪 | Computer information protection method based on mobile internet |
CN112487383B (en) * | 2020-11-17 | 2023-08-08 | 重庆第二师范学院 | Computer system for guaranteeing information security and control method thereof |
CN112487383A (en) * | 2020-11-17 | 2021-03-12 | 重庆第二师范学院 | Computer system for ensuring information safety and control method thereof |
CN112328998A (en) * | 2020-11-30 | 2021-02-05 | 扬州大自然网络信息有限公司 | Computer information security monitoring method |
CN112381557A (en) * | 2020-12-08 | 2021-02-19 | 集商网络科技(上海)有限公司 | Information management service system for background |
CN112507269A (en) * | 2020-12-10 | 2021-03-16 | 中国农业科学院农业信息研究所 | Website background risk assessment system |
CN112507269B (en) * | 2020-12-10 | 2023-08-08 | 中国农业科学院农业信息研究所 | Website background risk assessment system |
CN113821774A (en) * | 2021-09-07 | 2021-12-21 | 安徽继远软件有限公司 | Terminal security risk module matching and verifying system |
CN114283566A (en) * | 2021-12-31 | 2022-04-05 | 重庆特斯联智慧科技股份有限公司 | Be used for all-round intelligent safety early warning equipment of garden energizing platform |
CN114283566B (en) * | 2021-12-31 | 2024-04-05 | 重庆特斯联智慧科技股份有限公司 | Be used for all-round intelligent safety precaution equipment of garden enabling platform |
CN116151755A (en) * | 2022-11-18 | 2023-05-23 | 深圳市东宝信息技术有限公司 | Personnel information intelligent evaluation analysis system |
CN116151755B (en) * | 2022-11-18 | 2024-02-02 | 深圳市东宝信息技术有限公司 | Personnel information intelligent evaluation analysis system |
CN116089961A (en) * | 2023-02-14 | 2023-05-09 | 哈尔滨晨亿科技有限公司 | Big data-based computer intelligent image management system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109063476A (en) | A kind of computer system to ensure information security | |
US8566934B2 (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
US9064114B2 (en) | Method and device for scanning data for signatures prior to storage in a storage device | |
Ou et al. | The design and implementation of host-based intrusion detection system | |
KR101377014B1 (en) | System and Method of Malware Diagnosis Mechanism Based on Immune Database | |
CN112217835B (en) | Message data processing method and device, server and terminal equipment | |
US20090064326A1 (en) | Method and a system for advanced content security in computer networks | |
US20070198420A1 (en) | Method and a system for outbound content security in computer networks | |
US20090220088A1 (en) | Autonomic defense for protecting data when data tampering is detected | |
JP2008541273A5 (en) | ||
CN112487383A (en) | Computer system for ensuring information safety and control method thereof | |
CN108881298A (en) | A kind of network safety system and implementation method based on big data platform | |
CN102316449A (en) | Security terminal system and authentication and interruption method thereof | |
Ali et al. | Data loss prevention by using MRSH-v2 algorithm | |
CN108710793A (en) | A kind of computer network means of defence and system | |
CN112637172A (en) | Novel data security and confidentiality method | |
CN111898167A (en) | External terminal protection equipment and protection system including identity information verification | |
KR101872605B1 (en) | Network recovery system in advanced persistent threat | |
CN113704061A (en) | Secret-related computer protection system | |
TWI656454B (en) | Method and system for preventing password file leakage detection | |
KR101153115B1 (en) | Method, server and device for detecting hacking tools | |
CN111898105A (en) | External terminal protection equipment with user tracing function and protection system | |
CN110059469A (en) | A kind of safe U disc system and its application method | |
US20230254308A1 (en) | Real-time analysis plugin for cyber defense | |
Oujezsky et al. | Data Backup System with Integrated Active Protection Against Ransomware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181221 |
|
WW01 | Invention patent application withdrawn after publication |