Method for searching and killing virus and computer therefor

A computer and virus technology, applied in computer security devices, computing, instruments, etc., can solve problems such as system vulnerability weakening actual effects, inability to perform anti-virus operations, affecting the normal operation of anti-virus software, etc., to achieve the effect of ensuring security.

Inactive Publication Date: 2008-03-12
LENOVO (BEIJING) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the existing antivirus software runs on the original system, and the vulnerability of the system itself will greatly weaken the actual effect of these solutions. The most typical example is that the antivirus software on Windows is powerless against some boot viruses. , because this kind of virus will attack before the antivirus engine runs, and may even shut down the antivirus software; in addition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for searching and killing virus and computer therefor
  • Method for searching and killing virus and computer therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0026] FIG. 1 is a schematic diagram of an embodiment of a computer for detecting and killing viruses. In this embodiment, a function key 111 for directly starting the antivirus function is added on the keyboard 110 of the computer. The module 121 for identifying key information can identify the added function key 111 for directly starting the antivirus function. Wherein, the function key 111 and the module 121 for identifying key information can be connected through a PS2 interface, or a USB interface, or a wireless interface, or a 1394 interface, or other interfaces, and the connection method is not limited here. The module 121 for identifying key information includes a module for identifying key information in the BIOS and a module for identifying key information in the operating system.

[0027] In this way, regardless of whether the operating system ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for realizing virus-check and virus-kill includes starting up embedded system in HPA region to call virus-killing module for executing operation of virus-checking and virus-killing then loading operation system and starting up computer when BIOS self detection is over and signal of executing virus-killing operation is detected. A computer for realizing virus-check and virus-kill is also disclosed.

Description

technical field [0001] The invention relates to the technical field of checking and killing computer viruses, in particular to a method for checking and killing viruses and a computer for realizing the method. Background technique [0002] With the continuous improvement of computing power and storage capacity of computers, the improvement of network transmission speed, the diversification of information exchange methods between computers and peripheral devices, and the increasing abundance of network applications, people's dependence on computers continues to increase. Demand is also increasing. At the same time, the attack methods of hackers are also constantly changing, and the lethality of various computer viruses is becoming stronger and stronger. [0003] Most of the existing antivirus software runs on the original system, and the vulnerability of the system itself will greatly weaken the actual effect of these solutions. The most typical example is that the antivirus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00G06F9/445
CPCG06F21/572G06F21/56
Inventor 王晚丁李亚辉
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products