Computer protecting method based on programm behaviour analysis
A behavior analysis, computer technology, applied in computing, program control devices, instruments, etc., can solve the problems of anti-virus software, complicated use of firewalls, and the inability of anti-virus software to protect against unknown viruses and Trojans.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] Referring to the accompanying drawings, and in conjunction with the most commonly used Microsoft Windows operating system, the computer protection method based on program behavior analysis of the present invention is applied to the Microsoft Windows operating system, and the embodiments of the present invention are described in detail.
[0080] Such as figure 1 Shown is a flow chart of the computer protection method based on program behavior analysis of the present invention.
[0081] The computer protection method based on program behavior analysis of the present invention is characterized in that:
[0082] For a known program, monitor its behavior and compare it with the legal behavior of the known program recorded in the program behavior knowledge base to determine whether the known program has been illegally attacked;
[0083] For unknown programs, monitor their actions and compare them with the attack identification rules recorded in the attack identification rule...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com