CN106446684A - Network account protection method and system based on password control - Google Patents

Network account protection method and system based on password control Download PDF

Info

Publication number
CN106446684A
CN106446684A CN201610841169.9A CN201610841169A CN106446684A CN 106446684 A CN106446684 A CN 106446684A CN 201610841169 A CN201610841169 A CN 201610841169A CN 106446684 A CN106446684 A CN 106446684A
Authority
CN
China
Prior art keywords
module
modules
application program
normal
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610841169.9A
Other languages
Chinese (zh)
Other versions
CN106446684B (en
Inventor
周志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201610841169.9A priority Critical patent/CN106446684B/en
Publication of CN106446684A publication Critical patent/CN106446684A/en
Application granted granted Critical
Publication of CN106446684B publication Critical patent/CN106446684B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a network account protection method and system based on a cryptographic control and relates to the field of network account protection. The method includes the following steps: obtaining all normal modules that need to be loaded when a live streaming application program is running safely; storing the all normal modules to form a whitelist list; obtaining all loaded modules at regular time when the live streaming application program is running; in the all modules, filtering all normal modules in the whitelist list to obtain remaining modules other than the modules in the whitelist list; determining whether each remaining module is a hook program or not; if so, confirming that the current module is an abnormal module, otherwise, the current module is a normal module. The invention can detect whether the running of the live streaming application program is safe or not at regular time, the account theft rate of the live streaming application program is significantly reduced, and the security of the live streaming application program used by an anchor is thus guaranteed.

Description

A kind of network account guard method based on password control and system
Technical field
The present invention relates to network account protection field is and in particular to a kind of network account guard method based on password control And system.
Background technology
At present, live platform can be a kind of live for main broadcaster in the upper offer of PC (personal computer, personal computer) Software (application program), this software is used for gathering main broadcaster's video content and carrying out live.When main broadcaster uses this software, need defeated Enter itself unique account and corresponding password is logged in.
At present, the operating system program of PC generally uses Windows, and Windows provides a kind of Hook Mechanism, wherein Including keyboard hook program, this program can be prior to getting all of keyboard operation before application program.Therefore, if using straight Broadcast the keyboard hook program that opens in the case of " ignorant " while application program, then the publisher of hook program Know the account of main broadcaster and the password using current PC computer.
Therefore, often there is the risk of steal-number in the existing live application program being installed on PC when using, main broadcaster makes It is difficult to ensure with safety.
Content of the invention
For defect present in prior art, present invention solves the technical problem that being:Detect that live application program runs When the abnormal module that loads.The present invention can regularly detect that live application program runs whether safety, significantly reduce live should Usurp rate with the account of program it is ensured that main broadcaster uses the safety of live application program.
For reaching object above, the network account guard method based on password control that the present invention provides, walk including following Suddenly:
S1:Obtain all normal module needing during live safety operation of applied program to load, all normal modules are protected Deposit formation white list list, go to S2;
S2:All modules that timing acquisition live application program loads when running, go to S3;
S3:In described all modules, after filtering out all normal module in white list list, obtain arranging except white list Remaining module outside module in table, goes to S4;
S4:Judge whether each remaining module is hook program respectively, if so, determine that current block is abnormal module, turn To S5;Otherwise determine that current block is normal module, goes to S5;
S5:Judge whether current live application program runs to finish, if so, terminate, otherwise continue executing with S2.
The network account protection system based on password control realizing said method that the present invention provides, including white list row Table acquisition module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module;
White list list acquisition module is used for:Obtain all normal modes needing during live safety operation of applied program to load Block, all normal modules is preserved and forms white list list, send timing detection signal to timing detection module;
Timing detection module is used for:After receiving timing detection signal, timing acquisition live application program loads when running All modules, send abnormal trap signal to abnormal filtering module;
Abnormal filtering module is used for:After receiving abnormal trap signal, in described all modules, filter out white list list In all normal module after, obtain the remaining module in addition to the module in white list list, send to abnormal investigation module Abnormal investigation signal;
Abnormal investigation module is used for:After receiving abnormal investigation signal, judge whether each remaining module is hook journey respectively Sequence, if so, determines that current block is abnormal module, monitors letter to program use state monitoring module router use state Number;Otherwise determine that current block is normal module, to program use state monitoring module router use state monitoring signal;
Program use state monitoring module is used for:After receiving program use state monitoring signal, judge timing detection module Whether the live application program of detection runs and finishes, and if so, terminates, and otherwise sends timing detection signal to timing detection module.
Compared with prior art, it is an advantage of the current invention that:
The present invention understands all modules loading when the live application program of timing acquisition runs, after filtering safe module, to surplus Each remaining module carries out detecting whether there is hook program, if so, then proves that this module is abnormal module.Therefore, with existing The live application program that there is steal-number risk in technology is compared, and whether the present invention can regularly detect that live application program runs and pacify Entirely, the account significantly reducing live application program usurps rate it is ensured that main broadcaster uses the safety of live application program.
Brief description
Fig. 1 is the flow chart of the network account guard method in the embodiment of the present invention based on password control.
Specific embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.
Network account guard method based on password control shown in Figure 1, in the embodiment of the present invention, walks including following Suddenly:
S1:Obtain all normal module needing during live safety operation of applied program to load, all normal modules are protected Deposit formation white list list, go to S2.
In S1, during live safety operation of applied program, the acquisition flow process of all normal module that needs load is:Safety in advance One PC of certification, runs live application program on this PC, obtains all modules that live application program loads, as normal mode Block (module that live application program loads when running on the PC of safety, certain normal module needing to load).
S2:Add when being run by the live application program of Windows api function EnumProcessModules timing acquisition The all modules carrying, go to S3.
S3:In all modules that S2 obtains, filter out all normal module in white list list, obtain except white list Remaining module outside module in list, go to S4 to be detected further.
S4:Judge whether each remaining module is hook program respectively, if so, determine that current block is abnormal module, send out Go to S5 after going out alarm (for example prompting the user whether to carry out checking and killing virus etc.), otherwise determine that current block is normal module, directly It is switched to S5.Because hook program inherently uses the function in Windows module User32.dll SetWindowsHookEx, the therefore present invention pass through the remaining module of detection whether using to function SetWindowsHookEx, if It is then to prove that current block is abnormal module, otherwise prove that current block is normal module.
S5:Judge whether current live application program runs to finish, if so, terminate, otherwise continue executing with S2.
The idiographic flow obtaining all modules loading when live application program runs in S2 is:
S201:Obtain the handle hProcess of process corresponding with live application program:
HANDLE hProcess=GetCurrentProcess ();
Wherein GetCurrentProcess represents the acquisition process handle API of Windows offer.
S202:According to the handle of process in S201, obtain the handle of all modules of this process loading EnumProcessModules:
EnumProcessModules(
HANDLE hProcess,
HMODULE*lphModule,
DWORD cb,
LPDWORD lpcbNeeded);
Wherein parameter hProcess inserts the handle of the process obtaining in S201, and parameter lphModule represents and is used for preserving The module handle list getting, parameter cb represents the number of handles that lphModule can deposit;Parameter lpcbNeeded represents The actual number of handles getting.
S203:The corresponding module title of each handle is obtained by GetModuleFileNameEx:
GetModuleFileNameEx(
HANDLE hProcess,
HMODULE hModule,
LPTSTR lpFilename,
DWORD nSize);
Wherein parameter hProcess is identical with S202, and parameter hModule inserts the handle of all modules obtaining in S202, Parameter lpFilename represents the corresponding module title of each handle, and parameter nSize represents the space size of lpFilename.
Detect in S4 that whether remaining module using the principle to function SetWindowsHookEx is:One module of detection makes When using which function, need to read the importing table of this module, the function that this module that is stored with importing table uses.In this base On plinth, whether the remaining module of detection using the idiographic flow to function SetWindowsHookEx is:
S401:Handle (hMoudle) according to remaining module, obtains the DOS head (DosHeader) of current residual module, Obtain the NT head (NtHeader) of current residual module according to DOS head:
PIMAGE_DOS_HEADER pDosHeader=(PIMAGE_DOS_HEADER) hMoudle;
PIMAGE_NT_HEADERS pNtHeader=(PIMAGE_NT_HEADERS) (hMoudle+pDosHeader-> e_lfanew).
S402:Determine the importing table index (MAGE_DIRECTORY_ENTRY_IMPORT) of current residual module, according to this Index obtains the importing table of current residual module;Determine that this importing table is initial with respect to the current residual module deposited in NT head The skew (dwIat) of memory address:
DWORD=pNtHeader->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_ IMP ORT].VirtualAddress.
S403:The current memory address (pImport) importing table is determined according to dwIat:
PIMAGE_IMPORT_DESCRIPTOR pImport=(PIMAGE_IMPORT_DESCRIPTOR) (hMoudle+ dwIat).
S404:Obtain, in importing table, the function used that current residual module uses, judge to whether there is in all functions Function SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as Front module is not using to function SetWindowsHookEx.
The network account protection system based on password control realizing said method that the present invention provides, including white list row Table acquisition module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module.
White list list acquisition module is used for:Obtain all normal modes needing during live safety operation of applied program to load (one PC of advanced security authentication, runs live application program on this PC to block, obtains all moulds that live application program loads Block), all normal modules are preserved and forms white list list, send timing detection signal to timing detection module.
Timing detection module is used for:After receiving timing detection signal, timing acquisition live application program loads when running All modules (obtain the handle of process corresponding with live application program;According to the handle of described process, obtain the loading of this process The handle of all modules;Obtain the corresponding module title of each handle), send abnormal trap signal to abnormal filtering module.
Abnormal filtering module is used for:After receiving abnormal trap signal, in described all modules, filter out white list list In all normal module after, obtain the remaining module in addition to the module in white list list, send to abnormal investigation module Abnormal investigation signal.
Abnormal investigation module is used for:After receiving abnormal investigation signal, judge whether each remaining module is hook journey respectively Sequence (whether using to function SetWindowsHookEx), if so, determines that current block is abnormal module, sends the backward journey of alarm Sequence use state monitoring module router use state monitoring signal;Otherwise determine that current block is normal module, to program Use state monitoring module router use state monitoring signal;Idiographic flow is:
According to the handle of remaining module, obtain the DOS head of current residual module, current residual module is obtained according to DOS head NT head, deposit the initial memory address of current residual module in NT head;Determine the importing table index of current residual module, root Obtain the importing table of current residual module according to this index;Determine the initial memory address that this importing table is with respect to current residual module Skew;
According to importing the skew that table is with respect to the initial memory address of current residual module, determine the current internal memory importing table Address;Obtain, in importing table, the function used that current residual module uses, judge to whether there is function in all functions SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as front mould Block is not using to function SetWindowsHookEx.
Program use state monitoring module is used for:After receiving program use state monitoring signal, judge timing detection module Whether the live application program of detection runs and finishes, and if so, terminates, and otherwise sends timing detection signal to timing detection module.
The present invention is not limited to above-mentioned embodiment, for those skilled in the art, without departing from On the premise of the principle of the invention, some improvements and modifications can also be made, these improvements and modifications are also considered as the protection of the present invention Within the scope of.The content not being described in detail in this specification belongs to prior art known to professional and technical personnel in the field.

Claims (10)

1. a kind of network account guard method based on password control is it is characterised in that the method comprises the following steps:
S1:Obtain all normal module needing during live safety operation of applied program to load, all normal modules are preserved shape Become white list list, go to S2;
S2:All modules that timing acquisition live application program loads when running, go to S3;
S3:In described all modules, after filtering out all normal module in white list list, obtain except in white list list Module outside remaining module, go to S4;
S4:Judge whether each remaining module is hook program respectively, if so, determine that current block is abnormal module, go to S5; Otherwise determine that current block is normal module, goes to S5;
S5:Judge whether current live application program runs to finish, if so, terminate, otherwise continue executing with S2.
2. the network account guard method based on password control as claimed in claim 1 it is characterised in that:Live described in S1 During safety operation of applied program, the acquisition flow process of all normal module that needs load is:One PC of advanced security authentication, at this Live application program is run on PC, obtains all modules that live application program loads, described all modules are normal module.
3. the network account guard method based on password control as claimed in claim 1 it is characterised in that:Obtain described in S2 The idiographic flow of all modules that live application program loads when running is:
S201:Obtain the handle of process corresponding with live application program;
S202:According to the handle of described process, obtain the handle of all modules of this process loading;
S203:Obtain the corresponding module title of each handle.
4. the network account guard method based on password control as claimed in claim 1 it is characterised in that:The idiographic flow of S4 For:Whether detect each remaining module respectively using to function SetWindowsHookEx, if it is determined that current block is different Norm block, otherwise determines that current block is normal module.
5. the network account guard method based on password control as claimed in claim 4 it is characterised in that:Detect described in S4 Whether each remaining module using the idiographic flow to function SetWindowsHookEx be:
S401:According to the handle of remaining module, obtain the DOS head of current residual module, current residual module is obtained according to DOS head NT head, deposit the initial memory address of current residual module in NT head;
S402:Determine the importing table index of current residual module, obtain the importing table of current residual module according to this index;Determine This importing table is with respect to the skew of the initial memory address of current residual module;
S403:According to importing the skew that table is with respect to the initial memory address of current residual module, determine the interior of current importing table Deposit address;
S404:Obtain, in importing table, the function used that current residual module uses, judge to whether there is function in all functions SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as front mould Block is not using to function SetWindowsHookEx.
6. a kind of network account protection system based on password control realizing claim 1 to 5 any one methods described, it is special Levy and be, this system include white list list acquisition module, timing detection module, abnormal filtering module, abnormal investigation module and Program use state monitoring module;
White list list acquisition module is used for:Obtain all normal module needing during live safety operation of applied program to load, All normal modules are preserved and forms white list list, send timing detection signal to timing detection module;
Timing detection module is used for:After receiving timing detection signal, it is all that timing acquisition live application program loads when running Module, sends abnormal trap signal to abnormal filtering module;
Abnormal filtering module is used for:After receiving abnormal trap signal, in described all modules, filter out in white list list After all normal modules, obtain the remaining module in addition to the module in white list list, send to abnormal investigation module abnormal Investigation signal;
Abnormal investigation module is used for:After receiving abnormal investigation signal, judge whether each remaining module is hook program respectively, if It is to determine that current block is abnormal module, to program use state monitoring module router use state monitoring signal;Otherwise Determine that current block is normal module, to program use state monitoring module router use state monitoring signal;
Program use state monitoring module is used for:After receiving program use state monitoring signal, judge that timing detection module detects Live application program whether run and finish, if so, terminate, otherwise send timing detection signal to timing detection module.
7. the network account protection system based on password control as claimed in claim 6 it is characterised in that:Described white list row During table acquisition module acquisition live safety operation of applied program, the workflow of all normal module that needs load is:Pacify in advance Complete one PC of certification, runs live application program on this PC, obtains all modules that live application program loads, described all Module is normal module.
8. the network account protection system based on password control as claimed in claim 6 it is characterised in that:Described timing detection The idiographic flow obtaining all modules loading when live application program runs in module is:Obtain corresponding with live application program The handle of process;According to the handle of described process, obtain the handle of all modules of this process loading;Obtain each handle to correspond to Module title.
9. the network account protection system based on password control as claimed in claim 6 it is characterised in that:Described abnormal investigation The specific workflow of module is:Detect each remaining module respectively whether using to function SetWindowsHookEx, if so, Then determine that current block is abnormal module, otherwise determine that current block is normal module.
10. the network account protection system based on password control as claimed in claim 9 it is characterised in that:Described abnormal row Look into module and detect that whether each remaining module using the idiographic flow to function SetWindowsHookEx is:
According to the handle of remaining module, obtain the DOS head of current residual module, obtain the NT of current residual module according to DOS head Head, deposits the initial memory address of current residual module in NT head;Determine the importing table index of current residual module, according to this Index obtains the importing table of current residual module;Determine that this importing table is inclined with respect to the initial memory address of current residual module Move;
According to importing the skew that table is with respect to the initial memory address of current residual module, determine the current internal memory ground importing table Location;Obtain, in importing table, the function used that current residual module uses, judge to whether there is function in all functions SetWindowsHookEx, if so, then proves that current block uses function SetWindowsHookEx, otherwise proves to work as front mould Block is not using to function SetWindowsHookEx.
CN201610841169.9A 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control Active CN106446684B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610841169.9A CN106446684B (en) 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610841169.9A CN106446684B (en) 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control

Publications (2)

Publication Number Publication Date
CN106446684A true CN106446684A (en) 2017-02-22
CN106446684B CN106446684B (en) 2019-12-03

Family

ID=58167345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610841169.9A Active CN106446684B (en) 2016-09-22 2016-09-22 A kind of network account guard method and system based on password control

Country Status (1)

Country Link
CN (1) CN106446684B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114323A (en) * 2006-07-28 2008-01-30 上海山丽信息安全有限公司 Device for monitoring keyboard hook
US20080247746A1 (en) * 2007-04-05 2008-10-09 David Law Tripod Mounting, Stand, or Support Attachment, Accessory, or Mechanism for Cameras and Similar Devices or Objects
CN101483658A (en) * 2009-01-09 2009-07-15 招商银行股份有限公司 System and method for input content protection of browser
CN102663318A (en) * 2012-03-22 2012-09-12 百度在线网络技术(北京)有限公司 Browser and client
CN102866893A (en) * 2012-09-24 2013-01-09 南京工业大学 Legacy software structure disjunction method based on intermediate language-interpretative language (IL)
CN102999726A (en) * 2012-12-14 2013-03-27 北京奇虎科技有限公司 File macro virus immunization method and device
CN103034809A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and device for immunizing file macro virus
CN103034800A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Device and method for intercepting pop-up windows
CN104536981A (en) * 2014-12-05 2015-04-22 北京奇虎科技有限公司 Browser safety achieving method, browser client-side and device
CN105069351A (en) * 2015-07-23 2015-11-18 浪潮电子信息产业股份有限公司 Apparatus and method for preventing stealing of login information of application program
CN105844146A (en) * 2016-03-16 2016-08-10 北京金山安全软件有限公司 Method and device for protecting driver and electronic equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114323A (en) * 2006-07-28 2008-01-30 上海山丽信息安全有限公司 Device for monitoring keyboard hook
US20080247746A1 (en) * 2007-04-05 2008-10-09 David Law Tripod Mounting, Stand, or Support Attachment, Accessory, or Mechanism for Cameras and Similar Devices or Objects
CN101483658A (en) * 2009-01-09 2009-07-15 招商银行股份有限公司 System and method for input content protection of browser
CN102663318A (en) * 2012-03-22 2012-09-12 百度在线网络技术(北京)有限公司 Browser and client
CN102866893A (en) * 2012-09-24 2013-01-09 南京工业大学 Legacy software structure disjunction method based on intermediate language-interpretative language (IL)
CN102999726A (en) * 2012-12-14 2013-03-27 北京奇虎科技有限公司 File macro virus immunization method and device
CN103034809A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and device for immunizing file macro virus
CN103034800A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Device and method for intercepting pop-up windows
CN104536981A (en) * 2014-12-05 2015-04-22 北京奇虎科技有限公司 Browser safety achieving method, browser client-side and device
CN105069351A (en) * 2015-07-23 2015-11-18 浪潮电子信息产业股份有限公司 Apparatus and method for preventing stealing of login information of application program
CN105844146A (en) * 2016-03-16 2016-08-10 北京金山安全软件有限公司 Method and device for protecting driver and electronic equipment

Also Published As

Publication number Publication date
CN106446684B (en) 2019-12-03

Similar Documents

Publication Publication Date Title
CN109753806B (en) Server protection method and device
US10291630B2 (en) Monitoring apparatus and method
CN102624677B (en) Method and server for monitoring network user behavior
CN102082836B (en) DNS (Domain Name Server) safety monitoring system and method
CN109413091A (en) A kind of network security monitoring method and apparatus based on internet-of-things terminal
CN103778375B (en) The apparatus and method for preventing user equipment from loading illegal dynamic link library file
CN104270467B (en) A kind of virtual machine management-control method for mixed cloud
CN109829297A (en) Monitoring device, method and its computer storage medium
CN104268470B (en) Method of controlling security and safety control
BR112012028244B1 (en) Method and equipment to implement real-time protection
CN102546672A (en) Out-of-band authorization safety reinforcement method for cloud computing platform
CN104796383B (en) A kind of method and apparatus that end message is anti-tamper
CN101859373A (en) Method for safely accessing mobile credible terminal
CN106446684A (en) Network account protection method and system based on password control
CN101951386B (en) Safe method for data convergence and information feedback of internet of things
CN109284636A (en) A kind of webpage tamper resistant systems and method
CN102436567A (en) Information processing device, password diagnosing method
CN106598661A (en) Method and system for dynamically updating plug-in
CN109450871B (en) Distributed virtual firewall device and system deployment method thereof
CN104754574A (en) SIM card, anti-cloning method thereof and device
CN105912929B (en) A kind of dynamic measurement method based on domestic TCM
CN205485381U (en) Computer hardware port intelligence management and control system
CN110730193B (en) Method, device, server and storage medium for guaranteeing network security
CN103916391B (en) A kind of method and system preventing illegal external connection
CN104519030A (en) Method and device for safety detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant