Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for deleting in-service virus

A technology of virus files and anti-virus software, which is applied in the direction of instruments, electronic digital data processing, and platform integrity maintenance.

Active Publication Date: 2009-04-22
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

So when the virus is running, if you open it with delete permission it will fail and the file cannot be deleted
Therefore, at present, the virus files that are running cannot be deleted immediately

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for deleting in-service virus
  • Method for deleting in-service virus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] figure 1 and figure 2 A preferred embodiment of the invention is shown. Refer to the following figure 1 and figure 2 , describing the process of deleting the running virus file in this embodiment.

[0020] (1) First intercept the following three functions:

[0021] IoCheckShareAccess, MmFlushImageSection, SeAccessCheck

[0022] When the file is opened, the file system will verify the permission of the file opening request, and only those who pass the permission verification can open the file.

[0023] When a file is opened for the first time, the Windows NT system will call the two functions of IoSetShareAccess and IoUpdateShareAccess of its kernel to set the initial permissions of the file. specific description of . These two functions are mainly used to set the share permission and update permission of the file when the file is opened.

[0024] When the file is opened again, the system will call three functions, IoCheckShareAccess, MmFlushImageSection, and S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for deleting a running virus file and the method comprises: holding up a function used for the authority verification of a file led out from the inner core of an operation system; finding out the running virus file; transferring the function used for the authority verification of the file by a file system when an opening request on the virus file exists; correcting the references or the returning value of the function used for the authority verification of the file when the file opening request is confirmed to be proposed by the appointed antivirus software and the virus file is to be deleted, thus leading the file system to successfully finish the authority verification of the file so as to allow the appointed antivirus software to delete the virus file, thereby eliminating the virus.

Description

technical field [0001] The invention relates to a method for deleting virus files. Background technique [0002] After the computer has been infected by a virus program and the virus program is running, the running files are protected by the operating system and cannot be deleted. For example, when opening a WORD file, if the user tries to delete the file, the system will prompt that the file is occupied and cannot be deleted. This causes the problem that the running virus cannot be removed when killing the virus. [0003] The previous method is to restart the computer and delete the virus before it runs, which requires the user to restart the computer, but it cannot be restarted at any time on some servers, which has caused incomplete antivirus, and some viruses It self-protects itself, and its process cannot be terminated directly. Therefore, in order to completely eradicate the virus, it is necessary to delete the virus file. [0004] Files in the computer have access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/56
Inventor 韩宇
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products