Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File protection method and apparatus

A file and file type technology, applied in the computer field, can solve problems such as user loss and inability to use electronic files normally, and achieve the effect of improving security

Active Publication Date: 2017-12-01
北京鸿享技术服务有限公司
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, hackers can use malicious programs to encrypt electronic files and other illegal operations without the user's permission, so that users cannot normally use the illegally operated electronic files, thereby causing huge losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and apparatus
  • File protection method and apparatus
  • File protection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] figure 1 A flow chart of a file protection method provided according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes the following steps:

[0025] In step S110, when an operation instruction for the file is detected, the program that initiates the operation instruction is determined.

[0026] Specifically, in this embodiment, it can be defaulted to monitor all types of fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file protection method and apparatus. The method includes: determining a program for initiating an operation instruction when the operation instruction for a file is monitored; determining a classification program white list corresponding to the file type according to the file type of the file; and determining whether the program for initiating the operation instruction belongs to the classification program white list, and determining whether the file is protected according to a determination result. In usual conditions, the application programs matched with the file types of the files are responsible for processing of the files of each type so that whether the protection of the file needs to be reinforced can be rapidly and accurately determined by monitoring whether the program of the operation file is matched with the file type of a to-be-operated file, and the security of the files is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a file protection method and device. Background technique [0002] With the development of computer technology, informatization has developed rapidly in all walks of life. For enterprises and institutions, network paperless office is becoming more and more popular, therefore, the importance of electronic documents is becoming increasingly prominent. [0003] In order to seek illegal benefits, computer hackers often launch various types of attacks on electronic files. For example, hackers can use malicious programs to encrypt electronic files and other illegal operations without the user's permission, so that the user cannot normally use the illegally operated electronic file, thereby causing huge losses to the user. Therefore, how to quickly and effectively identify malicious programs and prevent malicious programs from performing illegal operations on electronic files has be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/6218H04L63/101H04L63/105
Inventor 王亮何博
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products