File unlocking method and device

A file unlocking and file technology, which is applied in the file unlocking device and file unlocking field, can solve the problems of lack of ability, weak resistance, single means of unlocking and shredding virus-infected files, etc., to achieve a safe shredding mechanism, enhance the ability to fight, high success rate

Active Publication Date: 2013-01-02
360 TECH GRP CO LTD
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing security software has a single means of unlocking and shredding virus-infected files, and cannot break through the layers of protection set up for virus-infected files, and the ability to resist is not strong
Traditional security software vendors have only solved part of the "undelete" problem, and often show a certain lack of ability in the attack and defense of the operating system kernel state, and the ability to resist driver-level malicious programs (Rootkit) is relatively weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File unlocking method and device
  • File unlocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a file unlocking method of the present invention, which may specifically include the following steps:

[0048] Step 101, try to open or delete the target file;

[0049] It should be noted that, in the embodiment of the present invention, the files include files of a type supported by the WINDOWS operating system. Described file is not meant to open file (as *.exe, *.doc etc. type file) by trigger mode such as double-clicking mouse or pressing enter key; But refers to the application program of using operating system API or the self-definition of the present invention CreateFile () function etc. of the interface BAPI (application of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file unlocking method and device. The method comprises the following steps of: judging whether an object file has the condition of handle occupation; if so, traversing a handle table of an operating system to obtain a file handle corresponding to the object file and obtain the process to which the file handle belongs; and switching to the process and initiating close operation of the object file handle based on the process. The file unlocking and shredding mechanism provided by the invention not only is safe and reliable and has high success rate but also can distinguish and counter the self-protection behaviors of the files with malicious programs in the complex client environments, thus enhancing the counterforce of attacking and defending the drive stage malicious programs.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a file unlocking method and a file unlocking device. Background technique [0002] A computer virus refers to a set of computer instructions or program codes that are inserted into a computer program by the compiler to destroy computer functions or data, affect the use of the computer, and are capable of self-replication. Once a computer is infected with a virus, the computer usually shows that its files are increased , delete, change the name or attribute, and move to other directories. These operations of the virus on the computer files may cause a series of problems such as the inability to run normal programs, the crash of the computer operating system, the remote control of the computer, and the theft of user information. question. [0003] In order to ensure the safe operation of the computer, it is necessary to scan and kill the virus-infected files in the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 王宇郑文彬
Owner 360 TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products