Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer data protecting method

a technology for protecting methods and computer data, applied in the field of security methods, can solve problems such as the illusion that unauthorized users have successfully hacked the inner data system

Inactive Publication Date: 2006-02-23
FANG KO CHENG
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention provides a data protection method that can respond properly to hacking activities, prevent computer virus attacks, and prevent unauthorized digital media reproduction. The method involves recording the activities of unauthorized users or activating certain reactions. The invention also includes a monitor program that can detect any modification / addition / deletion action performed on program modules of an operating system and determine if the action is legitimate. The monitor program can also delete the program modules and load the backup images of the program modules to recover the computer back to normal operation. The common password is also provided in the monitor program to allow for special functions without performing the password authentication step."

Problems solved by technology

Otherwise, the user request is transmitted to a reaction system which provides virtual data similar to real data so that unauthorized users have the illusion of successfully hacking the inner data system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer data protecting method
  • Computer data protecting method
  • Computer data protecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]FIG. 1 illustrates a basic network structure. When a user 10 connected with the network 104, there is a probability of the data stored in the computer belonging to the user 10 being stolen or destroyed by a hacker 12 through the network 104. For example, the hacker 12 can browse the stored data through the network 104 if he can decode the password. Moreover, the hacker also can design and spread viruses on a network 104, and files carrying the viruses are downloaded while the user 10 through the network 104. When these files carrying the viruses are loaded back to the computer of the user 10, under certain situations, such as the infected files or macros are executed, the viruses further sneak into program modules of an operating system and waits to break out so as to damage the computer. Therefore, the present invention provides a system and method for preventing the attack from the hacker.

[0025] When a hacker spreads viruses on a network to attack the computer, the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.

Description

FIELD OF INVENTION [0001] The present invention relates to a security method, and particularly relates to a computer data security method. BACKGROUND OF THE INVENTION [0002] With the popularity of computer and the progress of the network technology, computers have been closely involved in human daily life. For example, people can use computer to record various digital data. Even people can use the duplicating machine of the computer to reproduce the same digital data in a digital recording media. [0003] Most computers are connected to networks like the Internet, intranets, and telecommunication networks. In other words, networks have become an unavoidable tool in life. However, a network also exposes users thereof to various attacks. For example, data on the network can be destroyed, changed, or copied by hackers. When the hacker gets the data, he can employ the reproduction function to reproduce the data and even sell the data. There are many transferring and copy preventing techno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F12/14
CPCG06F11/3466G06F2221/2127G06F21/56G06F21/554
Inventor FANG, KO-CHENG
Owner FANG KO CHENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products