Method for checking and killing new computer virus using independent operation system

An operating system and computer virus technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as program failure, harm, and slowness, and achieve the effect of improving efficiency and simplifying processes

Inactive Publication Date: 2009-03-25
BEIJING HELP NOW
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] While computer operating systems and application programs are constantly updated and upgraded, computer viruses are also constantly being refurbished. Viruses and Trojan horse programs that use new transmission channels, new concealment mechanisms, and new protection and camouflage techniques emerge in endlessly, especially in the era of rapid Internet popularization. A large number of viruses and Trojan horses abandon the original relatively slow file transmission method, and use the convenience of the network to quickly copy and spread. In addition, the Microsoft Windows operating system, which is commonly used in personal computers, has many loopholes in itself, such as system buffer overflow. , RPC service loopholes, etc., opened the door for the spread and destruction of viruses and Trojans, and caused great harm to users' normal computer applications.
[0003] Nowadays, there are many professional software companies that produce many types of anti-virus, virus-checking, and anti-virus software programs, all of which are application programs under the Windows system platform. Scanning files infected by viruses and cleaning and killing virus programs are auxiliary, which guarantees the safe use of users' computers to a certain extent, but virus transmission channels, intrusion methods, and camouflage methods are constantly changing. Relatively in a passive position, new viruses are produced first, and the method of killing viruses is born later. Although users need to update the virus signature database frequently in order to ensure that the computer is not infected, in order to check and kill the latest viruses, the virus still has time One step ahead, but there is a gap to take advantage of, and the most convenient way to update and upgrade the virus signature database is to upgrade online through the Internet, but many viruses, such as: worms, will hinder the normal connection of the network when they invade and attack, or the shock wave virus , will forcibly interrupt the network and shut down the system, making it impossible to upgrade the virus signature database. Some viruses, such as the five poisonous insect virus, will first shut down the system process of well-known antivirus software when they attack, and start multiple mutual protection programs. Program processes, and setting itself as the highest priority program or binding key system processes, etc., against anti-virus programs and anti-virus programs, making the existing anti-virus programs under the Windows system platform invalid, thereby endangering the normal operation of the user's computer It is not uncommon to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for checking and killing new computer virus using independent operation system
  • Method for checking and killing new computer virus using independent operation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] In the present, a new worm virus bypasses the traditional virus firewall (because the update of traditional antivirus software and the virus signature database always lags behind the development of the virus) and infects the user's computer with the attachment of the email, and is activated in the memory , frequently sending out a large amount of data, causing the user's computer system resources to be exhausted, and blocking the external network connection, making the user unable to visit the anti-virus software upgrade website after the virus is discovered, and unable to obtain the latest virus signature database or Designed to kill tools to stop the destruction and spread of viruses. Or the shock wave virus exploits Windows system vulnerabilities to attack and destroy the RPC service process, causing the user's computer to be forcibly shut down after 60 seconds, making the computer unusable; When the anti-virus program of the anti-virus program uses various methods s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The computer virus checking and killing system includes independent operation system, virus checking and killing client terminal and remote updating server, and features that the virus checking and killing client terminal adopts the independent operation system as operation platform. The independent operation system is independent on the computer hard disc operation system, will not be infected by the Windows virus, and has independent identification, driving of the computer hardware, boosting the desk environment, network environment monitoring, log-on of Internet and operation of virus checking and killing client terminal. The virus checking and killing client terminal includes virus checking and killing module, virus characteristic library and first communication module. The remote updating server includes new virus characteristic library and the second communication module for communication to the first one and transferring the new virus characteristic library.

Description

technical field [0001] The invention relates to independent operating system technology, antivirus technology and network communication technology. Background of the invention [0002] While computer operating systems and application programs are constantly updated and upgraded, computer viruses are also constantly being refurbished. Viruses and Trojan horse programs that use new transmission channels, new concealment mechanisms, and new protection and camouflage techniques emerge in endlessly, especially in the era of rapid Internet popularization. A large number of viruses and Trojan horses abandon the original relatively slow file transmission method, and use the convenience of the network to quickly copy and spread. In addition, the Microsoft Windows operating system, which is commonly used in personal computers, has many loopholes in itself, such as system buffer overflow. , RPC service loopholes, etc., have opened the door for the spread and destruction of viruses and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00H04L12/24
Inventor 张林
Owner BEIJING HELP NOW
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products