Anti-Trojan network security system and method
A network security and Trojan horse technology, which is applied in the field of network security systems for defending against Trojan horses, can solve problems such as Trojan horses losing control of the server, and achieve the effect of preventing important information from being stolen
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In order to make the purpose and technical solution of the present invention clearer, the network security system and method for preventing Trojan horses of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.
[0029] figure 2 It is a block diagram of the Trojan horse defense system of the present invention. The system includes a control terminal 240 , a server terminal 210 , the Internet 230 and a network device 220 . The control terminal 240 is the party that remotely controls the server terminal 210, and the service terminal 210 is the party that is remotely controlled by the control terminal 240; the Internet 230 is a network carrier for the control terminal 240 to remotely control the server terminal 210; the network device 220 is connected to the control terminal 240 Between the terminal 240 and the server 210, it is located on the side of the server 210, and its hardware entities are usually rou...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com