Method and device for removing malicious programs

A malicious program and program technology, applied in the field of information security, can solve the problems that the original program cannot run, cannot be opened normally and enter the user's computer system, and the user is afraid of virus removal actions, etc., and achieves a convenient, safe and effective virus removal solution. Effect

Active Publication Date: 2011-01-19
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Yet the existing method of this virus removal is not always effective, and the reason is that after removing some codes in the infected file, the original program may not be able to run, and in serious cases, some

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for removing malicious programs
  • Method and device for removing malicious programs
  • Method and device for removing malicious programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described below with reference to the accompanying drawings.

[0054] Aiming at the disadvantages of existing methods for removing malicious programs, the core idea of ​​the present invention is to replace virus-infected files directly instead of using the method of removing virus codes. For this reason, it is necessary to build a file database in advance and pay attention to collecting the information of good files , when the infected file and its information can be determined, the file information can be used to search the database for a good file that has not been infected in advance, and after downloading the good file to the client computer infected by the virus, replace the infected file .

[0055]Please refer to figure 1 , which is a flow chart of a method for removing malicious programs according to an embodiment of the present invention. First, a database is constructed, and files not infected with viruses and correspondin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for removing malicious programs, and the method comprises the following steps: firstly constructing a database, wherein files which are not infected with virus and file information which corresponds to the files are stored in the database; matching information of a file infected with the virus with the file information which is not infected with the virus and stored in the database when confirming that the certain file in a client computer is infected with the virus; loading the file which is not infected with the virus and corresponds to the file information which is not infected with the virus in the database into the client computer, and replacing the file infected with the virus. The utilization of the method and the device can effectively avoid damaging the file or solve the problem that the file can not be implemented after removing the virus or Trojan and other malicious programs in the computer, facilitate the treatment of the file infected with the virus for a user of the computer and provide a virus removal scheme which is safer and more effective.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for eliminating malicious programs. Background technique [0002] With the wide application of computer technology in various fields of social life, malicious programs (Malwar, malicious software) also follow one after another just like its accessories. Due to the infectiousness, replicability and destructiveness of these malicious programs, they have become a major problem plaguing computer use. [0003] Malicious program is an umbrella term for any software program intentionally created to perform unauthorized and often harmful acts. Computer viruses, backdoor programs, keyloggers, password stealers, Word and Excel macro viruses, boot sector viruses, script viruses (batch, windows shell, java, etc.), Trojan horses, crimeware, spyware and adware, etc., These are examples of what could be called malicious programs. [0004] For the convenience ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/56
CPCG06F21/568
Inventor 周鸿祎徐贵斌
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products