Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense method and system for virus or malicious program

A malicious program and virus technology, applied in the field of virus or malicious program defense, can solve the problems of slow system speed, consumption of large system resources, low hit rate, etc., achieving small resource requirements, less memory resources, avoiding disk I/ Effects of O and CPU consumption

Active Publication Date: 2016-12-14
三六零数字安全科技集团有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The real-time operation of security software consumes a large amount of system resources, resulting in slow system speed, and the hit rate of this consumption is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method and system for virus or malicious program
  • Defense method and system for virus or malicious program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0062] One of the core concepts of the embodiments of the present invention is to analyze the running environment information of the virus or malicious program, and pre-occupy the running environment of the virus or malicious program on the client, which can prevent the virus or malicious program from entering the system and cause the virus or malicious program to The program cannot complete the attack normally.

[0063] refer to figure 1 , which shows a flow chart of an embodiment of a method for defending against viruses or malicious programs in the present invention, which may specifically include:

[0064] Step 101, the server side counts the virus or malicious program data of all clients;

[0065] The invention is applicabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a virus or malicious program defense method and system, wherein the method specifically includes: the server side counts the virus or malicious program data of all clients; analyzes the virus or malicious program data to obtain the virus or malicious program data The operating environment information of the virus or malicious program; the client pre-occupies the operating environment of the virus or malicious program according to the operating environment information of the virus or malicious program. The invention can save the resource overhead of virus or malicious program defense, thereby improving the system speed.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a virus or malicious program defense method and system. Background technique [0002] In the computer field, a Trojan horse is a class of malicious programs. Trojan horses are hidden and spontaneous programs that can be used to carry out malicious acts. Most of them will not directly cause harm to the computer, but mainly control them. [0003] With the development of virus or malicious program writing technology, Trojan horse programs are more and more threatening to users, especially some Trojan horse programs have adopted extremely cunning means to conceal themselves, making it difficult for ordinary users to find out after poisoning. The Trojan horse program may secretly monitor others and steal other people's passwords or data, such as stealing administrator passwords for sabotage, or stealing game account numbers, stock account numbers, and even online banking ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
Inventor 禹建文
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products