Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File unlocking method and file unlocking device

A technology for file unlocking and target files, applied in the direction of platform integrity maintenance, etc., can solve the problems of inability to break the layer-by-layer protection of virus-infected files, weak resistance to driver-level malicious programs, and weak resistance.

Active Publication Date: 2013-01-02
三六零数字安全科技集团有限公司
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing security software has a single means of unlocking and shredding virus-infected files, and cannot break through the layers of protection set up for virus-infected files, and the ability to resist is not strong
Traditional security software vendors have only solved part of the "undelete" problem, and often show a certain lack of ability in the attack and defense of the operating system kernel state, and the ability to resist driver-level malicious programs (Rootkit) is relatively weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File unlocking method and file unlocking device
  • File unlocking method and file unlocking device
  • File unlocking method and file unlocking device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0079] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a file unlocking method of the present invention, which may specifically include the following steps:

[0080] Step 101, attempting to perform a delete operation or a write operation on the target file;

[0081] In the user mode of the Windows operating system, you can use the functions DeleteFile and ZwDeleteFile to try to delete the target file; in the kernel mode of the Windows operating system, you can use the function ZwDeleteFile to try to delete the target file. Specifically, by calling the operating system application program interface API: DeleteFile of the file deletion routine located in the user state; then calling the operating syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file unlocking method and a file unlocking device. The method includes: attempting to execute a delete operation or a write operation aiming at a target file; if the delete or write operation cannot be executed for the target file, obtaining the attribute of the target file; and if the attribute of the target file is read-only, invoking a user-defined application program interface for file attribute change to remove the read-only attribute of the target file. A file unlocking and shredding mechanism is safe, reliable and high in success rate and is capable of recognizing and confronting file self-protection behaviors of malicious programs in the complex client-side environment, and accordingly the capability of the mechanism in confronting attack and defense of the drive-level malicious programs is enhanced.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a file unlocking method and a file unlocking device. Background technique [0002] A computer virus refers to a set of computer instructions or program codes that are inserted into a computer program by the compiler to destroy computer functions or data, affect the use of the computer, and are capable of self-replication. Once a computer is infected with a virus, the computer usually shows that its files are increased , delete, change the name or attribute, and move to other directories. These operations of the virus on the computer files may cause a series of problems such as the inability to run normal programs, the crash of the computer operating system, the remote control of the computer, and the theft of user information. question. [0003] In order to ensure the safe operation of the computer, it is necessary to scan and kill the virus-infected files in the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
Inventor 王宇潘剑锋
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products