File unlocking and shredding method and device

A file unlocking and target file technology, applied in the direction of platform integrity maintenance, etc., can solve problems such as lack of ability, weak resistance, weak resistance of driver-level malicious programs, etc., to achieve the effect of enhancing resistance and high success rate

Active Publication Date: 2013-01-02
三六零数字安全科技集团有限公司
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing security software has a single means of unlocking and shredding virus-infected files, and cannot break through the layers of protection set up for virus-infected files, and the ability to resist is not strong
Traditional security software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File unlocking and shredding method and device
  • File unlocking and shredding method and device
  • File unlocking and shredding method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0055] One of the core concepts of the embodiments of the present invention is to provide a mechanism for violently deleting files, that is, files that can be opened but cannot be deleted after some unlocking and shredding methods, such as file path preprocessing, read-only attribute removal, etc. Under such circumstances, through the internal data structure of the "direct operation" (DKOM term, Direct Kernel Object Manipulation) file system, enter the reference information database of the file, clear the reference count of the file, and realize the unlocking and shredding of the file.

[0056] refer to figure 1 , shows a flow chart of the steps of Embodiment 1 of a method for unlocking and shredding files of the present invention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file unlocking and shredding method. The method comprises the following steps of: judging whether an object file can be opened and meet the preset conditions; if so, obtaining a handle of the object file and obtaining an object of the object file based on the handle; and searching the object of the object file for the corresponding file reference information base and assigning the reference count value in the file reference information base as the preset value. The file unlocking and shredding mechanism provided by the invention not only is safe and reliable and has high success rate but also can distinguish and counter the self-protection behaviors of the files with malicious programs in the complex client environments, thus enhancing the counterforce of attacking and defending the drive stage malicious programs.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a file unlocking and shredding method and a file unlocking and shredding device. Background technique [0002] A computer virus refers to a set of computer instructions or program codes that are inserted into a computer program by the compiler to destroy computer functions or data, affect the use of the computer, and are capable of self-replication. Once a computer is infected with a virus, the computer usually shows that its files are increased , delete, change the name or attribute, and move to other directories. These operations of the virus on the computer files may cause a series of problems such as the inability to run normal programs, the crash of the computer operating system, the remote control of the computer, and the theft of user information. question. [0003] In order to ensure the safe operation of the computer, it is necessary to scan and kill the virus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
Inventor 郑文彬潘剑锋王宇
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products