Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus killing method and virus killing system with multiple antivirus engines

A virus-killing engine and anti-virus technology, which is applied in the anti-virus method and system field of multiple anti-virus engines, can solve the problems of inability to detect and kill viruses, file size limitations, and infectivity, and achieve the effect of high-speed multi-anti-virus engine killing

Active Publication Date: 2010-03-31
LENOVO (BEIJING) CO LTD
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Computer viruses are not only destructive in themselves, but more harmful are contagious. Once the virus is replicated or mutated, the speed is hard to prevent. The loss and destruction of computer resources will not only cause a huge waste of resources and wealth, Moreover, it may cause social disasters. With the development of the information society, the threat of computer viruses is becoming more and more serious, and the task of anti-virus is becoming more and more difficult.
[0004] In view of computer security problems caused by computer viruses, almost every computer user will install anti-virus software now, but the current problem is that a computer can often only install one anti-virus software and use one virus database. Obviously, A single virus database is always powerless for the ever-changing viruses. In order to improve the virus detection and killing rate, it is hoped that more virus databases can be used to detect and kill viruses
[0005] At present, there is a relatively common multi-engine virus scanning network. These websites provide the antivirus engines of various antivirus manufacturers. Users can upload the files or folders they want to kill to the virus scanning network, and the scanning network calls each antivirus engine in turn. Uploaded files are scanned. Obviously, this method has a limit on the size of files uploaded by users, and it takes up a lot of network resources, and the efficiency is very low. In addition, it is difficult for ordinary users to know which file has a virus. , so the accuracy of virus detection and killing is low
[0006] In a word, the above-mentioned prior art cannot fundamentally realize the purpose of checking and killing viruses in computers at a high rate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus killing method and virus killing system with multiple antivirus engines
  • Virus killing method and virus killing system with multiple antivirus engines
  • Virus killing method and virus killing system with multiple antivirus engines

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Embodiment one, see figure 1 , the antivirus method provided by the embodiment of the present invention, comprises the following steps:

[0057]Step 101: Detect whether there is a virus scanning command, if there is the virus scanning command, go to step 102, otherwise continue to detect.

[0058] Step 102: according to the virus scanning command, invoke the main antivirus engine of at least two antivirus engines to scan and kill the object required to be scanned by the virus scanning command.

[0059] Step 103: When the virus detected by the main antivirus engine is an unknown virus, invoke the auxiliary antivirus engine of the at least two antivirus engines to scan and kill at least one object required to be scanned by the virus scanning command.

[0060] In the embodiment of the present invention, the main anti-virus engine is the anti-virus engine with the highest detection and killing rate among the many local anti-virus engines, and all engines except the main an...

Embodiment 2

[0067] Embodiment 2. In practical applications, different methods may be used to scan the object required to be scanned according to the suspiciousness of the object required to be scanned by the virus scanning command. See figure 2 , the method specifically includes:

[0068] Step 201: Detect whether there is a virus scanning command, if so, go to step 202, otherwise go back to step 201 to continue detection.

[0069] Step 202: Determine whether the scanned object required by the virus scanning command has a record of being infected by a virus, if not, go to step 204; otherwise, go to step 203.

[0070] Step 203: Determine whether the object is a suspicious object, if not, go to step 204; if yes, go to step 205.

[0071] The suspicious object refers to an object whose virus infection rate is higher than a preset threshold.

[0072] Wherein, in step 202, it is judged whether the object that the virus scanning command requires to scan is a possible object is specifically:

...

Embodiment 3

[0083] Embodiment three, see image 3 , the antivirus method that realizes many antivirus engines that this embodiment provides comprises:

[0084] Step 301: Detect whether there is a virus scanning command. If there is the virus scanning command, go to step 302; otherwise, return to step 301 to continue detection.

[0085] Step 302: Determine whether the object scanned by the virus scanning command has a virus infection record, if not, go to step 304; otherwise, go to step 303.

[0086] Step 303: Determine whether the object is a suspicious object, if not, go to step 304; if yes, go to step 305.

[0087] Step 304: The master and assistant assist in scanning and killing the object required to be scanned, and proceed to step 306.

[0088] Step 305: Invoke the at least two antivirus engines in turn to detect and kill the suspicious objects, and proceed to step 306.

[0089] Step 306: Determine whether a virus is found, if not, go to step 301; otherwise go to step 307.

[009...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virus killing method and a virus killing system with multiple antivirus engines. The method comprises the following steps: acquiring a virus scanning command; calling a mainantivirus engine of at least two antivirus engines to search and kill an object which the virus scanning command requires to scan; calling an auxiliary antivirus engine in at least two antivirus engines to search and kill the object which the virus scanning command requires to scan, wherein the virus killing rate of the main antivirus engine is more than that of the auxiliary antivirus engine, andthe auxiliary antivirus engine can be other antivirus engines except the main antivirus engine of at least two antivirus engines. Therefore, the method realizes high speed multi-antivirus engines searching and killing on the scanning object basing on the fact that the success ratio of searching and killing is guaranteed.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method and system for killing viruses with multiple killing engines. Background technique [0002] With the continuous development of computer technology, now, whether in daily life or work, computers have become an indispensable partner for people, bringing a lot of convenience to people's work and life, but among them There is a discordant factor, and that is the computer virus. [0003] A computer virus refers to a set of computer instructions or program codes compiled or inserted into computer programs that destroy computer functions or data, affect computer use, and are capable of self-replication. Computer viruses are not only destructive in themselves, but more harmful are contagious. Once the virus is replicated or mutated, the speed is hard to prevent. The loss and destruction of computer resources will not only cause a huge waste of resources and wealth, Moreover, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/56
Inventor 张睿
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products