CN106919842B - Computer security protection method and computer - Google Patents

Computer security protection method and computer Download PDF

Info

Publication number
CN106919842B
CN106919842B CN201710145132.7A CN201710145132A CN106919842B CN 106919842 B CN106919842 B CN 106919842B CN 201710145132 A CN201710145132 A CN 201710145132A CN 106919842 B CN106919842 B CN 106919842B
Authority
CN
China
Prior art keywords
mobile terminal
computer
identifier
mailbox
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710145132.7A
Other languages
Chinese (zh)
Other versions
CN106919842A (en
Inventor
王成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Litong Information Technology Co ltd
Original Assignee
Huzhou Beige Information Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huzhou Beige Information Security Technology Co ltd filed Critical Huzhou Beige Information Security Technology Co ltd
Priority to CN201710145132.7A priority Critical patent/CN106919842B/en
Publication of CN106919842A publication Critical patent/CN106919842A/en
Application granted granted Critical
Publication of CN106919842B publication Critical patent/CN106919842B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Virology (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a computer security protection method, which comprises the following steps: when detecting that the mobile terminal is connected through a power line, the computer equipment acquires an identifier of the mobile terminal; the computer equipment compares the identifier with identifiers in a history access identifier list; if the identification of the mobile terminal exists in the historical access identification list, the computer equipment allows the mobile terminal to access and access the equipment through the security verification of the mobile terminal. The technical scheme provided by the invention has the advantage of high user experience.

Description

Computer security protection method and computer
Technical Field
The invention relates to the field of computers, in particular to a computer security protection method and a computer.
Background
The most important of computer security is the security of stored data, and the main threats facing the security include: computer viruses, illegal access, computer electromagnetic radiation, hardware damage, etc.
Computer viruses are covert applets attached to computer software that are the same as other working programs of a computer, but can corrupt normal programs and data files. The malignant virus can cause the whole computer software system to crash and the data to be completely destroyed. The main aim of preventing virus attack is to strengthen management, not to access unsafe data, use antivirus software and upgrade and update in time.
For external equipment of a computer, such as a mobile terminal, the security of the external equipment cannot be guaranteed, so that the security of the computer is affected and the customer experience is affected when the external equipment is connected with the computer.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide a computer security protection method. The computer connection safety can be improved, and the user experience degree is improved.
In order to solve the above technical problem, an embodiment of the present invention provides a computer security protection method, where the method includes the following steps:
when detecting that the mobile terminal is connected through a power line, the computer equipment acquires an identifier of the mobile terminal;
the computer equipment compares the identifier with identifiers in a history access identifier list;
if the identification of the mobile terminal exists in the historical access identification list, the computer equipment allows the mobile terminal to access and access the equipment through the security verification of the mobile terminal.
Optionally, the method further includes:
if the identifier of the mobile terminal does not exist in the historical access identifier list, the computer device does not allow the mobile terminal to access the local device without passing the security verification of the mobile terminal.
Optionally, the method further includes:
if the identifier of the mobile terminal does not exist in the historical access identifier list, extracting first mailbox data in the mail app in the mobile terminal, wherein the first mailbox data comprises: the method comprises the steps that a self mailbox of a mail app and a sending mailbox list of the mail app are obtained; the computer equipment inquires whether a mail application program exists from the local data, and if the mail application program exists, second mailbox data of the mail application program is extracted, wherein the second mailbox data comprises: if the first mailbox data and the second mailbox data are completely the same, the computer equipment passes the verification of the mobile terminal, and the computer equipment does not allow the mobile terminal to access the computer equipment.
In a second aspect, there is provided a computer device, the computer device comprising:
the mobile terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring the identifier of the mobile terminal when detecting that the mobile terminal is connected through a power line;
the processing unit is used for comparing the identifier with identifiers in a history access identifier list; if the identification of the mobile terminal exists in the historical access identification list, the computer equipment allows the mobile terminal to access and access the equipment through the security verification of the mobile terminal.
Optionally, the processing unit is further configured to, if the identifier of the mobile terminal does not exist in the historical access identifier list, not pass security verification on the mobile terminal, and the computer device does not allow the mobile terminal to access the local device.
Optionally, the processing unit is further configured to, if the identifier of the mobile terminal does not exist in the history access identifier list, extract first mailbox data in the mail app in the mobile terminal, where the first mailbox data includes: the method comprises the steps that a self mailbox of a mail app and a sending mailbox list of the mail app are obtained; the computer equipment inquires whether a mail application program exists from the local data, and if the mail application program exists, second mailbox data of the mail application program is extracted, wherein the second mailbox data comprises: if the first mailbox data and the second mailbox data are completely the same, the computer equipment passes the verification of the mobile terminal, and the computer equipment does not allow the mobile terminal to access the computer equipment.
It will be appreciated by those of ordinary skill in the art that although the following detailed description will proceed with reference being made to illustrative embodiments, the present invention is not intended to be limited to these embodiments. Rather, the scope of the invention is broad and is intended to be defined only by the claims appended hereto.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart illustrating a computer security protection method according to a first preferred embodiment of the present invention;
fig. 2 is a schematic structural diagram of another computer security protection device provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The method for protecting the computer security provided by the embodiment of the invention is executed between computer equipment and a mobile terminal, and as shown in figure 1, the method comprises the following steps:
step S101, when the computer device detects that the mobile terminal is connected through a power line, the computer device obtains the identifier of the mobile terminal.
The detection method of the connection through the power line in step S101 may be detected by an existing detection method, for example, a detection method of a 360 security guard, for example, a method of a QQ computer housekeeper or a QQ computer assistant, and certainly, in practical applications, it may also be detected whether the mobile terminal is connected through a power line by whether the corresponding USB interface has a high-level access, where the power line includes but is not limited to: the USB is converted into a power line of a mini USB, and certainly, the power line can also be a power line of a USB conversion apple 5 or apple 7 interface.
And S102, comparing the identifier with identifiers in a historical access identifier list by the computer equipment.
The historical access identifier list in step S102 may be a pre-stored list, and each time the computer device successfully connects to one mobile terminal, the identifier of the mobile terminal is recorded in the historical access identifier list. The identity of the mobile terminal may be: the MAC address of the mobile terminal may also be, in practical applications, a mobile phone number or an international identity number (IMEI) of the mobile terminal.
Step S103, if the identifier of the mobile terminal exists in the history access identifier list, the computer device allows the mobile terminal to access and access the device through the security verification of the mobile terminal.
The invention realizes the access to the mobile phone by establishing a history access identification list in the computer equipment, if the history access identification list is in the history access identification list, the safety of the mobile terminal is determined, and the mobile terminal is allowed to access and visit the equipment.
Optionally, after step S103, the method may further include:
if the identifier of the mobile terminal does not exist in the historical access identifier list, the computer device does not allow the mobile terminal to access the local device without passing the security verification of the mobile terminal.
Optionally, after step S103, the method may further include:
if the identifier of the mobile terminal does not exist in the historical access identifier list, extracting first mailbox data in the mail app in the mobile terminal, wherein the first mailbox data comprises: the method comprises the steps that a self mailbox of a mail app and a sending mailbox list of the mail app are obtained; the computer equipment inquires whether a mail application program exists from the local data, and if the mail application program exists, second mailbox data of the mail application program is extracted, wherein the second mailbox data comprises: if the first mailbox data and the second mailbox data are completely the same, the computer equipment passes the verification of the mobile terminal, and the computer equipment does not allow the mobile terminal to access the computer equipment.
The security verification is based on mailbox data, and the principle of the security verification can be that for a mobile terminal, computer devices actually required to be connected are very limited, and generally include office computers and home computers, for the two computer devices, the common characteristic is that the two computer devices have possibly the same mails and sending records of the mails, for the mobile terminal, since the office computers, the home computers and the mobile terminal all use the same person, the two computer devices have the same mail ID, such as company mailboxes and personal mails, for a mail application system, such as foxmail and the like, information of the corresponding mails is recorded, and then the mobile terminal can be identified by extracting and comparing the information.
Optionally, the method further includes: if the computer device does not have the mail application program, the computer device extracts photo information in the mobile terminal, the photo information is subjected to person identification processing to obtain a first group of person avatar information contained in the photo information, the computer device is subjected to person identification processing on the locally stored photo information to obtain a second group of person avatar information, the computer device calculates the similarity between the first group of person avatar information and the second group of person avatar information, and if the similarity is larger than a set threshold value, the security verification of the mobile terminal is passed.
The calculating, by the computer device, the similarity between the first group of character avatar information and the second group of character avatar information may specifically be:
the similarity is M1/M + M2/M … + mn/M;
wherein M is the total number of photos in the mobile terminal, M1 is the number of photos of the first same-person avatar, M2 is the number of photos of the first same-person avatar, and mn is the number of photos of the first same-person avatar.
According to the technical scheme, the identification of the mobile terminal is realized by comparing the head portraits of people in the photos, particularly the mobile terminal, most of the photos in the mobile terminal are photos of family members, and the photos need to be imported into the computer equipment, so that the computer equipment also stores photo information, although the contents in the photos are different, the similarity of the person information in the photos is high, for example, the photos of the family members, and the security verification of the mobile terminal can be realized by performing identification processing on the photos to obtain the head portraits and then calculating the similarity.
Referring to fig. 2, there is provided a computer apparatus 20 comprising:
an obtaining unit 201, configured to obtain an identifier of a mobile terminal when detecting that the mobile terminal is connected through a power line;
a processing unit 202, configured to compare the identifier with an identifier in a history access identifier list; if the identification of the mobile terminal exists in the historical access identification list, the computer equipment allows the mobile terminal to access and access the equipment through the security verification of the mobile terminal.
Optionally, the processing unit 202 is further configured to, if the identifier of the mobile terminal does not exist in the historical access identifier list, not pass security verification on the mobile terminal, and the computer device does not allow the mobile terminal to access the local device.
Optionally, the processing unit 202 is further configured to, if the identifier of the mobile terminal does not exist in the history access identifier list, extract first mailbox data in the mail app in the mobile terminal, where the first mailbox data includes: the method comprises the steps that a self mailbox of a mail app and a sending mailbox list of the mail app are obtained; the computer equipment inquires whether a mail application program exists from the local data, and if the mail application program exists, second mailbox data of the mail application program is extracted, wherein the second mailbox data comprises: if the first mailbox data and the second mailbox data are completely the same, the computer equipment passes the verification of the mobile terminal, and the computer equipment does not allow the mobile terminal to access the computer equipment.
Optionally, the processing unit 202 is further configured to, if the computer device does not have the email application, extract photo information in the mobile terminal by the computer device, perform person recognition processing on the photo information to obtain a first group of person avatar information included in the photo information, perform person recognition processing on the locally stored photo information by the computer device to obtain a second group of person avatar information, calculate, by the computer device, a similarity between the first group of person avatar information and the second group of person avatar information, and if the similarity is greater than a set threshold, pass security verification of the mobile terminal.
The calculating, by the computer device, the similarity between the first group of character avatar information and the second group of character avatar information may specifically be:
the similarity is M1/M + M2/M … + mn/M;
wherein M is the total number of photos in the mobile terminal, M1 is the number of photos of the first same-person avatar, M2 is the number of photos of the first same-person avatar, and mn is the number of photos of the first same-person avatar.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (2)

1. A computer security protection method, comprising the steps of:
when detecting that the mobile terminal is connected through a power line, the computer equipment acquires an identifier of the mobile terminal;
the computer equipment compares the identifier with identifiers in a history access identifier list;
if the identifier of the mobile terminal exists in the historical access identifier list, the computer equipment allows the mobile terminal to access and visit the equipment through the security verification of the mobile terminal;
if the identifier of the mobile terminal does not exist in the historical access identifier list, extracting first mailbox data in the mail app in the mobile terminal, wherein the first mailbox data comprises: the method comprises the steps that a self mailbox of a mail app and a sending mailbox list of the mail app are obtained; the computer equipment inquires whether a mail application program exists from the local data, and if the mail application program exists, second mailbox data of the mail application program is extracted, wherein the second mailbox data comprises: if the first mailbox data and the second mailbox data are completely the same, the computer device passes the verification of the mobile terminal, and the computer device allows the mobile terminal to access the computer device.
2. A computer device, characterized in that the computer device comprises:
the mobile terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring the identifier of the mobile terminal when detecting that the mobile terminal is connected through a power line;
the processing unit is used for comparing the identifier with identifiers in a history access identifier list; if the identifier of the mobile terminal exists in the historical access identifier list, the computer equipment allows the mobile terminal to access and visit the equipment through the security verification of the mobile terminal;
the processing unit is further configured to, if the identifier of the mobile terminal does not exist in the history access identifier list, extract first mailbox data in the mail app in the mobile terminal, where the first mailbox data includes: the method comprises the steps that a self mailbox of a mail app and a sending mailbox list of the mail app are obtained; the computer equipment inquires whether a mail application program exists from the local data, and if the mail application program exists, second mailbox data of the mail application program is extracted, wherein the second mailbox data comprises: if the first mailbox data and the second mailbox data are completely the same, the computer device passes the verification of the mobile terminal, and the computer device allows the mobile terminal to access the computer device.
CN201710145132.7A 2017-03-13 2017-03-13 Computer security protection method and computer Active CN106919842B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710145132.7A CN106919842B (en) 2017-03-13 2017-03-13 Computer security protection method and computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710145132.7A CN106919842B (en) 2017-03-13 2017-03-13 Computer security protection method and computer

Publications (2)

Publication Number Publication Date
CN106919842A CN106919842A (en) 2017-07-04
CN106919842B true CN106919842B (en) 2020-06-02

Family

ID=59461633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710145132.7A Active CN106919842B (en) 2017-03-13 2017-03-13 Computer security protection method and computer

Country Status (1)

Country Link
CN (1) CN106919842B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108337261A (en) * 2018-02-09 2018-07-27 蔡心 A kind of computer security control system
CN109858232A (en) * 2018-11-30 2019-06-07 河南职业技术学院 Computer security accesses management-control method and computer security accesses control device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014509421A (en) * 2011-02-01 2014-04-17 エムシーシーアイ コーポレイション Security measures for extended USB protocol stack of USB host system
CN103198037B (en) * 2013-04-22 2015-06-24 广东电网公司电力科学研究院 Reliable pipe control method and system for IO (input output) equipment
CN104135776B (en) * 2014-02-25 2016-01-06 腾讯科技(深圳)有限公司 A kind of method that cross-terminal connects, device and terminal equipment
CN106161147B (en) * 2015-03-31 2019-08-06 腾讯科技(深圳)有限公司 Establish the method and device of network connection

Also Published As

Publication number Publication date
CN106919842A (en) 2017-07-04

Similar Documents

Publication Publication Date Title
EP3771168B1 (en) Abnormal user identification method
US11019079B2 (en) Detection of email spoofing and spear phishing attacks
US11030311B1 (en) Detecting and protecting against computing breaches based on lateral movement of a computer file within an enterprise
US9100425B2 (en) Method and apparatus for detecting malicious software using generic signatures
US20170085584A1 (en) Detecting and thwarting spear phishing attacks in electronic messages
JP5961183B2 (en) How to detect malicious software using contextual probabilities, generic signatures, and machine learning methods
US10819720B2 (en) Information processing device, information processing system, information processing method, and storage medium
US8732831B2 (en) Detection of rogue software applications
US9288226B2 (en) Detection of rogue software applications
CN106133741A (en) For scanning the system and method for packing program in response to detection questionable conduct
CN112685682B (en) Method, device, equipment and medium for identifying forbidden object of attack event
CN105930726B (en) A kind of processing method and user terminal of malicious operation behavior
CN109245902A (en) The guard method of instant messaging message authentication codes and device
CN103679016A (en) Method and system for processing malicious programs of mobile phone
US10659493B2 (en) Technique for detecting malicious electronic messages
CN106919842B (en) Computer security protection method and computer
WO2019242441A1 (en) Dynamic feature-based malware recognition method and system and related apparatus
CN109284590B (en) Method, equipment, storage medium and device for access behavior security protection
CN105704100A (en) File identification method and file identification device
CN105306419B (en) Page information interaction method, device and system
US8904185B2 (en) Presence sensing information security
CN115834147A (en) Automatic processing method and device for abnormal mails
CN105205395A (en) Automatic detection method for malicious software
US20170257395A1 (en) Methods and devices to thwart email display name impersonation
KR101857969B1 (en) Method and Apparatus for Determining Risk of Fraudulent Mail

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200521

Address after: 518000 Shenzhen software industry base 4b-602, Xuefu Road, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Beige Data Application Research Institute Co.,Ltd.

Address before: 313002 Zhejiang Province, Huzhou city Wuxing District District Road No. 1188, east of Huzhou City headquarters building 9 floor B H free port

Applicant before: HUZHOU BEIGE INFORMATION SECURITY TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right

Effective date of registration: 20240411

Address after: 509 Kangrui Times Square, Keyuan Business Building, 39 Huarong Road, Gaofeng Community, Dalang Street, Longhua District, Shenzhen, Guangdong Province, 518000

Patentee after: Shenzhen Litong Information Technology Co.,Ltd.

Country or region after: China

Address before: 518000, Shenzhen Software Industry Base 4B-602, Xuefu Road, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: Shenzhen Beige Data Application Research Institute Co.,Ltd.

Country or region before: China