Picture and file virus defense system and method

A defense system and image file technology, applied in the field of virus defense system, can solve the problems of unsaved image files, loss of image file data, etc.

Inactive Publication Date: 2008-10-01
HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When using this method, the graphic file design system must be closed, and the virus is often found in the middle of the mold design. Closing the graphic file design system may make the designer’s graphic file unable to be saved or lose some graphic file data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Picture and file virus defense system and method
  • Picture and file virus defense system and method
  • Picture and file virus defense system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Such as figure 1 Shown is a hardware architecture diagram of a preferred embodiment of the image file virus defense system of the present invention. The system includes a host computer 1 , a display screen 2 , a keyboard 3 and a mouse 4 . Wherein, the host computer 1 is used for related operations of image file virus defense, and it may be an IBM computer, an Apple Mac PC, a personal computer, a network server, or any other suitable computer. The display screen 2 can be any display device, which provides a graphical user interface for the operator, and the user inputs operation commands to be executed through the keyboard 3 or the mouse 4 .

[0013] Such as figure 2 shown, is figure 1 The functional block diagram of the main computer 1 in the computer. The host computer 1 includes an acquisition module 10 , a search module 12 , a judgment module 14 , a deletion module 16 and a monitoring module 18 . In this preferred embodiment, AutoCAD is used as an example for i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A defending method for a figure file virus, the method comprises following steps: obtaining the paths of the entire support files of the figure file system, searching the files with the appointed suffixal name of the obtained support file; judging the whether the files with the appointed suffixal name has virus files; deleting the virus files while the files with the appointed suffixal name has virus files; starting a monitoring program; monitoring whether the support files path increase new files; judging the whether the new increased file is the files with the appointed suffixal name while the support files path increase new files; judging whether the increased files have virus files; deleting the virus files while the increased files have virus files. In addition, the invention also provides a defending system for a figure file virus. This invention can automatically delete the virus files in the figure file system.

Description

technical field [0001] The invention relates to a virus defense system and method, in particular to an image file virus defense system and method. Background technique [0002] For mold designers, the generation of graphic file viruses may cause the design graphic files to be lost due to failure to save, or the mold graphic files cannot be entered into processing and manufacturing due to command failure. [0003] The general method for designers to clear image file viruses is: open the search "file or folder" dialog box of the operating system; enter the virus file name in the "file or folder" data box; enter the invalid file name in the "contains text" data box For example: the explode command in AutoCAD; select all hard disk drives in the "search" data box; delete the searched virus files. When using this method, the graphic file design system must be closed, and the virus is often found in the middle of the mold design. Closing the graphic file design system may make the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F17/50G06F21/56
Inventor 常春明
Owner HONG FU JIN PRECISION IND (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products