CN106446684A - Network account protection method and system based on password control - Google Patents
Network account protection method and system based on password control Download PDFInfo
- Publication number
- CN106446684A CN106446684A CN201610841169.9A CN201610841169A CN106446684A CN 106446684 A CN106446684 A CN 106446684A CN 201610841169 A CN201610841169 A CN 201610841169A CN 106446684 A CN106446684 A CN 106446684A
- Authority
- CN
- China
- Prior art keywords
- module
- modules
- application program
- normal
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a network account protection method and system based on a cryptographic control and relates to the field of network account protection. The method includes the following steps: obtaining all normal modules that need to be loaded when a live streaming application program is running safely; storing the all normal modules to form a whitelist list; obtaining all loaded modules at regular time when the live streaming application program is running; in the all modules, filtering all normal modules in the whitelist list to obtain remaining modules other than the modules in the whitelist list; determining whether each remaining module is a hook program or not; if so, confirming that the current module is an abnormal module, otherwise, the current module is a normal module. The invention can detect whether the running of the live streaming application program is safe or not at regular time, the account theft rate of the live streaming application program is significantly reduced, and the security of the live streaming application program used by an anchor is thus guaranteed.
Description
Technical field
The present invention relates to network account protection field is and in particular to a kind of network account guard method based on password control
And system.
Background technology
At present, live platform can be a kind of live for main broadcaster in the upper offer of PC (personal computer, personal computer)
Software (application program), this software is used for gathering main broadcaster's video content and carrying out live.When main broadcaster uses this software, need defeated
Enter itself unique account and corresponding password is logged in.
At present, the operating system program of PC generally uses Windows, and Windows provides a kind of Hook Mechanism, wherein
Including keyboard hook program, this program can be prior to getting all of keyboard operation before application program.Therefore, if using straight
Broadcast the keyboard hook program that opens in the case of " ignorant " while application program, then the publisher of hook program
Know the account of main broadcaster and the password using current PC computer.
Therefore, often there is the risk of steal-number in the existing live application program being installed on PC when using, main broadcaster makes
It is difficult to ensure with safety.
Content of the invention
For defect present in prior art, present invention solves the technical problem that being:Detect that live application program runs
When the abnormal module that loads.The present invention can regularly detect that live application program runs whether safety, significantly reduce live should
Usurp rate with the account of program it is ensured that main broadcaster uses the safety of live application program.
For reaching object above, the network account guard method based on password control that the present invention provides, walk including following
Suddenly:
S1:Obtain all normal module needing during live safety operation of applied program to load, all normal modules are protected
Deposit formation white list list, go to S2;
S2:All modules that timing acquisition live application program loads when running, go to S3;
S3:In described all modules, after filtering out all normal module in white list list, obtain arranging except white list
Remaining module outside module in table, goes to S4;
S4:Judge whether each remaining module is hook program respectively, if so, determine that current block is abnormal module, turn
To S5;Otherwise determine that current block is normal module, goes to S5;
S5:Judge whether current live application program runs to finish, if so, terminate, otherwise continue executing with S2.
The network account protection system based on password control realizing said method that the present invention provides, including white list row
Table acquisition module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module;
White list list acquisition module is used for:Obtain all normal modes needing during live safety operation of applied program to load
Block, all normal modules is preserved and forms white list list, send timing detection signal to timing detection module;
Timing detection module is used for:After receiving timing detection signal, timing acquisition live application program loads when running
All modules, send abnormal trap signal to abnormal filtering module;
Abnormal filtering module is used for:After receiving abnormal trap signal, in described all modules, filter out white list list
In all normal module after, obtain the remaining module in addition to the module in white list list, send to abnormal investigation module
Abnormal investigation signal;
Abnormal investigation module is used for:After receiving abnormal investigation signal, judge whether each remaining module is hook journey respectively
Sequence, if so, determines that current block is abnormal module, monitors letter to program use state monitoring module router use state
Number;Otherwise determine that current block is normal module, to program use state monitoring module router use state monitoring signal;
Program use state monitoring module is used for:After receiving program use state monitoring signal, judge timing detection module
Whether the live application program of detection runs and finishes, and if so, terminates, and otherwise sends timing detection signal to timing detection module.
Compared with prior art, it is an advantage of the current invention that:
The present invention understands all modules loading when the live application program of timing acquisition runs, after filtering safe module, to surplus
Each remaining module carries out detecting whether there is hook program, if so, then proves that this module is abnormal module.Therefore, with existing
The live application program that there is steal-number risk in technology is compared, and whether the present invention can regularly detect that live application program runs and pacify
Entirely, the account significantly reducing live application program usurps rate it is ensured that main broadcaster uses the safety of live application program.
Brief description
Fig. 1 is the flow chart of the network account guard method in the embodiment of the present invention based on password control.
Specific embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.
Network account guard method based on password control shown in Figure 1, in the embodiment of the present invention, walks including following
Suddenly:
S1:Obtain all normal module needing during live safety operation of applied program to load, all normal modules are protected
Deposit formation white list list, go to S2.
In S1, during live safety operation of applied program, the acquisition flow process of all normal module that needs load is:Safety in advance
One PC of certification, runs live application program on this PC, obtains all modules that live application program loads, as normal mode
Block (module that live application program loads when running on the PC of safety, certain normal module needing to load).
S2:Add when being run by the live application program of Windows api function EnumProcessModules timing acquisition
The all modules carrying, go to S3.
S3:In all modules that S2 obtains, filter out all normal module in white list list, obtain except white list
Remaining module outside module in list, go to S4 to be detected further.
S4:Judge whether each remaining module is hook program respectively, if so, determine that current block is abnormal module, send out
Go to S5 after going out alarm (for example prompting the user whether to carry out checking and killing virus etc.), otherwise determine that current block is normal module, directly
It is switched to S5.Because hook program inherently uses the function in Windows module User32.dll
SetWindowsHookEx, the therefore present invention pass through the remaining module of detection whether using to function SetWindowsHookEx, if
It is then to prove that current block is abnormal module, otherwise prove that current block is normal module.
S5:Judge whether current live application program runs to finish, if so, terminate, otherwise continue executing with S2.
The idiographic flow obtaining all modules loading when live application program runs in S2 is:
S201:Obtain the handle hProcess of process corresponding with live application program:
HANDLE hProcess=GetCurrentProcess ();
Wherein GetCurrentProcess represents the acquisition process handle API of Windows offer.
S202:According to the handle of process in S201, obtain the handle of all modules of this process loading
EnumProcessModules:
EnumProcessModules(
HANDLE hProcess,
HMODULE*lphModule,
DWORD cb,
LPDWORD lpcbNeeded);
Wherein parameter hProcess inserts the handle of the process obtaining in S201, and parameter lphModule represents and is used for preserving
The module handle list getting, parameter cb represents the number of handles that lphModule can deposit;Parameter lpcbNeeded represents
The actual number of handles getting.
S203:The corresponding module title of each handle is obtained by GetModuleFileNameEx:
GetModuleFileNameEx(
HANDLE hProcess,
HMODULE hModule,
LPTSTR lpFilename,
DWORD nSize);
Wherein parameter hProcess is identical with S202, and parameter hModule inserts the handle of all modules obtaining in S202,
Parameter lpFilename represents the corresponding module title of each handle, and parameter nSize represents the space size of lpFilename.
Detect in S4 that whether remaining module using the principle to function SetWindowsHookEx is:One module of detection makes
When using which function, need to read the importing table of this module, the function that this module that is stored with importing table uses.In this base
On plinth, whether the remaining module of detection using the idiographic flow to function SetWindowsHookEx is:
S401:Handle (hMoudle) according to remaining module, obtains the DOS head (DosHeader) of current residual module,
Obtain the NT head (NtHeader) of current residual module according to DOS head:
PIMAGE_DOS_HEADER pDosHeader=(PIMAGE_DOS_HEADER) hMoudle;
PIMAGE_NT_HEADERS pNtHeader=(PIMAGE_NT_HEADERS) (hMoudle+pDosHeader->
e_lfanew).
S402:Determine the importing table index (MAGE_DIRECTORY_ENTRY_IMPORT) of current residual module, according to this
Index obtains the importing table of current residual module;Determine that this importing table is initial with respect to the current residual module deposited in NT head
The skew (dwIat) of memory address:
DWORD=pNtHeader->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_
IMP ORT].VirtualAddress.
S403:The current memory address (pImport) importing table is determined according to dwIat:
PIMAGE_IMPORT_DESCRIPTOR pImport=(PIMAGE_IMPORT_DESCRIPTOR) (hMoudle+
dwIat).
S404:Obtain, in importing table, the function used that current residual module uses, judge to whether there is in all functions
Function SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as
Front module is not using to function SetWindowsHookEx.
The network account protection system based on password control realizing said method that the present invention provides, including white list row
Table acquisition module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module.
White list list acquisition module is used for:Obtain all normal modes needing during live safety operation of applied program to load
(one PC of advanced security authentication, runs live application program on this PC to block, obtains all moulds that live application program loads
Block), all normal modules are preserved and forms white list list, send timing detection signal to timing detection module.
Timing detection module is used for:After receiving timing detection signal, timing acquisition live application program loads when running
All modules (obtain the handle of process corresponding with live application program;According to the handle of described process, obtain the loading of this process
The handle of all modules;Obtain the corresponding module title of each handle), send abnormal trap signal to abnormal filtering module.
Abnormal filtering module is used for:After receiving abnormal trap signal, in described all modules, filter out white list list
In all normal module after, obtain the remaining module in addition to the module in white list list, send to abnormal investigation module
Abnormal investigation signal.
Abnormal investigation module is used for:After receiving abnormal investigation signal, judge whether each remaining module is hook journey respectively
Sequence (whether using to function SetWindowsHookEx), if so, determines that current block is abnormal module, sends the backward journey of alarm
Sequence use state monitoring module router use state monitoring signal;Otherwise determine that current block is normal module, to program
Use state monitoring module router use state monitoring signal;Idiographic flow is:
According to the handle of remaining module, obtain the DOS head of current residual module, current residual module is obtained according to DOS head
NT head, deposit the initial memory address of current residual module in NT head;Determine the importing table index of current residual module, root
Obtain the importing table of current residual module according to this index;Determine the initial memory address that this importing table is with respect to current residual module
Skew;
According to importing the skew that table is with respect to the initial memory address of current residual module, determine the current internal memory importing table
Address;Obtain, in importing table, the function used that current residual module uses, judge to whether there is function in all functions
SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as front mould
Block is not using to function SetWindowsHookEx.
Program use state monitoring module is used for:After receiving program use state monitoring signal, judge timing detection module
Whether the live application program of detection runs and finishes, and if so, terminates, and otherwise sends timing detection signal to timing detection module.
The present invention is not limited to above-mentioned embodiment, for those skilled in the art, without departing from
On the premise of the principle of the invention, some improvements and modifications can also be made, these improvements and modifications are also considered as the protection of the present invention
Within the scope of.The content not being described in detail in this specification belongs to prior art known to professional and technical personnel in the field.
Claims (10)
1. a kind of network account guard method based on password control is it is characterised in that the method comprises the following steps:
S1:Obtain all normal module needing during live safety operation of applied program to load, all normal modules are preserved shape
Become white list list, go to S2;
S2:All modules that timing acquisition live application program loads when running, go to S3;
S3:In described all modules, after filtering out all normal module in white list list, obtain except in white list list
Module outside remaining module, go to S4;
S4:Judge whether each remaining module is hook program respectively, if so, determine that current block is abnormal module, go to S5;
Otherwise determine that current block is normal module, goes to S5;
S5:Judge whether current live application program runs to finish, if so, terminate, otherwise continue executing with S2.
2. the network account guard method based on password control as claimed in claim 1 it is characterised in that:Live described in S1
During safety operation of applied program, the acquisition flow process of all normal module that needs load is:One PC of advanced security authentication, at this
Live application program is run on PC, obtains all modules that live application program loads, described all modules are normal module.
3. the network account guard method based on password control as claimed in claim 1 it is characterised in that:Obtain described in S2
The idiographic flow of all modules that live application program loads when running is:
S201:Obtain the handle of process corresponding with live application program;
S202:According to the handle of described process, obtain the handle of all modules of this process loading;
S203:Obtain the corresponding module title of each handle.
4. the network account guard method based on password control as claimed in claim 1 it is characterised in that:The idiographic flow of S4
For:Whether detect each remaining module respectively using to function SetWindowsHookEx, if it is determined that current block is different
Norm block, otherwise determines that current block is normal module.
5. the network account guard method based on password control as claimed in claim 4 it is characterised in that:Detect described in S4
Whether each remaining module using the idiographic flow to function SetWindowsHookEx be:
S401:According to the handle of remaining module, obtain the DOS head of current residual module, current residual module is obtained according to DOS head
NT head, deposit the initial memory address of current residual module in NT head;
S402:Determine the importing table index of current residual module, obtain the importing table of current residual module according to this index;Determine
This importing table is with respect to the skew of the initial memory address of current residual module;
S403:According to importing the skew that table is with respect to the initial memory address of current residual module, determine the interior of current importing table
Deposit address;
S404:Obtain, in importing table, the function used that current residual module uses, judge to whether there is function in all functions
SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as front mould
Block is not using to function SetWindowsHookEx.
6. a kind of network account protection system based on password control realizing claim 1 to 5 any one methods described, it is special
Levy and be, this system include white list list acquisition module, timing detection module, abnormal filtering module, abnormal investigation module and
Program use state monitoring module;
White list list acquisition module is used for:Obtain all normal module needing during live safety operation of applied program to load,
All normal modules are preserved and forms white list list, send timing detection signal to timing detection module;
Timing detection module is used for:After receiving timing detection signal, it is all that timing acquisition live application program loads when running
Module, sends abnormal trap signal to abnormal filtering module;
Abnormal filtering module is used for:After receiving abnormal trap signal, in described all modules, filter out in white list list
After all normal modules, obtain the remaining module in addition to the module in white list list, send to abnormal investigation module abnormal
Investigation signal;
Abnormal investigation module is used for:After receiving abnormal investigation signal, judge whether each remaining module is hook program respectively, if
It is to determine that current block is abnormal module, to program use state monitoring module router use state monitoring signal;Otherwise
Determine that current block is normal module, to program use state monitoring module router use state monitoring signal;
Program use state monitoring module is used for:After receiving program use state monitoring signal, judge that timing detection module detects
Live application program whether run and finish, if so, terminate, otherwise send timing detection signal to timing detection module.
7. the network account protection system based on password control as claimed in claim 6 it is characterised in that:Described white list row
During table acquisition module acquisition live safety operation of applied program, the workflow of all normal module that needs load is:Pacify in advance
Complete one PC of certification, runs live application program on this PC, obtains all modules that live application program loads, described all
Module is normal module.
8. the network account protection system based on password control as claimed in claim 6 it is characterised in that:Described timing detection
The idiographic flow obtaining all modules loading when live application program runs in module is:Obtain corresponding with live application program
The handle of process;According to the handle of described process, obtain the handle of all modules of this process loading;Obtain each handle to correspond to
Module title.
9. the network account protection system based on password control as claimed in claim 6 it is characterised in that:Described abnormal investigation
The specific workflow of module is:Detect each remaining module respectively whether using to function SetWindowsHookEx, if so,
Then determine that current block is abnormal module, otherwise determine that current block is normal module.
10. the network account protection system based on password control as claimed in claim 9 it is characterised in that:Described abnormal row
Look into module and detect that whether each remaining module using the idiographic flow to function SetWindowsHookEx is:
According to the handle of remaining module, obtain the DOS head of current residual module, obtain the NT of current residual module according to DOS head
Head, deposits the initial memory address of current residual module in NT head;Determine the importing table index of current residual module, according to this
Index obtains the importing table of current residual module;Determine that this importing table is inclined with respect to the initial memory address of current residual module
Move;
According to importing the skew that table is with respect to the initial memory address of current residual module, determine the current internal memory ground importing table
Location;Obtain, in importing table, the function used that current residual module uses, judge to whether there is function in all functions
SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as front mould
Block is not using to function SetWindowsHookEx.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610841169.9A CN106446684B (en) | 2016-09-22 | 2016-09-22 | A kind of network account guard method and system based on password control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610841169.9A CN106446684B (en) | 2016-09-22 | 2016-09-22 | A kind of network account guard method and system based on password control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106446684A true CN106446684A (en) | 2017-02-22 |
CN106446684B CN106446684B (en) | 2019-12-03 |
Family
ID=58167345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610841169.9A Active CN106446684B (en) | 2016-09-22 | 2016-09-22 | A kind of network account guard method and system based on password control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106446684B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114323A (en) * | 2006-07-28 | 2008-01-30 | 上海山丽信息安全有限公司 | Device for monitoring keyboard hook |
US20080247746A1 (en) * | 2007-04-05 | 2008-10-09 | David Law | Tripod Mounting, Stand, or Support Attachment, Accessory, or Mechanism for Cameras and Similar Devices or Objects |
CN101483658A (en) * | 2009-01-09 | 2009-07-15 | 招商银行股份有限公司 | System and method for input content protection of browser |
CN102663318A (en) * | 2012-03-22 | 2012-09-12 | 百度在线网络技术(北京)有限公司 | Browser and client |
CN102866893A (en) * | 2012-09-24 | 2013-01-09 | 南京工业大学 | Legacy software structure disjunction method based on intermediate language-interpretative language (IL) |
CN102999726A (en) * | 2012-12-14 | 2013-03-27 | 北京奇虎科技有限公司 | File macro virus immunization method and device |
CN103034809A (en) * | 2012-12-14 | 2013-04-10 | 北京奇虎科技有限公司 | Method and device for immunizing file macro virus |
CN103034800A (en) * | 2012-12-14 | 2013-04-10 | 北京奇虎科技有限公司 | Device and method for intercepting pop-up windows |
CN104536981A (en) * | 2014-12-05 | 2015-04-22 | 北京奇虎科技有限公司 | Browser safety achieving method, browser client-side and device |
CN105069351A (en) * | 2015-07-23 | 2015-11-18 | 浪潮电子信息产业股份有限公司 | Apparatus and method for preventing stealing of login information of application program |
CN105844146A (en) * | 2016-03-16 | 2016-08-10 | 北京金山安全软件有限公司 | Method and device for protecting driver and electronic equipment |
-
2016
- 2016-09-22 CN CN201610841169.9A patent/CN106446684B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114323A (en) * | 2006-07-28 | 2008-01-30 | 上海山丽信息安全有限公司 | Device for monitoring keyboard hook |
US20080247746A1 (en) * | 2007-04-05 | 2008-10-09 | David Law | Tripod Mounting, Stand, or Support Attachment, Accessory, or Mechanism for Cameras and Similar Devices or Objects |
CN101483658A (en) * | 2009-01-09 | 2009-07-15 | 招商银行股份有限公司 | System and method for input content protection of browser |
CN102663318A (en) * | 2012-03-22 | 2012-09-12 | 百度在线网络技术(北京)有限公司 | Browser and client |
CN102866893A (en) * | 2012-09-24 | 2013-01-09 | 南京工业大学 | Legacy software structure disjunction method based on intermediate language-interpretative language (IL) |
CN102999726A (en) * | 2012-12-14 | 2013-03-27 | 北京奇虎科技有限公司 | File macro virus immunization method and device |
CN103034809A (en) * | 2012-12-14 | 2013-04-10 | 北京奇虎科技有限公司 | Method and device for immunizing file macro virus |
CN103034800A (en) * | 2012-12-14 | 2013-04-10 | 北京奇虎科技有限公司 | Device and method for intercepting pop-up windows |
CN104536981A (en) * | 2014-12-05 | 2015-04-22 | 北京奇虎科技有限公司 | Browser safety achieving method, browser client-side and device |
CN105069351A (en) * | 2015-07-23 | 2015-11-18 | 浪潮电子信息产业股份有限公司 | Apparatus and method for preventing stealing of login information of application program |
CN105844146A (en) * | 2016-03-16 | 2016-08-10 | 北京金山安全软件有限公司 | Method and device for protecting driver and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106446684B (en) | 2019-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109753806B (en) | Server protection method and device | |
US10291630B2 (en) | Monitoring apparatus and method | |
CN102624677B (en) | Method and server for monitoring network user behavior | |
CN102082836B (en) | DNS (Domain Name Server) safety monitoring system and method | |
CN109413091A (en) | A kind of network security monitoring method and apparatus based on internet-of-things terminal | |
CN103778375B (en) | The apparatus and method for preventing user equipment from loading illegal dynamic link library file | |
CN104270467B (en) | A kind of virtual machine management-control method for mixed cloud | |
CN109829297A (en) | Monitoring device, method and its computer storage medium | |
CN104268470B (en) | Method of controlling security and safety control | |
BR112012028244B1 (en) | Method and equipment to implement real-time protection | |
CN102546672A (en) | Out-of-band authorization safety reinforcement method for cloud computing platform | |
CN104796383B (en) | A kind of method and apparatus that end message is anti-tamper | |
CN101859373A (en) | Method for safely accessing mobile credible terminal | |
CN106446684A (en) | Network account protection method and system based on password control | |
CN101951386B (en) | Safe method for data convergence and information feedback of internet of things | |
CN109284636A (en) | A kind of webpage tamper resistant systems and method | |
CN102436567A (en) | Information processing device, password diagnosing method | |
CN106598661A (en) | Method and system for dynamically updating plug-in | |
CN109450871B (en) | Distributed virtual firewall device and system deployment method thereof | |
CN104754574A (en) | SIM card, anti-cloning method thereof and device | |
CN105912929B (en) | A kind of dynamic measurement method based on domestic TCM | |
CN205485381U (en) | Computer hardware port intelligence management and control system | |
CN110730193B (en) | Method, device, server and storage medium for guaranteeing network security | |
CN103916391B (en) | A kind of method and system preventing illegal external connection | |
CN104519030A (en) | Method and device for safety detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |