CN106919842B - Computer security protection method and computer - Google Patents
Computer security protection method and computer Download PDFInfo
- Publication number
- CN106919842B CN106919842B CN201710145132.7A CN201710145132A CN106919842B CN 106919842 B CN106919842 B CN 106919842B CN 201710145132 A CN201710145132 A CN 201710145132A CN 106919842 B CN106919842 B CN 106919842B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- computer
- identifier
- mailbox
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000012795 verification Methods 0.000 claims abstract description 22
- 239000000284 extract Substances 0.000 claims description 5
- 241000700605 Viruses Species 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005670 electromagnetic radiation Effects 0.000 description 1
- 230000003211 malignant effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Virology (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710145132.7A CN106919842B (en) | 2017-03-13 | 2017-03-13 | Computer security protection method and computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710145132.7A CN106919842B (en) | 2017-03-13 | 2017-03-13 | Computer security protection method and computer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106919842A CN106919842A (en) | 2017-07-04 |
CN106919842B true CN106919842B (en) | 2020-06-02 |
Family
ID=59461633
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710145132.7A Active CN106919842B (en) | 2017-03-13 | 2017-03-13 | Computer security protection method and computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106919842B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108337261A (en) * | 2018-02-09 | 2018-07-27 | 蔡心 | A kind of computer security control system |
CN109858232A (en) * | 2018-11-30 | 2019-06-07 | 河南职业技术学院 | Computer security accesses management-control method and computer security accesses control device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014509421A (en) * | 2011-02-01 | 2014-04-17 | エムシーシーアイ コーポレイション | Security measures for extended USB protocol stack of USB host system |
CN103198037B (en) * | 2013-04-22 | 2015-06-24 | 广东电网公司电力科学研究院 | Reliable pipe control method and system for IO (input output) equipment |
CN104135776B (en) * | 2014-02-25 | 2016-01-06 | 腾讯科技(深圳)有限公司 | A kind of method that cross-terminal connects, device and terminal equipment |
CN106161147B (en) * | 2015-03-31 | 2019-08-06 | 腾讯科技(深圳)有限公司 | Establish the method and device of network connection |
-
2017
- 2017-03-13 CN CN201710145132.7A patent/CN106919842B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN106919842A (en) | 2017-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3771168B1 (en) | Abnormal user identification method | |
US11019079B2 (en) | Detection of email spoofing and spear phishing attacks | |
US11030311B1 (en) | Detecting and protecting against computing breaches based on lateral movement of a computer file within an enterprise | |
US9100425B2 (en) | Method and apparatus for detecting malicious software using generic signatures | |
US20170085584A1 (en) | Detecting and thwarting spear phishing attacks in electronic messages | |
JP5961183B2 (en) | How to detect malicious software using contextual probabilities, generic signatures, and machine learning methods | |
US10819720B2 (en) | Information processing device, information processing system, information processing method, and storage medium | |
US8732831B2 (en) | Detection of rogue software applications | |
US9288226B2 (en) | Detection of rogue software applications | |
CN106133741A (en) | For scanning the system and method for packing program in response to detection questionable conduct | |
CN112685682B (en) | Method, device, equipment and medium for identifying forbidden object of attack event | |
CN105930726B (en) | A kind of processing method and user terminal of malicious operation behavior | |
CN109245902A (en) | The guard method of instant messaging message authentication codes and device | |
CN103679016A (en) | Method and system for processing malicious programs of mobile phone | |
US10659493B2 (en) | Technique for detecting malicious electronic messages | |
CN106919842B (en) | Computer security protection method and computer | |
WO2019242441A1 (en) | Dynamic feature-based malware recognition method and system and related apparatus | |
CN109284590B (en) | Method, equipment, storage medium and device for access behavior security protection | |
CN105704100A (en) | File identification method and file identification device | |
CN105306419B (en) | Page information interaction method, device and system | |
US8904185B2 (en) | Presence sensing information security | |
CN115834147A (en) | Automatic processing method and device for abnormal mails | |
CN105205395A (en) | Automatic detection method for malicious software | |
US20170257395A1 (en) | Methods and devices to thwart email display name impersonation | |
KR101857969B1 (en) | Method and Apparatus for Determining Risk of Fraudulent Mail |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200521 Address after: 518000 Shenzhen software industry base 4b-602, Xuefu Road, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Applicant after: Shenzhen Beige Data Application Research Institute Co.,Ltd. Address before: 313002 Zhejiang Province, Huzhou city Wuxing District District Road No. 1188, east of Huzhou City headquarters building 9 floor B H free port Applicant before: HUZHOU BEIGE INFORMATION SECURITY TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |
Effective date of registration: 20240411 Address after: 509 Kangrui Times Square, Keyuan Business Building, 39 Huarong Road, Gaofeng Community, Dalang Street, Longhua District, Shenzhen, Guangdong Province, 518000 Patentee after: Shenzhen Litong Information Technology Co.,Ltd. Country or region after: China Address before: 518000, Shenzhen Software Industry Base 4B-602, Xuefu Road, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province Patentee before: Shenzhen Beige Data Application Research Institute Co.,Ltd. Country or region before: China |