CN101339596A - Method and device for protecting computer software system - Google Patents
Method and device for protecting computer software system Download PDFInfo
- Publication number
- CN101339596A CN101339596A CNA2008101467059A CN200810146705A CN101339596A CN 101339596 A CN101339596 A CN 101339596A CN A2008101467059 A CNA2008101467059 A CN A2008101467059A CN 200810146705 A CN200810146705 A CN 200810146705A CN 101339596 A CN101339596 A CN 101339596A
- Authority
- CN
- China
- Prior art keywords
- key operation
- risk
- program
- value
- threshold value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a method for protecting a computer software system and a device thereof. The method comprises: endowing risk threshold values to each key operation of the computer software system in advance; evaluating the risk value that a procedure which triggers any key operation is a vicious procedure, and when the risk value reaches the risk threshold value of the key operation, the user is asked whether the key operation is allowed; if the entering triggering of the users allowing the key operation is received, the key operation is allowed to be implemented; otherwise, the implementing of the key operation is forbidden. The device comprises a risk threshold storage module, a risk evaluation module and a user prompting module. The application of the method or the device of the embodiment of the invention can reduce the interferences to the users caused by the protecting of the computer software system.
Description
Technical field
The present invention relates to the computer security technique field, relate in particular to a kind of method and apparatus that computer software is protected.
Background technology
In order to prevent rogue program invasion computer software, need protect computer software.Wherein, rogue program is meant, destroys function or the framework or the data of computer software, the program that causes described software systems normally to move; Relative with rogue program, normal procedure can not destroy function or the framework or the data of computer software.
At present, there is a kind of key operation whether to be triggered the method that described system is protected according to computer software.Wherein, the key operation of system is meant, rogue program needs the operation of execution usually when the invasion computer software, these operations usually are the operations to the sensitive position of described system, for example, to the modification of computer software registry boot item, to the modification of specific file or specific process in the described system etc., sensitive position wherein is meant the function of described system or the bigger software module of framework influence, for example described registration table, specific file and specific process.
Whether be triggered the method that described system is protected to describe in detail to existing this key operation below according to computer software.
Fig. 1 is that whether the key operation according to computer software is triggered the method flow diagram that described system is protected in the prior art, and as shown in Figure 1, this method comprises:
Fig. 2 is the synoptic diagram that adopts method shown in Figure 1 that computer software is protected.
As shown in Figure 2, be mounted with program hook (Hook point) in the key operation module of computer software, when the key operation in this key operation module is triggered, the Hook point can be before key operation be carried out, the invoke user attention program comes pop-up window inquiry user whether to allow this key operation, if receiving the user, the user prompt program allow the affirmation of this key operation to trigger, then return the message that allows to carry out described key operation to the Hook point, otherwise, return the message of forbidding carrying out described key operation to the Hook point.If the Hook point has been received the message that allows to carry out described key operation, then key operation module is carried out corresponding key operation, if the Hook point has been received the message of forbidding carrying out described key operation, then key operation module forbids carrying out corresponding key operation, and returns from this Hook point.
As seen from the above technical solution; whether the key operation according to computer software at present is triggered in the method that described system is protected; as long as key operation is triggered; then the Hook point that is embedded in of this key operation place module will the invoke user attention program; whether the prompting user allows to carry out described key operation; and in actual applications; described key operation might not all be triggered by rogue program; often triggered by normal procedure, as long as this key operation method of promptly pointing out the user that is triggered is bigger to the interference that the user brings.
Summary of the invention
In view of this, the purpose of the embodiment of the invention is to provide a kind of method and apparatus that computer software is protected, to reduce that computer software is protected the interference that brings to the user.
For achieving the above object, the technical scheme of the embodiment of the invention specifically is achieved in that
A kind of method that computer software is protected, this method comprises:
Give risk threshold value for each key operation of computer software in advance;
The program that assessment triggers arbitrary key operation is the value-at-risk of rogue program, and when this value-at-risk reached the risk threshold value of described key operation, whether the inquiry user allowed this key operation;
Allow the affirmation of described key operation to trigger if receive the user, then allow to carry out described key operation, otherwise, forbid carrying out described key operation.
A kind of device that computer software is protected, this device comprises risk threshold value memory module, risk evaluation module and user prompt module;
Described risk threshold value memory module is used to store the risk threshold value of giving for each operation of computer software in advance;
Described risk evaluation module, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module, after receiving the permission indication that user prompt module sends, allow to carry out described key operation, receive that user prompt module sends forbid indication after, forbid carrying out described key operation;
Described user prompt module, be used to receive prompting indication from described risk evaluation module, whether the inquiry user allows the corresponding key operation of described prompting indication, when receiving that the user allows the affirmation of described key operation to trigger, send the permission indication to described risk evaluation module, when receiving that the user forbids that the affirmation of described key operation triggers, forbid indication to described risk evaluation module transmission.
As seen, in embodiments of the present invention, give risk threshold value for each key operation of computer software in advance, the program that assessment triggers described key operation is the value-at-risk of rogue program, and when this value-at-risk reached the risk threshold value of described key operation, whether the inquiry user allowed this key operation, allow the affirmation of described key operation to trigger if receive the user, then allow to carry out described key operation, otherwise, forbid carrying out described key operation.Because before the key operation whether the inquiry user allows to be triggered; it is the value-at-risk of rogue program that assessment earlier triggers the program of described key operation; only when this value-at-risk reaches the risk threshold value of giving for described key operation in advance; inquire just whether the user allows this key operation; therefore; with in the prior art as long as key operation is triggered and inquires that promptly the user compares, reduced computer software is protected the interference that brings to the user.
Description of drawings
Fig. 1 is that whether the key operation according to computer software is triggered the method flow diagram that described system is protected in the prior art;
Fig. 2 is the synoptic diagram that adopts method shown in Figure 1 that computer software is protected;
Fig. 3 is the process flow diagram of the method that computer software is protected that provides of the embodiment of the invention;
Fig. 4 is the synoptic diagram that adopts method shown in Figure 3 that computer software is protected;
Fig. 5 is first structural drawing of the device that computer software is protected that provides of the embodiment of the invention;
Fig. 6 is second structural drawing of the device that computer software is protected that provides of the embodiment of the invention.
Embodiment
In the embodiment of the invention, give risk threshold value for each key operation of computer software in advance, the program that assessment triggers described key operation is the value-at-risk of rogue program, when this value-at-risk reaches the risk threshold value of described key operation, whether the inquiry user allows this key operation, allows the affirmation of described key operation to trigger if receive the user, then allows to carry out described key operation, otherwise, forbid carrying out described key operation.
For making purpose of the present invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, the present invention is described in more detail.
Fig. 3 is the process flow diagram of the method that computer software is protected that provides of the embodiment of the invention, and as shown in Figure 3, this method comprises:
In this step, can give different risk threshold values for the different key operation of computer software, for example, for a lower risk threshold value is given in the operation of revising registration table, for specific process is given higher risk threshold value, wherein, risk threshold value is low more, shows that the program that triggers this key operation is that the probability of rogue program is big more.Also can give identical risk threshold value for described different key operation.
Risk threshold value in this step can be that computer software is given, i.e. given described risk threshold value when designing a calculating machine software systems; Described risk threshold value also can be by artificial setting.
In this step, can in the module at the key operation place of computer software, the Hook point be set,, then need to trigger earlier the Hook point, therefore,, represent that then this key operation is triggered if the Hook point has been triggered if carry out described key operation.
In this step, can judge whether the program that triggers described key operation has the feature that described rogue program is different from normal procedure, if, then should trigger the value-at-risk of the program of described key operation according to described feature evaluation, if not, the value-at-risk that then shows the program that this triggers described key operation is 0, i.e. the program of the described key operation of this triggering can not be a rogue program.
Particularly, each feature that can be in advance be different from normal procedure for the rogue program that can trigger described key operation is given the risk weights, when the program that triggers described key operation has the feature of described rogue program, risk weights according to described feature are assessed the value-at-risk that this triggers the program of described key operation, for example, the number that has the feature of described rogue program when the program that triggers described key operation is (to comprise two) more than two, the value-at-risk of the program that obtains triggering described key operation of the risk weights of described feature can being added up.The logic that also can adopt other is obtained triggering the value-at-risk of the program of described key operation by the risk weights of described feature, for example, when the program that triggers described key operation possesses certain two or more specific described feature simultaneously, after the risk weights of described certain two or more specific described feature are added up, again accumulation result be multiply by extra weights, adopt this logic be because, when the program that triggers described key operation possesses certain two or more specific described feature simultaneously, this program is that the probability of rogue program is bigger, therefore need multiply by extra weights again.
The act instantiation describes the appraisal procedure of value-at-risk below.
The feature that rogue program has usually has the shell of adding, does not beat signature, does not have version information, the company that do not produce, file attribute be for hiding, and gives weights for these features in advance, specifically sees Table one:
Feature | Add shell | Do not beat signature | No version information | No product company | File attribute is for hiding |
The risk weights | a1 | a2 | a3 | a4 | a5 |
Table one
The risk threshold value of supposing a certain key operation is b, has the shell of adding if trigger the program of this key operation, file attribute is for hiding these two features, when the logic that adds up when the risk weights that adopt described feature obtains the value-at-risk of this program, value-at-risk=the a1+a5 of this program then, if when adopting the program that triggers key operation to possess two or more special characteristics simultaneously, when the logic that again accumulation result be multiply by extra weights after the risk weights of described special characteristic are added up obtains the value-at-risk of this program, add shell and file attribute for hiding if comprise in the described special characteristic, the value-at-risk of this program=(a1+a5) * A then, wherein, A is extra weights, and the value of A is greater than 1.
Be example still, if a1+a5 〉=b represents that then the value-at-risk of this program has reached the risk threshold value of described key operation with the instantiation in the step 303.
In this step, the value-at-risk that triggers the program of described key operation can be shown or export to the user,, and then make the affirmation that whether allows this key operation and trigger so that the user understands the hazard level of described program.
Fig. 4 is the synoptic diagram that adopts method shown in Figure 3 that computer software is protected.
As shown in Figure 4, be mounted with the Hook point in the key operation module of computer software, when the key operation in this key operation module is triggered, the Hook point can be before key operation be carried out, call risk assessment procedures and assess the value-at-risk of the program that triggers described key operation, when this value-at-risk reaches in advance the risk threshold value of setting for described key operation, the invoke user attention program comes pop-up window inquiry user whether to allow this key operation, if described value-at-risk does not reach described risk threshold value, then never call described user prompt program.Wherein, when the feature that is different from normal procedure according to rogue program is assessed the value-at-risk of the program that triggers described key operation, those skilled in the art learn assess described value-at-risk according to described feature after, whether possesses described feature as long as judge the program that triggers key operation, the risk weights of the feature that this program is had according to certain logic carry out computing then, can obtain the value-at-risk of this program, and the determining program common practise that whether to have a certain described feature be those skilled in the art how.
After described user prompt program is called, if receiving the user, described user prompt program allow the affirmation of this key operation to trigger, then return the message that allows to carry out described key operation to the Hook point, otherwise, the message of forbidding carrying out described key operation returned to the Hook point.If the Hook point has been received the message that allows to carry out described key operation, then key operation module is carried out corresponding key operation, if the Hook point has been received the message of forbidding carrying out described key operation, then key operation module forbids carrying out corresponding key operation, and returns from this Hook point.
Fig. 5 is first structural drawing of the device that computer software is protected that provides of the embodiment of the invention, and as shown in Figure 5, this device comprises risk threshold value memory module 501, risk evaluation module 502 and user prompt module 503.
Risk threshold value memory module 501 is used to store the risk threshold value of giving for each operation of computer software in advance.
Fig. 6 is second structural drawing of the device that computer software is protected that provides of the embodiment of the invention.
As shown in Figure 6, this device comprises risk threshold value memory module 601, risk evaluation module 602 and user prompt module 603, and risk threshold value memory module 601 is wherein distinguished corresponding identical with the risk threshold value memory module 501 among Fig. 5 with user prompt module 503 with user prompt module 603.
Whether key operation monitoring modular 6021 is used to monitor key operation and is triggered, and when described key operation is triggered, sends the judgement indication to risk judge module 6022.
Key operation enable module 6023, be used to receive the permission indication that user prompt module 603 sends after, allow to carry out described key operation, receive that user prompt module 603 sends forbid indication after, forbid carrying out described key operation.
As seen from the above technical solution; because after key operation is triggered; before the key operation whether the inquiry user allows to be triggered; it is the value-at-risk of rogue program that assessment earlier triggers the program of described key operation; done once suspicious judgement earlier by the device assisting users that computer software is protected; only when this value-at-risk reaches the risk threshold value of giving for described key operation in advance; inquire just whether the user allows this key operation; with in the prior art as long as key operation is triggered and inquires that promptly the user compares, reduced computer software is protected the interference that brings to the user.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention, all any modifications of being made within the spirit and principles in the present invention, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (12)
1, a kind of method that computer software is protected is characterized in that, this method comprises:
Give risk threshold value for each key operation of computer software in advance;
The program that assessment triggers arbitrary key operation is the value-at-risk of rogue program, and when this value-at-risk reached the risk threshold value of described key operation, whether the inquiry user allowed this key operation;
Allow the affirmation of described key operation to trigger if receive the user, then allow to carry out described key operation, otherwise, forbid carrying out described key operation.
2, the method for claim 1 is characterized in that, the program of the described key operation of assessment triggering is that the value-at-risk of rogue program comprises:
Each feature that is different from normal procedure for the rogue program that can trigger described key operation is given the risk weights in advance;
Judge whether the program that triggers described key operation has described feature, if then assess the value-at-risk that this triggers the program of described key operation according to the risk weights of described feature.
3, method as claimed in claim 2 is characterized in that, assesses this value-at-risk that triggers the program of described key operation according to the risk weights of described feature and comprises:
If triggering the number that the program of described key operation has described feature is more than two, the add up value-at-risk of the program that obtains triggering described key operation of risk weights that then will this plural feature.
4, method as claimed in claim 2 is characterized in that, assesses this value-at-risk that triggers the program of described key operation according to the risk weights of described feature and comprises:
Have two or more specific described features if trigger the program of described key operation, then the risk weights with this two or more specific described feature add up, accumulation result be multiply by extra weights, obtain triggering the value-at-risk of the program of described key operation.
5, method as claimed in claim 2 is characterized in that, the feature that the rogue program that can trigger described key operation is different from normal procedure comprises:
Add shell, do not beat signature, do not have version information, the company that do not produce, file attribute be for hiding.
6, the method for claim 1 is characterized in that, describedly gives risk threshold value for each key operation of computer software in advance and comprises:
Give different risk threshold values for the different key operation of computer software in advance.
7, the method for claim 1 is characterized in that, describedly gives risk threshold value for each key operation of computer software in advance and comprises:
By the risk threshold value of given each key operation of computer software, perhaps by the described risk threshold value of artificial setting.
8, the method for claim 1 is characterized in that, the program that assessment triggers described key operation is before the value-at-risk of rogue program, and this method further comprises:
Whether monitor described key operation is triggered.
9, the method for claim 1 is characterized in that, whether described inquiry user allows this key operation to comprise:
The inquiry user when whether allowing this key operation, show or export described value-at-risk.
10, a kind of device that computer software is protected is characterized in that, this device comprises risk threshold value memory module, risk evaluation module and user prompt module;
Described risk threshold value memory module is used to store the risk threshold value of giving for each operation of computer software in advance;
Described risk evaluation module, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module, after receiving the permission indication that user prompt module sends, allow to carry out described key operation, receive that user prompt module sends forbid indication after, forbid carrying out described key operation;
Described user prompt module, be used to receive prompting indication from described risk evaluation module, whether the inquiry user allows the corresponding key operation of described prompting indication, when receiving that the user allows the affirmation of described key operation to trigger, send the permission indication to described risk evaluation module, when receiving that the user forbids that the affirmation of described key operation triggers, forbid indication to described risk evaluation module transmission.
11, device as claimed in claim 10 is characterized in that, described risk evaluation module comprises key operation monitoring modular, risk judge module and key operation enable module;
Whether described key operation monitoring modular is used to monitor described key operation and is triggered, and when key operation is triggered, sends the judgement indication to described risk judge module;
Described risk judge module, the program that is used for triggering described key operation according to described judgement indication assessment is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module;
Described key operation enable module, be used to receive the permission indication that user prompt module sends after, allow to carry out described key operation, receive that user prompt module sends forbid indication after, forbid carrying out described key operation.
12, device as claimed in claim 11 is characterized in that,
Described risk judge module, be used to store the rogue program that can trigger described key operation and be different from the feature of normal procedure and the corresponding relation of risk weights, according to described corresponding relation with trigger the described feature that the program of described key operation has, the program that assessment triggers described key operation is the value-at-risk of rogue program, obtain the risk threshold value of described key operation from described risk threshold value memory module, more described value-at-risk and described risk threshold value, when this value-at-risk reaches the risk threshold value of described key operation, send the prompting indication to described user prompt module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008101467059A CN101339596A (en) | 2008-08-26 | 2008-08-26 | Method and device for protecting computer software system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008101467059A CN101339596A (en) | 2008-08-26 | 2008-08-26 | Method and device for protecting computer software system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101339596A true CN101339596A (en) | 2009-01-07 |
Family
ID=40213662
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008101467059A Pending CN101339596A (en) | 2008-08-26 | 2008-08-26 | Method and device for protecting computer software system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101339596A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101984450A (en) * | 2010-12-15 | 2011-03-09 | 北京安天电子设备有限公司 | Malicious code detection method and system |
CN102576326A (en) * | 2009-10-08 | 2012-07-11 | 日本电气株式会社 | Operational surveillance device, operational surveillance method and program storage medium |
CN103177214A (en) * | 2011-12-23 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Detection method, system and communication terminal of malicious software |
CN103208039A (en) * | 2012-01-13 | 2013-07-17 | 株式会社日立制作所 | Method and device for evaluating software project risks |
CN104217155A (en) * | 2013-05-30 | 2014-12-17 | 宁夏新航信息科技有限公司 | Method and device for protecting computer software |
CN105046114A (en) * | 2015-07-14 | 2015-11-11 | 上海斐讯数据通信技术有限公司 | Method and system for preventing android application program from being hidden and intelligent terminal |
CN105404806A (en) * | 2015-12-03 | 2016-03-16 | 烟台南山学院 | Computer software protection method and apparatus |
CN105718811A (en) * | 2016-01-22 | 2016-06-29 | 中国科学院软件研究所 | User misoperation prevention system for network information system |
CN106790211A (en) * | 2017-01-06 | 2017-05-31 | 浙江中都信息技术有限公司 | A kind of Mathematical Statistical System and method for predicting malware infection |
-
2008
- 2008-08-26 CN CNA2008101467059A patent/CN101339596A/en active Pending
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102576326B (en) * | 2009-10-08 | 2015-08-19 | 日本电气株式会社 | Operation monitoring equipment, operation monitoring method and program recorded medium |
CN102576326A (en) * | 2009-10-08 | 2012-07-11 | 日本电气株式会社 | Operational surveillance device, operational surveillance method and program storage medium |
CN101984450B (en) * | 2010-12-15 | 2012-10-24 | 北京安天电子设备有限公司 | Malicious code detection method and system |
CN101984450A (en) * | 2010-12-15 | 2011-03-09 | 北京安天电子设备有限公司 | Malicious code detection method and system |
CN103177214A (en) * | 2011-12-23 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Detection method, system and communication terminal of malicious software |
CN103177214B (en) * | 2011-12-23 | 2016-02-10 | 宇龙计算机通信科技(深圳)有限公司 | The detection method of Malware, system and communication terminal |
CN103208039A (en) * | 2012-01-13 | 2013-07-17 | 株式会社日立制作所 | Method and device for evaluating software project risks |
CN104217155A (en) * | 2013-05-30 | 2014-12-17 | 宁夏新航信息科技有限公司 | Method and device for protecting computer software |
CN105046114A (en) * | 2015-07-14 | 2015-11-11 | 上海斐讯数据通信技术有限公司 | Method and system for preventing android application program from being hidden and intelligent terminal |
CN105046114B (en) * | 2015-07-14 | 2018-07-24 | 上海斐讯数据通信技术有限公司 | Prevent method, system and the intelligent terminal that android application programs are hidden |
CN105404806A (en) * | 2015-12-03 | 2016-03-16 | 烟台南山学院 | Computer software protection method and apparatus |
CN105404806B (en) * | 2015-12-03 | 2018-07-24 | 烟台南山学院 | A kind of method and apparatus that computer software is protected |
CN105718811A (en) * | 2016-01-22 | 2016-06-29 | 中国科学院软件研究所 | User misoperation prevention system for network information system |
CN106790211A (en) * | 2017-01-06 | 2017-05-31 | 浙江中都信息技术有限公司 | A kind of Mathematical Statistical System and method for predicting malware infection |
CN106790211B (en) * | 2017-01-06 | 2018-06-01 | 浙江中都信息技术有限公司 | A kind of Mathematical Statistical System and method for predicting malware infection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101339596A (en) | Method and device for protecting computer software system | |
CN101414997B (en) | Method and apparatus for preventing malevolence program from accessing network | |
CN103605924B (en) | A kind of method and device preventing rogue program attacking network from paying the page | |
CN101084504B (en) | Integrated circuit with improved device security | |
CN107623687B (en) | Anti-theft brushing method, operation detection method and device and electronic equipment | |
CN104348809A (en) | Network security monitoring method and system | |
US20080035725A1 (en) | Method to use cell phone location to authenticate or enable/disable authorization of credit cards | |
CN107508831B (en) | Bus-based intrusion detection method | |
US20180359274A1 (en) | Systems and methods for providing a notification of a cyber attack in a security system | |
CN103888282A (en) | Network intrusion alarm method and system based on nuclear power plant | |
CN107368760A (en) | A kind of electronic equipment condition processing method and device | |
CN107038391A (en) | Method and apparatus for protecting data integrity by embedded system | |
EP3172692A1 (en) | Remedial action for release of threat data | |
US20090328238A1 (en) | Disabling encrypted data | |
Hamad et al. | Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System. | |
CN111259382A (en) | Malicious behavior identification method, device and system and storage medium | |
CN103595731A (en) | System and method for protecting account security | |
CN106203119B (en) | Hide processing method, device and the electronic equipment of cursor | |
CN111488576B (en) | Method and system for protecting tampering of home page, electronic equipment and storage medium | |
CN105939321A (en) | DNS (Domain Name System) attack detection method and device | |
US11790091B2 (en) | Monitoring information-security coverage to identify an exploitable weakness in the information-securing coverage | |
US10623444B2 (en) | Apparatus and method for analysis of binary targets to generate security policy | |
CN110784475A (en) | Security defense method and device | |
CN104917737A (en) | User account protection method and device | |
CN104331406A (en) | Database capacity control method and database capacity control device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20090107 |